CN107995198A - Information processing method, device, electronic equipment and storage medium - Google Patents

Information processing method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN107995198A
CN107995198A CN201711266446.9A CN201711266446A CN107995198A CN 107995198 A CN107995198 A CN 107995198A CN 201711266446 A CN201711266446 A CN 201711266446A CN 107995198 A CN107995198 A CN 107995198A
Authority
CN
China
Prior art keywords
identity information
purpose terminal
message data
information
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711266446.9A
Other languages
Chinese (zh)
Inventor
何丰宇
刘光旭
付鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Knownsec Information Technology Co Ltd
Original Assignee
Beijing Knownsec Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Knownsec Information Technology Co Ltd filed Critical Beijing Knownsec Information Technology Co Ltd
Priority to CN201711266446.9A priority Critical patent/CN107995198A/en
Publication of CN107995198A publication Critical patent/CN107995198A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

The present invention provides a kind of information processing method, device, electronic equipment and storage medium, it is related to field of computer technology.The information processing method includes:Obtain the message data for being used for being sent to purpose terminal outside;The identity information of the purpose terminal is obtained from the message data;Judge whether the identity information is default identity information;For it is no when, then the message data is replaced with into random string;The random string is sent to the purpose terminal.The information processing method, device, electronic equipment and storage medium can realize that the message data for being externally sent to the purpose terminal for not being default identity information replaces with random string, so that the data that the purpose terminal obtains are random string, the leakage of the data of electronic equipment is prevented.

Description

Information processing method, device, electronic equipment and storage medium
Technical field
The present invention relates to field of computer technology, in particular to a kind of information processing method, device, electronic equipment And storage medium.
Background technology
Usual terminal is the most weak link of information security, and the application software type of installation is numerous and jumbled, and Outside Access amount is larger. Hacker can often set about from the webpage of terminal application software and internet, insert wooden horse in terminal and steal data, so as to lead Cause the leakage of the data of terminal.
The content of the invention
In view of this, an embodiment of the present invention provides a kind of information processing method, device, electronic equipment and storage medium.
To achieve these goals, the technical solution adopted by the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of information processing method, the described method includes:Acquisition is used for outgoing To the message data of purpose terminal;The identity information of the purpose terminal is obtained from the message data;Judge the identity Whether information is default identity information;For it is no when, then the message data is replaced with into random string;By the random words Symbol string is sent to the purpose terminal.
Second aspect, an embodiment of the present invention provides a kind of information processor, described device include message obtain module, Information acquisition module, signal judgement module, replace execution module and the first sending module, wherein, the message obtains module For obtaining the message data for being used for being sent to purpose terminal outside;Described information obtains module and is used to obtain from the message data The identity information of the purpose terminal;Described information judgment module is used to judge whether the identity information is default identity letter Breath;The replacement execution module is used to when the identity information is not to preset identity information, then replace the message data For random string;First sending module is used to send the random string to the purpose terminal.
The third aspect, an embodiment of the present invention provides a kind of electronic equipment, the electronic equipment includes memory and processing Device, the memory storage have computer instruction, when the computer instruction is read and performed by the processor, make described Processor performs the information processing method that above-mentioned first aspect provides.
Fourth aspect, is stored with computer an embodiment of the present invention provides a kind of storage medium, in the storage medium and refers to Order, wherein, the computer instruction performs the information processing method that above-mentioned first aspect provides when being read and running.
Information processing method, device, electronic equipment and storage medium provided in an embodiment of the present invention, by obtaining for outer The message data of purpose terminal is sent to, the identity information of the purpose terminal is then obtained from the message data, then judges the body Whether part information is default identity information, for it is no when, then the message data is replaced with by random words based on predetermined encryption algorithm Symbol string, finally sends the random string to the purpose terminal.So as to which the information processing method, which can be realized, to be externally sent to not It is that the flow of the purpose terminal of default identity information replaces with random string, so that the purpose for default identity information is whole It is random string that end, which obtains data, prevents the leakage of the data of electronic equipment, and solution hacker can insert wooden horse in terminal and steal Fetch evidence, the problem of causing the leakage of data of terminal.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Brief description of the drawings
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without making creative work, belong to the scope of protection of the invention.
Fig. 1 shows the schematic diagram that electronic equipment provided in an embodiment of the present invention is interacted with purpose terminal;
Fig. 2 shows the block diagram of electronic equipment provided in an embodiment of the present invention;
Fig. 3 shows the flow chart of information processing provided in an embodiment of the present invention;
Fig. 4 shows the flow chart of step S130 in information processing method provided in an embodiment of the present invention;
Fig. 5 shows the module map of information processor provided in an embodiment of the present invention;
Fig. 6 shows the module map of signal judgement module in information processor provided in an embodiment of the present invention.
Embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and designed with a variety of configurations herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing Go out all other embodiments obtained on the premise of creative work, belong to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
Fig. 1 shows the schematic diagram that electronic equipment provided in an embodiment of the present invention is interacted with purpose terminal.Electronics is set Standby 100 are communicatively coupled by network and one or more purpose terminal 200, with into row data communication or interaction.It is described Electronic equipment 100, purpose terminal 200 can be PC (personal computer, PC), certainly, the electronic equipment 100th, purpose terminal 200 also can also be server etc..
Fig. 2 shows a kind of structure diagram that can be applied to the electronic equipment in the embodiment of the present invention.It is as shown in Fig. 2, electric Sub- equipment 100 includes memory 102, storage control 104, one or more (one is only shown in figure) processors 106, peripheral hardware Interface 108, radio-frequency module 110, audio-frequency module 112, display unit 114 etc..These components by one or more communication bus/ Signal wire 116 mutually communicates.
Memory 102 can be used for storage software program and module, such as the information processing method in the embodiment of the present invention and Corresponding programmed instruction/the module of device, processor 106 are stored in software program and module in memory 102 by operation, So as to perform various functions application and data processing, such as information processing method provided in an embodiment of the present invention.
Memory 102 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.Processor 106 and other possible components are to storage The access of device 102 can carry out under the control of storage control 104.
Various input/output devices are coupled to processor 106 and memory 102 by Peripheral Interface 108.In some implementations In example, Peripheral Interface 108, processor 106 and storage control 104 can be realized in one single chip.In some other reality In example, they can be realized by independent chip respectively.
Radio-frequency module 110 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with Communication network or other equipment are communicated.
Audio-frequency module 112 provides a user audio interface, it may include one or more microphones, one or more raises Sound device and voicefrequency circuit.
Display unit 114 provides a display interface between electronic equipment 100 and user.Specifically, display unit 114 Video output is shown to user, and the content of these videos output may include word, figure, video and its any combination.
It is appreciated that structure shown in Fig. 2 is only to illustrate, electronic equipment 100 may also include it is more more than shown in Fig. 2 or Less component, or there is the configuration different from shown in Fig. 2.Each component shown in Fig. 2 can use hardware, software or its Combination is realized.
The existing detection for improper flow, such as fishing website, the security for generally using detection to link, When link is judged as malicious link, forbid interacting with what this was linked.But can so miss and lose some malicious links, This will cause damages user, such as the domain name that uses of backdoor programs is born no ill will content, and general testing mechanism is difficult hair The problem of now such.
First embodiment
As Fig. 3 shows the flow chart of information processing method provided in an embodiment of the present invention.Fig. 3 is referred to, at the information Reason method includes:
Step S110:Obtain the message data for being used for being sent to purpose terminal outside.
It is understood that electronic equipment when needing outgoing message data to other-end, obtains be used for outgoing first To the message data of purpose terminal.
In embodiments of the present invention, electronic equipment can send message data after the request of response Mr. Yu's purpose terminal Message data is sent to the purpose terminal or actively to certain purpose terminal.
Certainly, the condition for sending message data to other-end is not intended as limiting in embodiments of the present invention.
In addition, in embodiments of the present invention, it is necessary to which the message data for carrying out outgoing can be electronic equipment itself storage Data.
In embodiments of the present invention, for be sent to outside the message data of purpose terminal can include body of data and should The identity information of purpose terminal.Certainly, for be sent to outside purpose terminal message data particular content in the embodiment of the present invention In be not intended as limiting.
Step S120:The identity information of the purpose terminal is obtained from the message data.
It is understood that after acquisition is used to be sent to the message data of purpose terminal outside, to prevent electronic equipment Leaking data, it is therefore desirable to judge the identity of purpose terminal, to ensure terminal of the outer purpose terminal being sent to as safety. And the judgement for purpose terminal identity needs to obtain the identity information of purpose terminal, in addition, what is obtained is used to send to the mesh The message data of terminal include the identity information of purposeful terminal, so obtaining the body of the purpose terminal from message data Part information.
Step S130:Judge whether the identity information is default identity information.
After the identity information in obtaining message data, the security of the purpose terminal is judged further according to identity information.
In embodiments of the present invention, it can be previously stored with electronic equipment and have determined as the pre- of safe purpose terminal If identity information, for judging to carry out the security of the purpose terminal of data interaction every time.
In embodiments of the present invention, default identity information can for the purpose of the corresponding URL information of terminal or purpose terminal-pair The IP address answered, port etc..Certainly, the particular content for presetting identity information is not intended as limiting in embodiments of the present invention.
In embodiments of the present invention, all default identity informations for having determined as safe purpose terminal can be set In a list, using this list as white list.White list, which can be understood as including, all has determined as safe purpose The list of the default identity information of terminal.
Therefore, in embodiments of the present invention, Fig. 4 is referred to, judges whether the identity information is that default identity information can With including:
Step S131:The white list prestored is obtained, the white list includes multiple default bodies of multiple purpose terminals Part information.
It is understood that reading the white list prestored first, which includes the multiple of multiple purpose terminals Default identity information, i.e., all default identity informations for having determined as safe purpose terminal, for the outer of acquisition The default identity information for being sent to the corresponding purpose terminal of message data of purpose terminal is verified.
Step S132:Judge the identity information whether in the multiple default identity information.
It is understood that by white list in the identity information of the corresponding purpose terminal of above-mentioned message data and step S131 In multiple default identity informations matched, when there is any default identity information purpose terminal corresponding with the message data Identity information matches, then can be determined that multiple default bodies of the identity information in white list of the corresponding purpose terminal of the message data In part information;Conversely, it then can be determined that the identity information of the corresponding purpose terminal of the message data not in the multiple pre- of white list If in identity information.
In embodiments of the present invention, when judging the identity information of the corresponding purpose terminal of the message data in white list When in multiple default identity informations, then the identity information that can be determined that the corresponding purpose terminal of the message data is that default identity is believed Breath;When judging the identity information of the corresponding purpose terminal of the message data not in multiple default identity informations of white list When, then the identity information that can be determined that the corresponding purpose terminal of the message data is not default identity information.
It is thus possible to whether the identity information for obtaining the corresponding purpose terminal of the message data is sentencing for default identity information Disconnected result.
Step S140:For it is no when, then the message data is replaced with into random string.
When step S130 judges the identity information of the corresponding purpose terminal of the message data not to preset identity information, Then represent that the purpose terminal is, for example, the malicious act that the purpose terminal obtains data there are unsafe possibility.And the report Literary data are then sent directly to the purpose terminal, may cause the leakage of data due to being original plaintext message data.Therefore Need to handle original message data, so that the purpose terminal can not obtain the real information of original message data.
In embodiments of the present invention, above-mentioned message data can be replaced with random string, which can be with For the data of plaintext.It is not original message data that it, which acts on the data for being to obtain the purpose terminal, i.e., can not obtain original The real information of data, is played in the case where purpose terminal is not know to be safety, and the data of electronic equipment outgoing are carried out Protection, prevents the leaking data of electronic equipment.
In embodiments of the present invention, step S130 judging result be the corresponding purpose terminal of the message data identity Information is default identity information, then it is to have determined as safe purpose terminal that can determine the purpose terminal, therefore can be straight Connect and send original message data to the purpose terminal.I.e. in embodiments of the present invention, the body is judged in step s 130 Whether part information is that the information processing method further includes after presetting identity information:When identity information is default identity information, Message data in step S110 is sent to the purpose terminal.
It is thus possible to reduce the processing to sending the message data to the purpose terminal of the default identity information in white list Flow, rather than the message data of all outgoings is all handled, improve the efficiency of data transfer.
Step S150:The random string is sent to the purpose terminal.
In embodiments of the present invention, after message data is replaced with random string, then the random string sent To the corresponding purpose terminal of the message data.So that after the follow-up purpose terminal obtains random string, can not obtain original The corresponding real information of message data, so as to be protected to the data of electronic equipment, which can not be obtained original Message data.
In embodiments of the present invention, random string is being sent to the corresponding purpose terminal of above-mentioned message data, The information processing method can also include:
The purpose terminal is associated with the action for replacing the message data, obtains correspondence;By described in Correspondence is stored in the daily record of record replacement action.
It is understood that the action being replaced to message data and the correspondence of the purpose terminal can be stored In the daily record of record replacement action, follow-up management person is set to know that the purpose terminal has the record for obtaining message data.
Additionally, there are real user to need from electronic equipment acquisition data, but the corresponding purpose terminal of the user Identity information be not default identity information situation.
In the existing safe O&M for Intranet, mainly in Intranet application addition firewall policy, firewall policy Access beyond white list will all be forbidden, and network administrator for addition white list when due to the application of user in do not have Documentary, so the application approval of white list is very easy to malfunction, so as to cause the security of Intranet to reduce.
Therefore, purpose terminal, can in the corresponding customer requirement retrieval data of purpose terminal after random string is obtained To propose to add the purpose terminal into the application of white list.So as to which in embodiments of the present invention, which can be with Including:
The identity information addition request that the purpose terminal is sent is obtained, the identity information addition request includes the body Part information and the random string;Obtain the addition determine instruction that user adds request input based on the identity;Response The addition determine instruction, is stored the identity information as default identity information.
It is understood that the corresponding user of purpose terminal can be whole using the purpose by voucher of above-mentioned random string End sends identity information addition request, and identity information addition request includes the identity information and random words of the purpose terminal Symbol string.It is thus possible to obtain the identity information addition request of purpose terminal transmission, then audited by auditor Afterwards, the addition determine instruction of auditor's input is obtained, then responds the addition determine instruction, identity information is stored in default body In the corresponding list of white list of part information.
Mode of such a addition identity information in white list, it is default that white list addition can be made, which to add identity information, Identity information, documentary may determine that whether random string and the character string sent before are consistent as support, auditor, To determine whether to add, do not allow auditor error-prone.Also, what documentary can make identity information has been added with evidence, Can be to avoid the phenomenon of maliciously addition identity information.
In embodiments of the present invention, each addition and addition request can be bound, and is recorded.Therefore, should Information processing method can also include:
The identity information is added request to associate with the action of the response addition determine instruction, obtains first pair It should be related to;First correspondence is stored in the daily record of the action of the default identity information of record addition.
It is understood that identity information addition request and the correspondence of the action of corresponding addition determine instruction are carried out Record, can make identity information addition leave record, and the behavior of auditor's malice addition identity information data can occurring Found during leakage.
In embodiments of the present invention, when repeatedly occurring in encrypted logs, same purpose terminal is corresponding to replace message data Move when making, that is, represent that the purpose terminal repeatedly obtains the application that identity information is not all added after random string, should Purpose terminal is probably then unsafe purpose terminal, such as the malicious peer of script is installed etc..Therefore, can forbid with being somebody's turn to do The data interaction of purpose terminal, directly avoids the access of malice, improves the treatment effeciency of electronic equipment.
It is only right when the information processing method that first embodiment of the invention provides sends out message data to other purposes terminal outside The message data of the outer corresponding purpose terminal of identity information being sent to outside white list is replaced as outgoing again after random string, The message data for the corresponding purpose terminal of identity information being externally sent in white list directly carries out outer without replacing Hair, while so as to improve data transmission efficiency, it is possible to achieve the protection for outgoing message data, prevents electronic equipment Data leakage.Furthermore it is also possible to random string is used to add identity information in the white list for presetting identity information Apply for voucher, do not allow addition of the auditor for white list error-prone, in addition also leave the relative recording of application voucher, just In searching when something goes wrong problem owner.
Second embodiment
Second embodiment of the invention provides a kind of information processor 300, refers to Fig. 5, described information processing unit 300, which include message, obtains module 310, information acquisition module 320, signal judgement module 330, replaces execution module 340 and the One sending module 350.Wherein, the message obtains module 310 and is used to obtain the message data for being used for being sent to purpose terminal outside;Institute State the identity information that information acquisition module 320 is used to obtain the purpose terminal from the message data;Described information judges Module 330 is used to judge whether the identity information is default identity information;The replacement execution module 340 is used in the body When part information is to preset identity information, then the message data is replaced with into random string;First sending module 350 For sending the random string to the purpose terminal.
In embodiments of the present invention, Fig. 6 is referred to, described information judgment module 330 can include list acquiring unit 331 And judge execution unit 332.Wherein, the list acquiring unit 331 is used to obtain the white list prestored, the white name Single multiple default identity informations for including multiple purpose terminals;The judgement execution unit 332 is used to judge the identity information Whether in the multiple default identity information.
In embodiments of the present invention, described information processing unit 330 can also include the second sending module, second hair Module is sent to be used to, when the identity information is default identity information, the message data is sent to the purpose terminal.
In embodiments of the present invention, described information processing unit 330 can also include acquisition request module, instruction obtains mould Block and instruction respond module.Wherein, the acquisition request module adds for obtaining the identity information that the purpose terminal is sent Add request, the identity information addition request includes the identity information and the random string;Described instruction obtains mould Block is used to obtain the addition determine instruction that user adds request input based on the identity;Described instruction respond module is used to respond The addition determine instruction, is stored the identity information as default identity information.
In embodiments of the present invention, described information processing unit 330 can also include the first relation and obtain module and the One relationship storage module.Wherein, first relation obtains module and is used for identity information addition request and the response The action association of the addition determine instruction, obtains the first correspondence;First relationship storage module is used for described the One correspondence is stored in the daily record of the action of the default identity information of record addition.
In embodiments of the present invention, described information processing unit 300 can also include:Second relation obtains module and the Two relationship storage modules, wherein, second relation obtain module be used for by the purpose terminal with it is described by the message number Associated according to the action of replacement, obtain correspondence;Second relationship storage module is used to the correspondence being stored in note In the daily record for recording replacement action.
3rd embodiment
Third embodiment of the invention provides a kind of electronic equipment 100, refers to Fig. 2, and the electronic equipment 100 includes depositing Reservoir 102 and processor 106, the memory 102 are stored with computer instruction, when the computer instruction is by the processor 106 read and when performing, and the processor 106 is performed the information processing method that first embodiment of the invention provides.
Fourth embodiment
Fourth embodiment of the invention provides a kind of storage medium, and computer instruction is stored with the storage medium, its In, the computer instruction performs the information processing method of first embodiment of the invention offer when being read and running.
In conclusion information processing method provided in an embodiment of the present invention, device, electronic equipment and storage medium, pass through The message data for being used for being sent to purpose terminal outside is obtained, the identity information of the purpose terminal is then obtained from the message data, Judge whether the identity information is default identity information again, for it is no when, then the message data is added based on predetermined encryption algorithm It is close, encrypted message data is obtained, finally sends the encrypted message data to the purpose terminal.So as to the information processing Method can realize that the flow for being externally sent to the purpose terminal for not being default identity information is encrypted, and prevent the number of electronic equipment According to leakage.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For device class embodiment, since it is substantially similar to embodiment of the method, so description is fairly simple, related part ginseng See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through it Its mode is realized.Device embodiment described above is only schematical, for example, the flow chart and block diagram in attached drawing are shown Device, architectural framework in the cards, the work(of method and computer program product of multiple embodiments according to the present invention are shown Can and it operate.At this point, each square frame in flow chart or block diagram can represent one of a module, program segment or code Point, a part for the module, program segment or code includes one or more and is used for realization the executable of defined logic function Instruction.It should also be noted that at some as in the implementation replaced, the function of being marked in square frame can also be with different from attached The order marked in figure occurs.For example, two continuous square frames can essentially perform substantially in parallel, they also may be used sometimes To perform in the opposite order, this is depending on involved function.It is it is also noted that each in block diagram and/or flow chart The combination of square frame and the square frame in block diagram and/or flow chart, function or the dedicated of action can be based on as defined in execution The system of hardware is realized, or can be realized with the combination of specialized hardware and computer instruction.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server, or network equipment etc.) perform all or part of step of each embodiment the method for the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.Need Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, without necessarily requiring or implying there are any this reality between these entities or operation The relation or order on border.Moreover, term " comprising ", "comprising" or its any other variant are intended to the bag of nonexcludability Contain, so that process, method, article or equipment including a series of elements not only include those key elements, but also including Other elements that are not explicitly listed, or further include as elements inherent to such a process, method, article, or device. In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including the key element Process, method, also there are other identical element in article or equipment.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this area For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exists Similar terms is represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, is then not required in subsequent attached drawing It is further defined and is explained.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention answers the scope of the claims of being subject to.

Claims (10)

  1. A kind of 1. information processing method, it is characterised in that the described method includes:
    Obtain the message data for being used for being sent to purpose terminal outside;
    The identity information of the purpose terminal is obtained from the message data;
    Judge whether the identity information is default identity information;
    For it is no when, then the message data is replaced with into random string;
    The random string is sent to the purpose terminal.
  2. 2. according to the method described in claim 1, it is characterized in that, described judge whether the identity information is default identity letter Breath, including:
    The white list prestored is obtained, the white list includes multiple default identity informations of multiple purpose terminals;
    Judge the identity information whether in the multiple default identity information.
  3. 3. according to the method described in claim 1, it is characterized in that, judging whether the identity information is default identity information Afterwards, the method further includes:
    When to be, the message data is sent to the purpose terminal.
  4. 4. according to the method described in any claim in claim 1-3, it is characterised in that by the random string send to After the purpose terminal, the method further includes:
    The identity information addition request that the purpose terminal is sent is obtained, the identity information addition request includes the identity letter Breath and the random string;
    Obtain the addition determine instruction that user adds request input based on the identity;
    The addition determine instruction is responded, is stored the identity information as default identity information.
  5. 5. according to the method described in claim 4, it is characterized in that, described respond the addition determine instruction, by the purpose After the identity information of terminal is stored as default identity information, the method further includes:
    The identity information is added request to associate with the action of the response addition determine instruction, acquisition first, which corresponds to, closes System;
    First correspondence is stored in the daily record of the action of the default identity information of record addition.
  6. 6. according to the method described in any claim in claim 1-3, it is characterised in that by the random string send to After the purpose terminal, the method further includes:
    The purpose terminal is associated with the action for replacing the message data, obtains correspondence;
    The correspondence is stored in the daily record of record replacement action.
  7. 7. a kind of information processor, it is characterised in that described device includes message and obtains module, information acquisition module, information Judgment module, replace execution module and the first sending module, wherein,
    The message obtains module and is used to obtain the message data for being used for being sent to purpose terminal outside;
    Described information obtains the identity information that module is used to obtain the purpose terminal from the message data;
    Described information judgment module is used to judge whether the identity information is default identity information;
    The replacement execution module is used to when the identity information is not to preset identity information, then replace the message data For random string;
    First sending module is used to send the random string to the purpose terminal.
  8. 8. device according to claim 7, it is characterised in that described information judgment module include list acquiring unit with And judge execution unit, wherein,
    The list acquiring unit is used to obtain the white list prestored, and the white list includes the multiple of multiple purpose terminals Default identity information;
    It is described to judge that execution unit is used to judge the identity information whether in the multiple default identity information.
  9. 9. a kind of electronic equipment, it is characterised in that the electronic equipment includes memory and processor, and the memory storage has Computer instruction, when the computer instruction is read and performed by the processor, the processor is performed right such as will Seek the method described in any claim in 1-6.
  10. A kind of 10. storage medium, it is characterised in that computer instruction is stored with the storage medium, wherein, the computer Instruct the method performed when being read and running as described in any claim in claim 1-6.
CN201711266446.9A 2017-12-05 2017-12-05 Information processing method, device, electronic equipment and storage medium Pending CN107995198A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711266446.9A CN107995198A (en) 2017-12-05 2017-12-05 Information processing method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711266446.9A CN107995198A (en) 2017-12-05 2017-12-05 Information processing method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN107995198A true CN107995198A (en) 2018-05-04

Family

ID=62035601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711266446.9A Pending CN107995198A (en) 2017-12-05 2017-12-05 Information processing method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN107995198A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659490A (en) * 2019-09-20 2020-01-07 哈尔滨安天科技集团股份有限公司 Malicious sample processing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796262A (en) * 2015-04-27 2015-07-22 上海青橙实业有限公司 Data encryption method and terminal system
US20160021610A1 (en) * 2014-07-17 2016-01-21 Xiaomi Inc. Network connection method and apparatus
CN106789983A (en) * 2016-12-08 2017-05-31 北京安普诺信息技术有限公司 A kind of CC attack defense methods and its system of defense
CN107295017A (en) * 2017-08-10 2017-10-24 四川长虹电器股份有限公司 CC means of defences based on user authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160021610A1 (en) * 2014-07-17 2016-01-21 Xiaomi Inc. Network connection method and apparatus
CN104796262A (en) * 2015-04-27 2015-07-22 上海青橙实业有限公司 Data encryption method and terminal system
CN106789983A (en) * 2016-12-08 2017-05-31 北京安普诺信息技术有限公司 A kind of CC attack defense methods and its system of defense
CN107295017A (en) * 2017-08-10 2017-10-24 四川长虹电器股份有限公司 CC means of defences based on user authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659490A (en) * 2019-09-20 2020-01-07 哈尔滨安天科技集团股份有限公司 Malicious sample processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103607385B (en) Method and apparatus for security detection based on browser
CN104426885B (en) Abnormal account providing method and device
CN104348809B (en) network security monitoring method and system
CN103891242B (en) System and method for profile based filtering of outgoing information in a mobile environment
CN107888671A (en) A kind of information-pushing method and device
CN103368957B (en) Method and system that web page access behavior is processed, client, server
CN104468592B (en) Login method and login system
GB2507360A (en) Threat detection through the accumulated detection of threat characteristics
CN107015996A (en) A kind of resource access method, apparatus and system
CN104184705A (en) Verification method, apparatus, server, user data center and system
CN109937564A (en) The fraudulent account detected in distributed computing system uses
CN108259619A (en) Network request means of defence and network communicating system
CN106993009A (en) A kind of method and apparatus for loading webpage in a browser
CN107104924A (en) The verification method and device of website backdoor file
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
Kaur et al. Browser fingerprinting as user tracking technology
CN104216911A (en) Browse tracking method and device
CN107733853A (en) Page access method, apparatus, computer and medium
CN107332804A (en) The detection method and device of webpage leak
Liccardi et al. Improving mobile app selection through transparency and better permission analysis
Liccardi et al. Improving user choice through better mobile apps transparency and permissions analysis
CN107896210A (en) Safety protecting method, device, server and storage medium
CN106325993A (en) Freezing method of application program and terminal
CN112528181B (en) Two-dimensional code management method, device, computer equipment and readable storage medium
US10686834B1 (en) Inert parameters for detection of malicious activity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd.

Address before: Room 803, Jinwei Building, 55 Lanindichang South Road, Haidian District, Beijing

Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504

RJ01 Rejection of invention patent application after publication