CN108073820A - Security processing, device and the mobile terminal of data - Google Patents
Security processing, device and the mobile terminal of data Download PDFInfo
- Publication number
- CN108073820A CN108073820A CN201711203588.0A CN201711203588A CN108073820A CN 108073820 A CN108073820 A CN 108073820A CN 201711203588 A CN201711203588 A CN 201711203588A CN 108073820 A CN108073820 A CN 108073820A
- Authority
- CN
- China
- Prior art keywords
- data
- pending
- pending data
- processing
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The application, which provides a kind of security processing of data, device and mobile terminal, this method, to be included:The processing request of user is obtained, processing request includes handling the identification information of type, pending data and pending data;According to the identification information of pending data and/or pending data, judge whether pending data is private data;If it is determined that pending data is private data, then pending data is encrypted using Encryption Algorithm, obtains encryption data;Encryption data is carried out and handles that type is corresponding handles.It realizes to encrypted data is needed to be encrypted, to other non-private datas then without encryption, data-handling efficiency is improved on the basis of assuring data security.
Description
Technical field
This application involves a kind of field of communication technology more particularly to security processing of data, device and mobile terminals.
Background technology
With the rapid development of network communication technology, mobile phone essential communication or amusement work in having become for people's lives
Tool.
Since user can be passed by many daily life events of handset processes, such as the purchase of mobile-phone payment, mobile phone, mobile phone
It delivers letters breath or file etc., the private data of user can be related to, for secure user data, when user carries out data sending, lead to
All data of user can be often encrypted.Cause ciphering process slow, treatment effeciency is relatively low, user experience compared with
Difference.Therefore, the technical issues of safe handling efficiency and the user experience of data are as urgent need to resolve how is effectively improved.
The content of the invention
The application provides a kind of security processing of data, device and mobile terminal, to solve prior art data
The defects such as safe handling efficiency is low.
The application the first aspect provides a kind of security processing of data, including:
The processing request of user is obtained, the processing request includes handling type, pending data and pending data
Identification information;
According to the identification information of the pending data and/or the pending data, judge that the pending data is
No is private data;
If it is determined that the pending data is private data, then the pending data is encrypted using Encryption Algorithm
Processing obtains encryption data;
The encryption data is carried out to handle that type is corresponding handles with described.
Further aspect of the application provides a kind of secure processing device of data, including:
Acquisition module, for obtain the processing of user request, it is described processing request include processing type, pending data and
The identification information of pending data;
Judgment module, for the identification information according to the pending data and/or the pending data, described in judgement
Whether pending data is private data;
Encrypting module, for if it is determined that the pending data be private data, then wait to locate to described using Encryption Algorithm
Reason data are encrypted, and obtain encryption data;
Processing module, for carrying out handling that type is corresponding handles with described to the encryption data.
Another aspect of the application provides a kind of mobile terminal, including:Device as described above.
Security processing, device and the mobile terminal of data provided in this embodiment, by according to the pending number
According to and/or the identification information of the pending data determine private data, and carry out phase again after private data is encrypted
The processing answered is realized to encrypted data is needed to be encrypted, and to other non-private datas then without encryption, is ensureing data
Data-handling efficiency is improved on the basis of security.
Description of the drawings
It in order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this Shen
Some embodiments please, for those of ordinary skill in the art, without having to pay creative labor, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of the security processing for the data that one embodiment of the application provides;
Fig. 2 is the structure diagram of the secure processing device for the data that one embodiment of the application provides.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical solution in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
All other embodiments obtained without creative efforts shall fall in the protection scope of this application.
Embodiment one
The present embodiment provides a kind of security processing of data, for carrying out safe handling to the data of user.This reality
The executive agent for applying example is the secure processing device (hereinafter referred to as device) of data, which can be set in the terminal,
Such as the terminal that mobile phone, tablet computer etc. can carry out data transmission or data preserve.Following embodiment by taking mobile phone as an example into
Row is described in detail.
As shown in Figure 1, the flow diagram of the security processing for data provided in this embodiment, this method include:
Step 101, the processing request of user is obtained, processing request includes handling type, pending data and pending number
According to identification information.
Step 102, according to the identification information of pending data and/or pending data, judge pending data whether be
Private data.
Step 103, however, it is determined that pending data is private data, then pending data is encrypted using Encryption Algorithm
Processing obtains encryption data.
Step 104, encryption data is carried out and handles that type is corresponding handles.
Which kind of specifically, when user will be sent by mobile phone or preserve data, either sent out by the application on mobile phone
Send or preserve, such as short message, wechat, QQ, various purchase APP etc., when user input text, typing voice, addition picture or
After video, click on send or preserve, then have issued processing request, the processing request include processing type, pending data and
The identification information of pending data, wherein, processing type can include sending processing and preservation processing.The safe handling dress of data
It puts, the processing request of user can be obtained, after processing request is got, first have to judge whether pending data is secret
Whether data, which need, is encrypted.It can specifically be judged according to pending data, it can also be according to pending data
Identification information judges.
Illustratively, when user set some contact artificial private contact (will the contact person title or mobile phone
Sensitive dictionary is preset in the additions such as number), then all communication datas of user and the contact person all will be private data, then basis should
The identification information as its communication data such as the title of contact person or phone number, when the device detects that user is to be sent or treats
When the identification information of the data of preservation is the title or phone number of the private contact, then it may determine that the pending data is
Private data.If user does not set the artificial private contact of the contact for another example, when user will send or preserve data
When, whether which then detects in pending data content comprising the sensitive content in default sensitive dictionary, if comprising sentencing
The pending data of breaking is private data.It should be noted that being only exemplary explanation here, not it is limited.
When definite pending data be private data, then pending data is encrypted using Encryption Algorithm, obtained
Encryption data, and encryption data is carried out and handles that type is corresponding handles, such as the processing class asked when the processing of user
Type then carries out preservation processing to preserve type.
Optionally, Encryption Algorithm can include DES Cipher, 3DES, international data encryption algorithm IDEA, advanced
One or more in Encryption Standard AES and Message Digest Algorithm 5 MD5.It can be with can arbitrarily to implement in the prior art
Encryption Algorithm, do not limit herein.
The security processing of data provided in this embodiment, by according to pending data and/or pending data
Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add
Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security
According to treatment effeciency.
Embodiment two
The present embodiment does further supplementary notes to the security processing for the data that embodiment one provides.
As a kind of enforceable mode, on the basis of above-described embodiment one, optionally, when processing type is at preservation
During reason, then encryption data is carried out and handle that type is corresponding handles, including:By encryption data and encryption data and mark
The correspondence of information stores the secret memory space to user;Alternatively, when handling type to send processing, then to encrypting number
According to carrying out and handle that type is corresponding handles, including:Encryption data is subjected to transmission processing, and by encryption data and encrypts number
According to the secret memory space with the correspondence of identification information storage to user.
Specifically, it is one secret memory space of user setting in the memory space of user mobile phone, for storing user
Private data, the private data in the secret memory space do not open the various applications in mobile phone, i.e., respectively answering in mobile phone
With the private data that cannot access in the secret memory space, except non-user authorizes it.For example user sets contact person
Zhang San is private contact, and all data that user communicates with Zhang San are stored in secret memory space, such as short message, in short message
The short message that the two is sent out is not can be appreciated that in.When user will send short message to Zhang San, user opens short message application, and input is treated
The information of transmission is clicked on after sending, which then first determines whether the information to be sent is private data, since user will open
Three have been set to private contact, i.e., the name of Zhang San or cell-phone number are added default sensitive dictionary, which can then pass through
Recipient's (identification information) of the information to be sent judges the information to be sent for private data with default sensitive word storehouse matching,
Then the data to be sent are encrypted, obtain encryption data, encryption data is subjected to transmission processing again, and after transmission will
The encryption data is stored to secret memory space, and will not retain the encryption data in mobile phone public memory space.In short message
Application has sent or has received the short message record that not can be appreciated that user and Zhang San in list.It is also in this way, user to preserve processing
It clicks on after preserving, which judges whether information to be saved is private information, if being then saved in secret memory space.
Optionally, which can open a secret entrance to user, gather the verification information of user, than
Such as user fingerprints or other verification modes, user is by can then check the secret in the secret memory space after fingerprint authentication
Data.User can also access other application mandate the permission of the secret memory space.Other application then can be with after mandate
Access the private data in the secret memory space.Therefore, the administration authority of private data is completely being held in user oneself hand,
Substantially increase Information Security and user experience.
As another enforceable mode, on the basis of above-described embodiment one, optionally, pending data is text
Data, voice data, image data or video data;Then according to the identification information of pending data and/or pending data, sentence
Whether disconnected pending data is private data, including:
It is and pre- according to the identification information of pending data and/or pending data if pending data is text data
If sensitive dictionary is matched, judge whether pending data is private data;
If pending data is voice data, corresponding textual data is converted voice data to using speech recognition algorithm
According to being matched with default sensitive dictionary, judge whether pending data is private data;
If pending data is image data, according to the identification information of pending data and/or pending data, use
Image recognition algorithm is matched with default example image storehouse, judges whether pending data is private data;
If pending data is video data, video data is subjected to sub-frame processing, the image data per frame is obtained, adopts
It is matched with image recognition algorithm with default example image storehouse, judges whether pending data is private data.
Specifically, for text data, sensitive dictionary can be pre-set, be provided with some sensitive vocabulary samples or
User's content to be protected after processing request is got, is then believed according to the mark of pending data and/or pending data
Breath is matched with default sensitive dictionary, judges whether pending data is private data.
Illustratively, when user set some contact artificial private contact (will the contact person title or mobile phone
Sensitive dictionary is preset in the additions such as number), then all communication datas of user and the contact person all will be private data, then basis should
The identification information as its communication data such as the title of contact person or phone number, when the device detects that user is to be sent or treats
When the identification information of the data of preservation is the title or phone number of the private contact, then it may determine that the pending data is
Private data.If user does not set the artificial private contact of the contact for another example, when user will send or preserve data
When, whether which then detects in pending data content comprising the sensitive content in default sensitive dictionary, if comprising sentencing
The pending data of breaking is private data.
If pending data is voice data, corresponding textual data is converted voice data to using speech recognition algorithm
According to, and using the determination methods of above-mentioned text data, matched with default sensitive dictionary, judge whether pending data is private
Ciphertext data, details are not described herein.Wherein, speech recognition algorithm can be that arbitrary enforceable speech recognition is calculated in the prior art
Method converts voice data to text data, does not limit specifically.
If pending data is image data, example image storehouse can be pre-set, is set in default example image storehouse
Some example pictures are put, using the individual features of image recognition algorithm extraction image, according to pending data and/or pending number
According to identification information, matched, judged pending with the characteristics of image in default example image storehouse using image recognition algorithm
Whether data are private data.Specific image recognition algorithm can be arbitrary enforceable algorithm in the prior art, herein not
It limits.
Illustratively, the image of someone or something are provided in advance, when including picture in the data for sending or preserving, are used
Image recognition algorithm extracts the characteristic information of picture and existing someone or something in default example image storehouse in pending data
The feature of image whether match, if matching, judges the pending data for private data.
If pending data is video data, video data is subjected to sub-frame processing, the image data per frame is obtained, adopts
Judged with the determination methods of above-mentioned image data, i.e., matched using image recognition algorithm with default example image storehouse,
Judge whether pending data is private data.Details are not described herein.Wherein, it is to the method for video data progress sub-frame processing
The prior art does not limit herein.
Optionally, this method can also include:
The default sensitive dictionary of expansion of user or the expansion request in default example image storehouse are obtained, expanding request includes one
Or multiple sensitive words to be increased or including one or more example images;It is asked according to expanding, to default sensitive dictionary or pre-
If example image storehouse carries out expansion processing.
Specifically, default sensitivity dictionary and default example image figure are not unalterable, it can be by user at any time
Expand, can also at any time delete original sensitive word in storehouse or example image.It can specifically need to be configured according to user.When
When user wants to expand default sensitive dictionary or default example image storehouse, which can provide visualization to the user and expand boundary
Face, user input new sensitive word at interface or add new example image, click on the corresponding button for expanding mark and then have sent
Expand request, after which gets the expansion request of user, then expansion processing is carried out according to expansion request, user will be increased
New sensitive word or new example image be added in default sensitive dictionary or default example image storehouse.Equally can be user
Deletion or other management operations are provided.Details are not described herein.
Optionally, if pending data is text data, believed according to the mark of pending data and/or pending data
Breath is matched with default sensitive dictionary, judges whether pending data is private data, including:
If pending data is text data, text judgment models are established using nearest public ancestors LCA algorithms, are used
Default sensitivity dictionary is trained text judgment models, obtains text training pattern;Using text training pattern, judge to wait to locate
Manage whether data are private data;
If pending data is image data, according to the identification information of pending data and/or pending data, use
Image recognition algorithm is matched with default example image storehouse, judges whether pending data is private data, including:
If pending data is image data, establishes picture using bag of words BoW (Bag of Words, bag of words) algorithm and sentence
Disconnected model, using SIFT (Scale-invariant feature transform, Scale invariant features transform)) algorithm generation
The feature vector of picture is clustered using K average K-means algorithms, obtains picture training pattern;Using picture training mould
Type judges whether pending data is private data.
Specifically, judgment models can be established, judgment models are trained, trained model then may be employed
Judge whether pending data is private data.
For text data, nearest public ancestors LCA algorithms may be employed and establish text judgment models, using default sensitivity
Dictionary is trained text judgment models, obtains text training pattern;Using text training pattern, judge that pending data is
No is private data.Wherein, public ancestors LCA algorithms are algorithm of the prior art recently, and details are not described herein.
For image data, it may be employed and picture judgment models are established using bag of words BoW algorithms, using scale invariant feature
The feature vector of SIFT algorithms generation picture is converted, is clustered using K average K-means algorithms, obtains picture training pattern;
Using picture training pattern, judge whether pending data is private data.Wherein, BoW algorithms, SIFT algorithms and K-means
Algorithm all can be algorithm of the prior art, details are not described herein.
Optionally, this method can also include:
Obtain the access request that user accesses secret memory space, the verification information of access request including user and to be visited
The corresponding identification information of encryption data,
The access rights of user are verified according to the verification information of user;
If verification result is by according to the corresponding identification information of encryption data to be visited, being solved to encryption data
It is close, and carry out display processing.
It should be noted that each enforceable mode can individually be implemented in the present embodiment, mode can also be combined
With reference to implementation, do not limit herein.
The security processing of data provided in this embodiment, by according to pending data and/or pending data
Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add
Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security
According to treatment effeciency.
Embodiment three
The present embodiment provides a kind of secure processing device of data, for performing the peace of the data of the offer of above-described embodiment one
Full processing method.
As shown in Fig. 2, the structure diagram of the secure processing device for data provided in this embodiment.The safety of the data
Processing unit 30 includes acquisition module 31, judgment module 32, encrypting module 33 and processing module 34.
Wherein, acquisition module 31 is used to obtain the processing request of user, and processing request includes handling type, pending data
With the identification information of pending data;Judgment module 32 is used for the identification information according to pending data and/or pending data,
Judge whether pending data is private data;Encrypting module 33 be used for if it is determined that pending data be private data, then use
Pending data is encrypted in Encryption Algorithm, obtains encryption data;Processing module 34 be used for encryption data carry out with
Processing type is handled accordingly.
Device in this present embodiment is closed, wherein modules perform the concrete mode of operation in related this method
It is described in detail in embodiment, explanation will be not set forth in detail herein.
The secure processing device of data provided in this embodiment, by according to pending data and/or pending data
Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add
Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security
According to treatment effeciency.
Example IV
The present embodiment does further supplementary notes to the secure processing device for the data that above-described embodiment three provides.
As a kind of enforceable mode, on the basis of above-described embodiment three, optionally, processing module 34 is specifically used
In:
When handling type to preserve processing, the correspondence of encryption data and encryption data and identification information is deposited
Store up the secret memory space of user;Alternatively, when handling type to send processing, encryption data is subjected to transmission processing, and
By the secret memory space of the correspondence of encryption data and encryption data and identification information storage to user.
As another enforceable mode, on the basis of above-described embodiment three, optionally, pending data is text
Data, voice data, image data or video data;Then judgment module 32 is specifically used for:
It is and pre- according to the identification information of pending data and/or pending data if pending data is text data
If sensitive dictionary is matched, judge whether pending data is private data;
If pending data is voice data, corresponding textual data is converted voice data to using speech recognition algorithm
According to being matched with default sensitive dictionary, judge whether pending data is private data;
If pending data is image data, according to the identification information of pending data and/or pending data, use
Image recognition algorithm is matched with default example image storehouse, judges whether pending data is private data;
If pending data is video data, video data is subjected to sub-frame processing, the image data per frame is obtained, adopts
It is matched with image recognition algorithm with default example image storehouse, judges whether pending data is private data.
Optionally, acquisition module 31 is additionally operable to obtain the default sensitive dictionary of expansion of user or the expansion in default example image storehouse
Request is filled, expanding request includes one or more sensitive words to be increased or including one or more example images;Processing module
34 are additionally operable to, according to request is expanded, expansion processing be carried out to default sensitive dictionary or default example image storehouse.
Optionally, judgment module 32 is specifically used for:
If pending data is text data, text judgment models are established using nearest public ancestors LCA algorithms, are used
Default sensitivity dictionary is trained text judgment models, obtains text training pattern;Using text training pattern, judge to wait to locate
Manage whether data are private data;
If pending data is image data, picture judgment models are established using bag of words BoW algorithms, using Scale invariant
Eigentransformation SIFT algorithms generate the feature vector of picture, are clustered using K average K-means algorithms, obtain picture training
Model;Using picture training pattern, judge whether pending data is private data.
It should be noted that each enforceable mode can individually be implemented in the present embodiment, mode can also be combined
With reference to implementation, do not limit herein.
Device in this present embodiment is closed, wherein modules perform the concrete mode of operation in related this method
It is described in detail in embodiment, explanation will be not set forth in detail herein.
The secure processing device of data provided in this embodiment, by according to pending data and/or pending data
Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add
Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security
According to treatment effeciency.
Embodiment five
The present embodiment provides a kind of mobile terminal, for performing the safe handling side for the data that any of the above-described embodiment provides
Method.
The mobile terminal can include the secure processing device for the data that any of the above-described embodiment provides.
Device in this present embodiment is closed, wherein modules perform the concrete mode of operation in related this method
It is described in detail in embodiment, explanation will be not set forth in detail herein.
Mobile terminal provided in this embodiment, it is true by the identification information according to pending data and/or pending data
Make private data, and handled accordingly again after private data is encrypted, realize to need encrypted data into
Row encryption to other non-private datas then without encryption, improves data-handling efficiency on the basis of assuring data security.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied
It closes or is desirably integrated into another system or some features can be ignored or does not perform.It is another, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or unit
Letter connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list
The form that hardware had both may be employed in member is realized, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, is used including some instructions so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) perform the present invention
The part steps of embodiment the method.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
The medium of program code can be stored.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each function module
Division progress for example, in practical application, can be complete by different function modules by above-mentioned function distribution as needed
Into the internal structure of device being divided into different function modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
Claims (10)
1. a kind of security processing of data, which is characterized in that including:
The processing request of user is obtained, the processing request includes handling the mark of type, pending data and pending data
Information;
According to the identification information of the pending data and/or the pending data, judge the pending data whether be
Private data;
If it is determined that the pending data is private data, then place is encrypted to the pending data using Encryption Algorithm
Reason obtains encryption data;
The encryption data is carried out to handle that type is corresponding handles with described.
2. according to the method described in claim 1, it is characterized in that, when it is described processing type for preserve processing when, then to described
Encryption data carries out handling that type is corresponding handles with described, including:By the encryption data and the encryption data and institute
The correspondence storage of identification information is stated to the secret memory space of the user;Alternatively,
When the processing type is sends processing, then the encryption data is carried out handling that type is corresponding handles with described,
Including:The encryption data is subjected to transmission processing, and the encryption data and the encryption data are believed with the mark
The correspondence of breath stores the secret memory space to the user.
3. according to the method described in claim 1, it is characterized in that, the pending data is text data, voice data, figure
Sheet data or video data;The then identification information according to the pending data and/or the pending data, judges institute
State whether pending data is private data, including:
If the pending data is text data, according to the pending data and/or the mark of the pending data
Information is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is voice data, the voice data is converted by corresponding text using speech recognition algorithm
Notebook data is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is image data, according to the pending data and/or the mark of the pending data
Information is matched using image recognition algorithm with default example image storehouse, judges whether the pending data is secret number
According to;
If the pending data is video data, the video data is subjected to sub-frame processing, obtains the picture number per frame
According to being matched using image recognition algorithm with default example image storehouse, judge whether the pending data is private data.
4. it according to the method described in claim 3, it is characterized in that, further includes:
Obtain the expansion default sensitive dictionary of the user or the expansion request in the default example image storehouse, the expansion
Request includes one or more sensitive words to be increased or including one or more example image;
It is asked according to described expand, expansion processing is carried out to the default sensitive dictionary or the default example image storehouse.
If 5. according to the method described in claim 3, it is characterized in that, the pending data be text data, root
According to the identification information of the pending data and/or the pending data, matched with default sensitive dictionary, described in judgement
Whether pending data is private data, including:
If the pending data is text data, text judgment models are established using nearest public ancestors LCA algorithms, are used
Default sensitivity dictionary is trained the text judgment models, obtains text training pattern;Using text training pattern, judge
Whether the pending data is private data;
If the pending data is image data, according to the pending data and/or the pending data
Identification information is matched using image recognition algorithm with default example image storehouse, judges whether the pending data is private
Ciphertext data, including:
If the pending data is image data, picture judgment models are established using bag of words BoW algorithms, using Scale invariant
Eigentransformation SIFT algorithms generate the feature vector of picture, are clustered using K average K-means algorithms, obtain picture training
Model;Using picture training pattern, judge whether the pending data is private data.
6. a kind of secure processing device of data, which is characterized in that including:
Acquisition module, for obtaining the processing of user request, the processing request includes handling type, pending data and waits to locate
Manage the identification information of data;
Judgment module for the identification information according to the pending data and/or the pending data, is waited to locate described in judgement
Manage whether data are private data;
Encrypting module, for if it is determined that the pending data is private data, then using Encryption Algorithm to the pending number
According to being encrypted, encryption data is obtained;
Processing module, for carrying out handling that type is corresponding handles with described to the encryption data.
7. device according to claim 6, which is characterized in that the processing module is specifically used for:
When the processing type is preserves processing, by the encryption data and the encryption data and the identification information
Correspondence storage to the user secret memory space;Alternatively,
When the processing type is sends processing, the encryption data is subjected to transmission processing, and by the encryption data with
And the correspondence of the encryption data and the identification information stores the secret memory space to the user.
8. device according to claim 6, which is characterized in that the pending data is text data, voice data, figure
Sheet data or video data;The then judgment module, is specifically used for:
If the pending data is text data, according to the pending data and/or the mark of the pending data
Information is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is voice data, the voice data is converted by corresponding text using speech recognition algorithm
Notebook data is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is image data, according to the pending data and/or the mark of the pending data
Information is matched using image recognition algorithm with default example image storehouse, judges whether the pending data is secret number
According to;
If the pending data is video data, the video data is subjected to sub-frame processing, obtains the picture number per frame
According to being matched using image recognition algorithm with default example image storehouse, judge whether the pending data is private data.
9. device according to claim 8, which is characterized in that the acquisition module is additionally operable to obtain the expansion of the user
The expansion request in the default sensitive dictionary or the default example image storehouse is filled, the expansion request includes one or more and treats
Increase sensitive word or including one or more example images;
The processing module is additionally operable to be asked according to described expand, to the default sensitive dictionary or the default example image
Storehouse carries out expansion processing.
10. a kind of mobile terminal, which is characterized in that including:Such as claim 6-9 any one of them devices.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711203588.0A CN108073820A (en) | 2017-11-27 | 2017-11-27 | Security processing, device and the mobile terminal of data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711203588.0A CN108073820A (en) | 2017-11-27 | 2017-11-27 | Security processing, device and the mobile terminal of data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108073820A true CN108073820A (en) | 2018-05-25 |
Family
ID=62157693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711203588.0A Pending CN108073820A (en) | 2017-11-27 | 2017-11-27 | Security processing, device and the mobile terminal of data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108073820A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110598426A (en) * | 2019-08-14 | 2019-12-20 | 平安科技(深圳)有限公司 | Data communication method, device, equipment and storage medium based on information security |
CN111212033A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | Page display method and device based on combined web crawler defense technology and electronic equipment |
CN114549951A (en) * | 2020-11-26 | 2022-05-27 | 未岚大陆(北京)科技有限公司 | Method for obtaining training data, related device, system and storage medium |
CN114567467A (en) * | 2022-02-17 | 2022-05-31 | 广州贝鼎科技有限公司 | Data exchange method and system for gateway and server of Internet of things |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102625299A (en) * | 2012-04-23 | 2012-08-01 | 北京市大富智慧云技术有限公司 | Data transmission method, system and device |
CN103685209A (en) * | 2012-09-26 | 2014-03-26 | 中国电信股份有限公司 | A source-tracing processing method of Internet media files, a server, and a communication system |
CN103856539A (en) * | 2012-12-06 | 2014-06-11 | 海尔集团公司 | Private cloud system, intelligent home system and home data protection method |
CN106685903A (en) * | 2015-11-10 | 2017-05-17 | 中国电信股份有限公司 | Data transmission method based on SDN, SDN controller and SDN system |
US20170310664A1 (en) * | 2016-04-21 | 2017-10-26 | Tharmalingam Satkunarajah | Apparatus and system for obtaining and encrypting documentary materials |
-
2017
- 2017-11-27 CN CN201711203588.0A patent/CN108073820A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102625299A (en) * | 2012-04-23 | 2012-08-01 | 北京市大富智慧云技术有限公司 | Data transmission method, system and device |
CN103685209A (en) * | 2012-09-26 | 2014-03-26 | 中国电信股份有限公司 | A source-tracing processing method of Internet media files, a server, and a communication system |
CN103856539A (en) * | 2012-12-06 | 2014-06-11 | 海尔集团公司 | Private cloud system, intelligent home system and home data protection method |
CN106685903A (en) * | 2015-11-10 | 2017-05-17 | 中国电信股份有限公司 | Data transmission method based on SDN, SDN controller and SDN system |
US20170310664A1 (en) * | 2016-04-21 | 2017-10-26 | Tharmalingam Satkunarajah | Apparatus and system for obtaining and encrypting documentary materials |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110598426A (en) * | 2019-08-14 | 2019-12-20 | 平安科技(深圳)有限公司 | Data communication method, device, equipment and storage medium based on information security |
CN111212033A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | Page display method and device based on combined web crawler defense technology and electronic equipment |
CN114549951A (en) * | 2020-11-26 | 2022-05-27 | 未岚大陆(北京)科技有限公司 | Method for obtaining training data, related device, system and storage medium |
CN114549951B (en) * | 2020-11-26 | 2024-04-23 | 未岚大陆(北京)科技有限公司 | Method for obtaining training data, related device, system and storage medium |
CN114567467A (en) * | 2022-02-17 | 2022-05-31 | 广州贝鼎科技有限公司 | Data exchange method and system for gateway and server of Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020177392A1 (en) | Federated learning-based model parameter training method, apparatus and device, and medium | |
CN108073820A (en) | Security processing, device and the mobile terminal of data | |
EP2813961A1 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
CN105429761A (en) | Key generation method and device | |
US9313185B1 (en) | Systems and methods for authenticating devices | |
CN109274582B (en) | Instant communication message display method, device, equipment and storage medium | |
CN103532960B (en) | Decrypt device | |
CN109495252A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN106790208A (en) | A kind of communication encrypting method and device | |
WO2021249527A1 (en) | Method and apparatus for implementing motopay, and electronic device | |
CN115242514B (en) | Privacy set intersection method and system based on state secret, electronic equipment and storage medium | |
US20200145389A1 (en) | Controlling Access to Data | |
CN114730337A (en) | Cryptographic key management | |
CN106355112A (en) | Method of destructing data in encrypted mobile storage device and server | |
CN107066868A (en) | A kind of data guard method and device of identity-based certification | |
CN105306200A (en) | Method and device for encrypting network account password | |
CN106778295B (en) | File storage method, file display method, file storage device, file display device and terminal | |
CN106161481B (en) | A kind of device of mobile terminal physical button isolation safe module prevention security risk | |
WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
CN106161365B (en) | Data processing method and device and terminal | |
CN107094079A (en) | A kind of method for opening termination function, device and equipment | |
CN108280330A (en) | Data output method and system | |
CN106485100A (en) | A kind of method of internet computer software lock and its service system | |
EP1239629A2 (en) | Method for the safe use and transmission of biometric data for authentication purposes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180830 Address after: 518103 24 Longhua 101, Fuxing community, Fucheng street, Longhua District, Shenzhen, China Applicant after: SHENZHEN TAIHENGNUO TECHNOLOGY CO., LTD. Address before: 100085 A1103 11, A block 9, Shang di San Jie, Haidian District, Beijing. Applicant before: Beijing Chuan Jia Technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180525 |
|
RJ01 | Rejection of invention patent application after publication |