CN108073820A - Security processing, device and the mobile terminal of data - Google Patents

Security processing, device and the mobile terminal of data Download PDF

Info

Publication number
CN108073820A
CN108073820A CN201711203588.0A CN201711203588A CN108073820A CN 108073820 A CN108073820 A CN 108073820A CN 201711203588 A CN201711203588 A CN 201711203588A CN 108073820 A CN108073820 A CN 108073820A
Authority
CN
China
Prior art keywords
data
pending
pending data
processing
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711203588.0A
Other languages
Chinese (zh)
Inventor
董瑞攀
赵新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN TAIHENGNUO TECHNOLOGY CO., LTD.
Original Assignee
Beijing Chuan Jia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chuan Jia Technology Co Ltd filed Critical Beijing Chuan Jia Technology Co Ltd
Priority to CN201711203588.0A priority Critical patent/CN108073820A/en
Publication of CN108073820A publication Critical patent/CN108073820A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The application, which provides a kind of security processing of data, device and mobile terminal, this method, to be included:The processing request of user is obtained, processing request includes handling the identification information of type, pending data and pending data;According to the identification information of pending data and/or pending data, judge whether pending data is private data;If it is determined that pending data is private data, then pending data is encrypted using Encryption Algorithm, obtains encryption data;Encryption data is carried out and handles that type is corresponding handles.It realizes to encrypted data is needed to be encrypted, to other non-private datas then without encryption, data-handling efficiency is improved on the basis of assuring data security.

Description

Security processing, device and the mobile terminal of data
Technical field
This application involves a kind of field of communication technology more particularly to security processing of data, device and mobile terminals.
Background technology
With the rapid development of network communication technology, mobile phone essential communication or amusement work in having become for people's lives Tool.
Since user can be passed by many daily life events of handset processes, such as the purchase of mobile-phone payment, mobile phone, mobile phone It delivers letters breath or file etc., the private data of user can be related to, for secure user data, when user carries out data sending, lead to All data of user can be often encrypted.Cause ciphering process slow, treatment effeciency is relatively low, user experience compared with Difference.Therefore, the technical issues of safe handling efficiency and the user experience of data are as urgent need to resolve how is effectively improved.
The content of the invention
The application provides a kind of security processing of data, device and mobile terminal, to solve prior art data The defects such as safe handling efficiency is low.
The application the first aspect provides a kind of security processing of data, including:
The processing request of user is obtained, the processing request includes handling type, pending data and pending data Identification information;
According to the identification information of the pending data and/or the pending data, judge that the pending data is No is private data;
If it is determined that the pending data is private data, then the pending data is encrypted using Encryption Algorithm Processing obtains encryption data;
The encryption data is carried out to handle that type is corresponding handles with described.
Further aspect of the application provides a kind of secure processing device of data, including:
Acquisition module, for obtain the processing of user request, it is described processing request include processing type, pending data and The identification information of pending data;
Judgment module, for the identification information according to the pending data and/or the pending data, described in judgement Whether pending data is private data;
Encrypting module, for if it is determined that the pending data be private data, then wait to locate to described using Encryption Algorithm Reason data are encrypted, and obtain encryption data;
Processing module, for carrying out handling that type is corresponding handles with described to the encryption data.
Another aspect of the application provides a kind of mobile terminal, including:Device as described above.
Security processing, device and the mobile terminal of data provided in this embodiment, by according to the pending number According to and/or the identification information of the pending data determine private data, and carry out phase again after private data is encrypted The processing answered is realized to encrypted data is needed to be encrypted, and to other non-private datas then without encryption, is ensureing data Data-handling efficiency is improved on the basis of security.
Description of the drawings
It in order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this Shen Some embodiments please, for those of ordinary skill in the art, without having to pay creative labor, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of the security processing for the data that one embodiment of the application provides;
Fig. 2 is the structure diagram of the secure processing device for the data that one embodiment of the application provides.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical solution in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art All other embodiments obtained without creative efforts shall fall in the protection scope of this application.
Embodiment one
The present embodiment provides a kind of security processing of data, for carrying out safe handling to the data of user.This reality The executive agent for applying example is the secure processing device (hereinafter referred to as device) of data, which can be set in the terminal, Such as the terminal that mobile phone, tablet computer etc. can carry out data transmission or data preserve.Following embodiment by taking mobile phone as an example into Row is described in detail.
As shown in Figure 1, the flow diagram of the security processing for data provided in this embodiment, this method include:
Step 101, the processing request of user is obtained, processing request includes handling type, pending data and pending number According to identification information.
Step 102, according to the identification information of pending data and/or pending data, judge pending data whether be Private data.
Step 103, however, it is determined that pending data is private data, then pending data is encrypted using Encryption Algorithm Processing obtains encryption data.
Step 104, encryption data is carried out and handles that type is corresponding handles.
Which kind of specifically, when user will be sent by mobile phone or preserve data, either sent out by the application on mobile phone Send or preserve, such as short message, wechat, QQ, various purchase APP etc., when user input text, typing voice, addition picture or After video, click on send or preserve, then have issued processing request, the processing request include processing type, pending data and The identification information of pending data, wherein, processing type can include sending processing and preservation processing.The safe handling dress of data It puts, the processing request of user can be obtained, after processing request is got, first have to judge whether pending data is secret Whether data, which need, is encrypted.It can specifically be judged according to pending data, it can also be according to pending data Identification information judges.
Illustratively, when user set some contact artificial private contact (will the contact person title or mobile phone Sensitive dictionary is preset in the additions such as number), then all communication datas of user and the contact person all will be private data, then basis should The identification information as its communication data such as the title of contact person or phone number, when the device detects that user is to be sent or treats When the identification information of the data of preservation is the title or phone number of the private contact, then it may determine that the pending data is Private data.If user does not set the artificial private contact of the contact for another example, when user will send or preserve data When, whether which then detects in pending data content comprising the sensitive content in default sensitive dictionary, if comprising sentencing The pending data of breaking is private data.It should be noted that being only exemplary explanation here, not it is limited.
When definite pending data be private data, then pending data is encrypted using Encryption Algorithm, obtained Encryption data, and encryption data is carried out and handles that type is corresponding handles, such as the processing class asked when the processing of user Type then carries out preservation processing to preserve type.
Optionally, Encryption Algorithm can include DES Cipher, 3DES, international data encryption algorithm IDEA, advanced One or more in Encryption Standard AES and Message Digest Algorithm 5 MD5.It can be with can arbitrarily to implement in the prior art Encryption Algorithm, do not limit herein.
The security processing of data provided in this embodiment, by according to pending data and/or pending data Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security According to treatment effeciency.
Embodiment two
The present embodiment does further supplementary notes to the security processing for the data that embodiment one provides.
As a kind of enforceable mode, on the basis of above-described embodiment one, optionally, when processing type is at preservation During reason, then encryption data is carried out and handle that type is corresponding handles, including:By encryption data and encryption data and mark The correspondence of information stores the secret memory space to user;Alternatively, when handling type to send processing, then to encrypting number According to carrying out and handle that type is corresponding handles, including:Encryption data is subjected to transmission processing, and by encryption data and encrypts number According to the secret memory space with the correspondence of identification information storage to user.
Specifically, it is one secret memory space of user setting in the memory space of user mobile phone, for storing user Private data, the private data in the secret memory space do not open the various applications in mobile phone, i.e., respectively answering in mobile phone With the private data that cannot access in the secret memory space, except non-user authorizes it.For example user sets contact person Zhang San is private contact, and all data that user communicates with Zhang San are stored in secret memory space, such as short message, in short message The short message that the two is sent out is not can be appreciated that in.When user will send short message to Zhang San, user opens short message application, and input is treated The information of transmission is clicked on after sending, which then first determines whether the information to be sent is private data, since user will open Three have been set to private contact, i.e., the name of Zhang San or cell-phone number are added default sensitive dictionary, which can then pass through Recipient's (identification information) of the information to be sent judges the information to be sent for private data with default sensitive word storehouse matching, Then the data to be sent are encrypted, obtain encryption data, encryption data is subjected to transmission processing again, and after transmission will The encryption data is stored to secret memory space, and will not retain the encryption data in mobile phone public memory space.In short message Application has sent or has received the short message record that not can be appreciated that user and Zhang San in list.It is also in this way, user to preserve processing It clicks on after preserving, which judges whether information to be saved is private information, if being then saved in secret memory space.
Optionally, which can open a secret entrance to user, gather the verification information of user, than Such as user fingerprints or other verification modes, user is by can then check the secret in the secret memory space after fingerprint authentication Data.User can also access other application mandate the permission of the secret memory space.Other application then can be with after mandate Access the private data in the secret memory space.Therefore, the administration authority of private data is completely being held in user oneself hand, Substantially increase Information Security and user experience.
As another enforceable mode, on the basis of above-described embodiment one, optionally, pending data is text Data, voice data, image data or video data;Then according to the identification information of pending data and/or pending data, sentence Whether disconnected pending data is private data, including:
It is and pre- according to the identification information of pending data and/or pending data if pending data is text data If sensitive dictionary is matched, judge whether pending data is private data;
If pending data is voice data, corresponding textual data is converted voice data to using speech recognition algorithm According to being matched with default sensitive dictionary, judge whether pending data is private data;
If pending data is image data, according to the identification information of pending data and/or pending data, use Image recognition algorithm is matched with default example image storehouse, judges whether pending data is private data;
If pending data is video data, video data is subjected to sub-frame processing, the image data per frame is obtained, adopts It is matched with image recognition algorithm with default example image storehouse, judges whether pending data is private data.
Specifically, for text data, sensitive dictionary can be pre-set, be provided with some sensitive vocabulary samples or User's content to be protected after processing request is got, is then believed according to the mark of pending data and/or pending data Breath is matched with default sensitive dictionary, judges whether pending data is private data.
Illustratively, when user set some contact artificial private contact (will the contact person title or mobile phone Sensitive dictionary is preset in the additions such as number), then all communication datas of user and the contact person all will be private data, then basis should The identification information as its communication data such as the title of contact person or phone number, when the device detects that user is to be sent or treats When the identification information of the data of preservation is the title or phone number of the private contact, then it may determine that the pending data is Private data.If user does not set the artificial private contact of the contact for another example, when user will send or preserve data When, whether which then detects in pending data content comprising the sensitive content in default sensitive dictionary, if comprising sentencing The pending data of breaking is private data.
If pending data is voice data, corresponding textual data is converted voice data to using speech recognition algorithm According to, and using the determination methods of above-mentioned text data, matched with default sensitive dictionary, judge whether pending data is private Ciphertext data, details are not described herein.Wherein, speech recognition algorithm can be that arbitrary enforceable speech recognition is calculated in the prior art Method converts voice data to text data, does not limit specifically.
If pending data is image data, example image storehouse can be pre-set, is set in default example image storehouse Some example pictures are put, using the individual features of image recognition algorithm extraction image, according to pending data and/or pending number According to identification information, matched, judged pending with the characteristics of image in default example image storehouse using image recognition algorithm Whether data are private data.Specific image recognition algorithm can be arbitrary enforceable algorithm in the prior art, herein not It limits.
Illustratively, the image of someone or something are provided in advance, when including picture in the data for sending or preserving, are used Image recognition algorithm extracts the characteristic information of picture and existing someone or something in default example image storehouse in pending data The feature of image whether match, if matching, judges the pending data for private data.
If pending data is video data, video data is subjected to sub-frame processing, the image data per frame is obtained, adopts Judged with the determination methods of above-mentioned image data, i.e., matched using image recognition algorithm with default example image storehouse, Judge whether pending data is private data.Details are not described herein.Wherein, it is to the method for video data progress sub-frame processing The prior art does not limit herein.
Optionally, this method can also include:
The default sensitive dictionary of expansion of user or the expansion request in default example image storehouse are obtained, expanding request includes one Or multiple sensitive words to be increased or including one or more example images;It is asked according to expanding, to default sensitive dictionary or pre- If example image storehouse carries out expansion processing.
Specifically, default sensitivity dictionary and default example image figure are not unalterable, it can be by user at any time Expand, can also at any time delete original sensitive word in storehouse or example image.It can specifically need to be configured according to user.When When user wants to expand default sensitive dictionary or default example image storehouse, which can provide visualization to the user and expand boundary Face, user input new sensitive word at interface or add new example image, click on the corresponding button for expanding mark and then have sent Expand request, after which gets the expansion request of user, then expansion processing is carried out according to expansion request, user will be increased New sensitive word or new example image be added in default sensitive dictionary or default example image storehouse.Equally can be user Deletion or other management operations are provided.Details are not described herein.
Optionally, if pending data is text data, believed according to the mark of pending data and/or pending data Breath is matched with default sensitive dictionary, judges whether pending data is private data, including:
If pending data is text data, text judgment models are established using nearest public ancestors LCA algorithms, are used Default sensitivity dictionary is trained text judgment models, obtains text training pattern;Using text training pattern, judge to wait to locate Manage whether data are private data;
If pending data is image data, according to the identification information of pending data and/or pending data, use Image recognition algorithm is matched with default example image storehouse, judges whether pending data is private data, including:
If pending data is image data, establishes picture using bag of words BoW (Bag of Words, bag of words) algorithm and sentence Disconnected model, using SIFT (Scale-invariant feature transform, Scale invariant features transform)) algorithm generation The feature vector of picture is clustered using K average K-means algorithms, obtains picture training pattern;Using picture training mould Type judges whether pending data is private data.
Specifically, judgment models can be established, judgment models are trained, trained model then may be employed Judge whether pending data is private data.
For text data, nearest public ancestors LCA algorithms may be employed and establish text judgment models, using default sensitivity Dictionary is trained text judgment models, obtains text training pattern;Using text training pattern, judge that pending data is No is private data.Wherein, public ancestors LCA algorithms are algorithm of the prior art recently, and details are not described herein.
For image data, it may be employed and picture judgment models are established using bag of words BoW algorithms, using scale invariant feature The feature vector of SIFT algorithms generation picture is converted, is clustered using K average K-means algorithms, obtains picture training pattern; Using picture training pattern, judge whether pending data is private data.Wherein, BoW algorithms, SIFT algorithms and K-means Algorithm all can be algorithm of the prior art, details are not described herein.
Optionally, this method can also include:
Obtain the access request that user accesses secret memory space, the verification information of access request including user and to be visited The corresponding identification information of encryption data,
The access rights of user are verified according to the verification information of user;
If verification result is by according to the corresponding identification information of encryption data to be visited, being solved to encryption data It is close, and carry out display processing.
It should be noted that each enforceable mode can individually be implemented in the present embodiment, mode can also be combined With reference to implementation, do not limit herein.
The security processing of data provided in this embodiment, by according to pending data and/or pending data Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security According to treatment effeciency.
Embodiment three
The present embodiment provides a kind of secure processing device of data, for performing the peace of the data of the offer of above-described embodiment one Full processing method.
As shown in Fig. 2, the structure diagram of the secure processing device for data provided in this embodiment.The safety of the data Processing unit 30 includes acquisition module 31, judgment module 32, encrypting module 33 and processing module 34.
Wherein, acquisition module 31 is used to obtain the processing request of user, and processing request includes handling type, pending data With the identification information of pending data;Judgment module 32 is used for the identification information according to pending data and/or pending data, Judge whether pending data is private data;Encrypting module 33 be used for if it is determined that pending data be private data, then use Pending data is encrypted in Encryption Algorithm, obtains encryption data;Processing module 34 be used for encryption data carry out with Processing type is handled accordingly.
Device in this present embodiment is closed, wherein modules perform the concrete mode of operation in related this method It is described in detail in embodiment, explanation will be not set forth in detail herein.
The secure processing device of data provided in this embodiment, by according to pending data and/or pending data Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security According to treatment effeciency.
Example IV
The present embodiment does further supplementary notes to the secure processing device for the data that above-described embodiment three provides.
As a kind of enforceable mode, on the basis of above-described embodiment three, optionally, processing module 34 is specifically used In:
When handling type to preserve processing, the correspondence of encryption data and encryption data and identification information is deposited Store up the secret memory space of user;Alternatively, when handling type to send processing, encryption data is subjected to transmission processing, and By the secret memory space of the correspondence of encryption data and encryption data and identification information storage to user.
As another enforceable mode, on the basis of above-described embodiment three, optionally, pending data is text Data, voice data, image data or video data;Then judgment module 32 is specifically used for:
It is and pre- according to the identification information of pending data and/or pending data if pending data is text data If sensitive dictionary is matched, judge whether pending data is private data;
If pending data is voice data, corresponding textual data is converted voice data to using speech recognition algorithm According to being matched with default sensitive dictionary, judge whether pending data is private data;
If pending data is image data, according to the identification information of pending data and/or pending data, use Image recognition algorithm is matched with default example image storehouse, judges whether pending data is private data;
If pending data is video data, video data is subjected to sub-frame processing, the image data per frame is obtained, adopts It is matched with image recognition algorithm with default example image storehouse, judges whether pending data is private data.
Optionally, acquisition module 31 is additionally operable to obtain the default sensitive dictionary of expansion of user or the expansion in default example image storehouse Request is filled, expanding request includes one or more sensitive words to be increased or including one or more example images;Processing module 34 are additionally operable to, according to request is expanded, expansion processing be carried out to default sensitive dictionary or default example image storehouse.
Optionally, judgment module 32 is specifically used for:
If pending data is text data, text judgment models are established using nearest public ancestors LCA algorithms, are used Default sensitivity dictionary is trained text judgment models, obtains text training pattern;Using text training pattern, judge to wait to locate Manage whether data are private data;
If pending data is image data, picture judgment models are established using bag of words BoW algorithms, using Scale invariant Eigentransformation SIFT algorithms generate the feature vector of picture, are clustered using K average K-means algorithms, obtain picture training Model;Using picture training pattern, judge whether pending data is private data.
It should be noted that each enforceable mode can individually be implemented in the present embodiment, mode can also be combined With reference to implementation, do not limit herein.
Device in this present embodiment is closed, wherein modules perform the concrete mode of operation in related this method It is described in detail in embodiment, explanation will be not set forth in detail herein.
The secure processing device of data provided in this embodiment, by according to pending data and/or pending data Identification information determines private data, and is handled accordingly again after private data is encrypted, and realizes to needing to add Close data are encrypted, and to other non-private datas then without encryption, number is improved on the basis of assuring data security According to treatment effeciency.
Embodiment five
The present embodiment provides a kind of mobile terminal, for performing the safe handling side for the data that any of the above-described embodiment provides Method.
The mobile terminal can include the secure processing device for the data that any of the above-described embodiment provides.
Device in this present embodiment is closed, wherein modules perform the concrete mode of operation in related this method It is described in detail in embodiment, explanation will be not set forth in detail herein.
Mobile terminal provided in this embodiment, it is true by the identification information according to pending data and/or pending data Make private data, and handled accordingly again after private data is encrypted, realize to need encrypted data into Row encryption to other non-private datas then without encryption, improves data-handling efficiency on the basis of assuring data security.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied It closes or is desirably integrated into another system or some features can be ignored or does not perform.It is another, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or unit Letter connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list The form that hardware had both may be employed in member is realized, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, is used including some instructions so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) perform the present invention The part steps of embodiment the method.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various The medium of program code can be stored.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each function module Division progress for example, in practical application, can be complete by different function modules by above-mentioned function distribution as needed Into the internal structure of device being divided into different function modules, to complete all or part of function described above.On The specific work process of the device of description is stated, may be referred to the corresponding process in preceding method embodiment, details are not described herein.

Claims (10)

1. a kind of security processing of data, which is characterized in that including:
The processing request of user is obtained, the processing request includes handling the mark of type, pending data and pending data Information;
According to the identification information of the pending data and/or the pending data, judge the pending data whether be Private data;
If it is determined that the pending data is private data, then place is encrypted to the pending data using Encryption Algorithm Reason obtains encryption data;
The encryption data is carried out to handle that type is corresponding handles with described.
2. according to the method described in claim 1, it is characterized in that, when it is described processing type for preserve processing when, then to described Encryption data carries out handling that type is corresponding handles with described, including:By the encryption data and the encryption data and institute The correspondence storage of identification information is stated to the secret memory space of the user;Alternatively,
When the processing type is sends processing, then the encryption data is carried out handling that type is corresponding handles with described, Including:The encryption data is subjected to transmission processing, and the encryption data and the encryption data are believed with the mark The correspondence of breath stores the secret memory space to the user.
3. according to the method described in claim 1, it is characterized in that, the pending data is text data, voice data, figure Sheet data or video data;The then identification information according to the pending data and/or the pending data, judges institute State whether pending data is private data, including:
If the pending data is text data, according to the pending data and/or the mark of the pending data Information is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is voice data, the voice data is converted by corresponding text using speech recognition algorithm Notebook data is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is image data, according to the pending data and/or the mark of the pending data Information is matched using image recognition algorithm with default example image storehouse, judges whether the pending data is secret number According to;
If the pending data is video data, the video data is subjected to sub-frame processing, obtains the picture number per frame According to being matched using image recognition algorithm with default example image storehouse, judge whether the pending data is private data.
4. it according to the method described in claim 3, it is characterized in that, further includes:
Obtain the expansion default sensitive dictionary of the user or the expansion request in the default example image storehouse, the expansion Request includes one or more sensitive words to be increased or including one or more example image;
It is asked according to described expand, expansion processing is carried out to the default sensitive dictionary or the default example image storehouse.
If 5. according to the method described in claim 3, it is characterized in that, the pending data be text data, root According to the identification information of the pending data and/or the pending data, matched with default sensitive dictionary, described in judgement Whether pending data is private data, including:
If the pending data is text data, text judgment models are established using nearest public ancestors LCA algorithms, are used Default sensitivity dictionary is trained the text judgment models, obtains text training pattern;Using text training pattern, judge Whether the pending data is private data;
If the pending data is image data, according to the pending data and/or the pending data Identification information is matched using image recognition algorithm with default example image storehouse, judges whether the pending data is private Ciphertext data, including:
If the pending data is image data, picture judgment models are established using bag of words BoW algorithms, using Scale invariant Eigentransformation SIFT algorithms generate the feature vector of picture, are clustered using K average K-means algorithms, obtain picture training Model;Using picture training pattern, judge whether the pending data is private data.
6. a kind of secure processing device of data, which is characterized in that including:
Acquisition module, for obtaining the processing of user request, the processing request includes handling type, pending data and waits to locate Manage the identification information of data;
Judgment module for the identification information according to the pending data and/or the pending data, is waited to locate described in judgement Manage whether data are private data;
Encrypting module, for if it is determined that the pending data is private data, then using Encryption Algorithm to the pending number According to being encrypted, encryption data is obtained;
Processing module, for carrying out handling that type is corresponding handles with described to the encryption data.
7. device according to claim 6, which is characterized in that the processing module is specifically used for:
When the processing type is preserves processing, by the encryption data and the encryption data and the identification information Correspondence storage to the user secret memory space;Alternatively,
When the processing type is sends processing, the encryption data is subjected to transmission processing, and by the encryption data with And the correspondence of the encryption data and the identification information stores the secret memory space to the user.
8. device according to claim 6, which is characterized in that the pending data is text data, voice data, figure Sheet data or video data;The then judgment module, is specifically used for:
If the pending data is text data, according to the pending data and/or the mark of the pending data Information is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is voice data, the voice data is converted by corresponding text using speech recognition algorithm Notebook data is matched with default sensitive dictionary, judges whether the pending data is private data;
If the pending data is image data, according to the pending data and/or the mark of the pending data Information is matched using image recognition algorithm with default example image storehouse, judges whether the pending data is secret number According to;
If the pending data is video data, the video data is subjected to sub-frame processing, obtains the picture number per frame According to being matched using image recognition algorithm with default example image storehouse, judge whether the pending data is private data.
9. device according to claim 8, which is characterized in that the acquisition module is additionally operable to obtain the expansion of the user The expansion request in the default sensitive dictionary or the default example image storehouse is filled, the expansion request includes one or more and treats Increase sensitive word or including one or more example images;
The processing module is additionally operable to be asked according to described expand, to the default sensitive dictionary or the default example image Storehouse carries out expansion processing.
10. a kind of mobile terminal, which is characterized in that including:Such as claim 6-9 any one of them devices.
CN201711203588.0A 2017-11-27 2017-11-27 Security processing, device and the mobile terminal of data Pending CN108073820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711203588.0A CN108073820A (en) 2017-11-27 2017-11-27 Security processing, device and the mobile terminal of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711203588.0A CN108073820A (en) 2017-11-27 2017-11-27 Security processing, device and the mobile terminal of data

Publications (1)

Publication Number Publication Date
CN108073820A true CN108073820A (en) 2018-05-25

Family

ID=62157693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711203588.0A Pending CN108073820A (en) 2017-11-27 2017-11-27 Security processing, device and the mobile terminal of data

Country Status (1)

Country Link
CN (1) CN108073820A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598426A (en) * 2019-08-14 2019-12-20 平安科技(深圳)有限公司 Data communication method, device, equipment and storage medium based on information security
CN111212033A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 Page display method and device based on combined web crawler defense technology and electronic equipment
CN114549951A (en) * 2020-11-26 2022-05-27 未岚大陆(北京)科技有限公司 Method for obtaining training data, related device, system and storage medium
CN114567467A (en) * 2022-02-17 2022-05-31 广州贝鼎科技有限公司 Data exchange method and system for gateway and server of Internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625299A (en) * 2012-04-23 2012-08-01 北京市大富智慧云技术有限公司 Data transmission method, system and device
CN103685209A (en) * 2012-09-26 2014-03-26 中国电信股份有限公司 A source-tracing processing method of Internet media files, a server, and a communication system
CN103856539A (en) * 2012-12-06 2014-06-11 海尔集团公司 Private cloud system, intelligent home system and home data protection method
CN106685903A (en) * 2015-11-10 2017-05-17 中国电信股份有限公司 Data transmission method based on SDN, SDN controller and SDN system
US20170310664A1 (en) * 2016-04-21 2017-10-26 Tharmalingam Satkunarajah Apparatus and system for obtaining and encrypting documentary materials

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625299A (en) * 2012-04-23 2012-08-01 北京市大富智慧云技术有限公司 Data transmission method, system and device
CN103685209A (en) * 2012-09-26 2014-03-26 中国电信股份有限公司 A source-tracing processing method of Internet media files, a server, and a communication system
CN103856539A (en) * 2012-12-06 2014-06-11 海尔集团公司 Private cloud system, intelligent home system and home data protection method
CN106685903A (en) * 2015-11-10 2017-05-17 中国电信股份有限公司 Data transmission method based on SDN, SDN controller and SDN system
US20170310664A1 (en) * 2016-04-21 2017-10-26 Tharmalingam Satkunarajah Apparatus and system for obtaining and encrypting documentary materials

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598426A (en) * 2019-08-14 2019-12-20 平安科技(深圳)有限公司 Data communication method, device, equipment and storage medium based on information security
CN111212033A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 Page display method and device based on combined web crawler defense technology and electronic equipment
CN114549951A (en) * 2020-11-26 2022-05-27 未岚大陆(北京)科技有限公司 Method for obtaining training data, related device, system and storage medium
CN114549951B (en) * 2020-11-26 2024-04-23 未岚大陆(北京)科技有限公司 Method for obtaining training data, related device, system and storage medium
CN114567467A (en) * 2022-02-17 2022-05-31 广州贝鼎科技有限公司 Data exchange method and system for gateway and server of Internet of things

Similar Documents

Publication Publication Date Title
WO2020177392A1 (en) Federated learning-based model parameter training method, apparatus and device, and medium
CN108073820A (en) Security processing, device and the mobile terminal of data
EP2813961A1 (en) Biometric verification with improved privacy and network performance in client-server networks
CN105429761A (en) Key generation method and device
US9313185B1 (en) Systems and methods for authenticating devices
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
CN103532960B (en) Decrypt device
CN109495252A (en) Data ciphering method, device, computer equipment and storage medium
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN106790208A (en) A kind of communication encrypting method and device
WO2021249527A1 (en) Method and apparatus for implementing motopay, and electronic device
CN115242514B (en) Privacy set intersection method and system based on state secret, electronic equipment and storage medium
US20200145389A1 (en) Controlling Access to Data
CN114730337A (en) Cryptographic key management
CN106355112A (en) Method of destructing data in encrypted mobile storage device and server
CN107066868A (en) A kind of data guard method and device of identity-based certification
CN105306200A (en) Method and device for encrypting network account password
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN106161481B (en) A kind of device of mobile terminal physical button isolation safe module prevention security risk
WO2016188079A1 (en) Data storage method for terminal device and terminal device
CN106161365B (en) Data processing method and device and terminal
CN107094079A (en) A kind of method for opening termination function, device and equipment
CN108280330A (en) Data output method and system
CN106485100A (en) A kind of method of internet computer software lock and its service system
EP1239629A2 (en) Method for the safe use and transmission of biometric data for authentication purposes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180830

Address after: 518103 24 Longhua 101, Fuxing community, Fucheng street, Longhua District, Shenzhen, China

Applicant after: SHENZHEN TAIHENGNUO TECHNOLOGY CO., LTD.

Address before: 100085 A1103 11, A block 9, Shang di San Jie, Haidian District, Beijing.

Applicant before: Beijing Chuan Jia Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20180525

RJ01 Rejection of invention patent application after publication