CN109492423A - Method, apparatus, computer equipment and the storage medium of sensitive information filtering - Google Patents

Method, apparatus, computer equipment and the storage medium of sensitive information filtering Download PDF

Info

Publication number
CN109492423A
CN109492423A CN201811123047.1A CN201811123047A CN109492423A CN 109492423 A CN109492423 A CN 109492423A CN 201811123047 A CN201811123047 A CN 201811123047A CN 109492423 A CN109492423 A CN 109492423A
Authority
CN
China
Prior art keywords
information
sensitive information
sensitive
communication
filtering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811123047.1A
Other languages
Chinese (zh)
Inventor
王鉴通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201811123047.1A priority Critical patent/CN109492423A/en
Publication of CN109492423A publication Critical patent/CN109492423A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Abstract

The invention discloses method, apparatus, computer equipment and the storage mediums of a kind of filtering of sensitive information, comprising: receives the communication information to be processed, wherein includes the website information for characterizing the communication information access address in the communication information;Being identified according to preset detection list whether there is sensitive information in the communication information, wherein the detection list enumerates set for sensitive information;If detecting, there are when the sensitive information in the communication information, the sensitive information filtering rule that there are mapping relations with the website information is obtained in preset rules database, to be filtered according to the sensitive information filtering rule to the sensitive information, can according to the website information of the received communication information match different sensitive information filtering rules, sensitive information is filtered according to the content of webpage and type, it is safer compared with being only filtered according to unified rule for the prior art.

Description

Method, apparatus, computer equipment and the storage medium of sensitive information filtering
Technical field
The present invention relates to software systems technical fields, specifically, the present invention relates to a kind of sensitive information filtering method, Device, computer equipment and storage medium.
Background technique
With the development of internet, many information, including individual privacy information are all to carry out pipe by network and its system Reason.These systems are inquired by obtaining permission, are carrying out account inquiries, transfer accounts it is equal can also be related in the process it is certain hidden Checking for personal letter breath, be easy to cause the leakage of individual privacy information in entire action process.
And the filter type to the sensitive information about individual privacy information etc of the prior art is generally by connecing Communication information is received, detects and whether there is sensitive information in communication information, if it is detected that there are sensitive information in communication information, with The form that sensitive information is blocked shows communication information, and the sensitive information is just shown when sensitive information meets display condition.This Kind of mode, the rule blocked be usually it is the same, cannot be filtered according to different contents, it is single that rule is blocked in filtering, Safety is not high.
Summary of the invention
The purpose of the present invention is intended at least can solve above-mentioned one of technological deficiency, especially one kind can be according to according to not The method that the filtering rule of the sensitive information of same website and user right is filtered.
The invention discloses a kind of methods of sensitive information filtering, comprising:
Receive the communication information to be processed, wherein include characterizing the communication information access address in the communication information Website information;
Being identified according to preset detection list whether there is sensitive information in the communication information, wherein the detection column Table enumerates set for sensitive information;
If detecting in the communication information there are when the sensitive information, obtained in preset rules database with it is described Website information has the sensitive information filtering rule of mapping relations, to believe according to the sensitive information filtering rule the sensitivity Breath is filtered.
Further, described that the side that whether there is sensitive information in the communication information is identified according to preset detection list Method includes:
Obtain character field included in the communication information;
The character field that sensitive information is characterized in the character field and the detection list is compared, it is described logical to judge It whether there is the sensitive information in letter information.
Further, the sensitive information filtering rule includes: the character for blocking the designated position in the sensitive information Section;Or the sensitive information filtering rule includes:
Character field in the sensitive information is compared with common numerical data base, judge the character field whether include Character field in the common numerical data base;
The character field being comprised in described in display in common numerical data base;
When all character fields in the sensitive information not in the common numerical data base when, arbitrarily show described quick Feel one of character field in information;
Or the sensitive information filtering rule further include: the type for obtaining the sensitive information, according to the type institute The sensitive information filtering rule of mapping blocks the character field of the designated position in the sensitive information.
Further, further includes:
The request instruction of checking of the sensitive information is obtained, described check includes the account for executing request instruction in request instruction Number information;
It verifies the account information and whether has and check permission;
When the account information, which has, checks permission, the permission mapped rule according to the account information shows institute State sensitive information.
Further, the permission mapped rule of the account information includes:
The first verification information is sent to the account information and waits the second verification information fed back by the account information;
Judge whether first verification information and second verification information meet preset condition;
When meeting preset condition, the sensitive information is completely shown.
Further, before being identified according to preset detection list in the communication information with the presence or absence of sensitive information, Further include:
Judge whether the communication information there is sensitive information to filter permission, the sensitive information filtering permission includes executing Sensitive information filters and does not execute the sensitive information filtering.
Invention additionally discloses a kind of devices of sensitive information filtering, comprising:
Obtain module: for receiving the communication information to be processed, wherein include characterizing the communication in the communication information The website information of message reference address;
Processing module: whether there is sensitive information for identifying according to preset detection list in the communication information, In, the detection list enumerates set for sensitive information;
Execution module: if for detecting in the communication information there are when the sensitive information, in preset rules data The sensitive information filtering rule that there are mapping relations with the website information is obtained in library, is advised with filtering according to the sensitive information Then the sensitive information is filtered.
Further, further includes:
First acquisition submodule: for obtaining character field included in the communication information;
First judging submodule: for by the character field and it is described detection list in characterize sensitive information character field into Row comparison, to judge in the communication information with the presence or absence of the sensitive information.
Further, the sensitive information filtering rule includes: the character for blocking the designated position in the sensitive information Section;Or the sensitive information filtering rule includes:
Character field in the sensitive information is compared with common numerical data base, judge the character field whether include Character field in the common numerical data base;
The character field being comprised in described in display in common numerical data base;
When all character fields in the sensitive information not in the common numerical data base when, arbitrarily show described quick Feel one of character field in information.
Or the sensitive information filtering rule further include: the type for obtaining the sensitive information, according to the type institute The sensitive information filtering rule of mapping blocks the character field of the designated position in the sensitive information.
Further, further includes:
First acquisition submodule: described to check in request instruction for obtaining the request instruction of checking of the sensitive information Account information including executing request instruction;
First verifying submodule: whether have for verifying the account information and check permission;
First implementation sub-module: for the power when the account information has and checks permission, according to the account information Limit mapped rule shows the sensitive information.
Further, further includes:
Second acquisition submodule: for sending the first verification information to the account information and waiting by the account information Second verification information of feedback;
Second verifying submodule: judge whether first verification information and second verification information meet default item Part;
Second implementation sub-module: for completely showing the sensitive information when meeting preset condition.
Further, further includes:
Second judgment submodule, for judging whether the communication information there is sensitive information to filter permission, the sensitivity Information filtering permission includes executing sensitive information filtering and not executing the sensitive information to filter.
Invention additionally discloses a kind of computer equipment, including memory and processor, calculating is stored in the memory Machine readable instruction, when the computer-readable instruction is executed by the processor, so that the processor executes any of the above-described The step of method of the sensitive information filtering.
Invention additionally discloses a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one When a or multiple processors execute, so that one or more processors execute the side of sensitive information filtering described in any of the above embodiments The step of method.
The beneficial effects of the present invention are:
1) method of sensitive information filtering of the invention can match not according to the website information of the received communication information of institute Same sensitive information filtering rule, is filtered sensitive information according to the content of webpage and type, compared with the root of the prior art It is filtered according to unified rule, it is safer;
2) it is provided with dynamic filtering rule, improves the safety of information reception and registration;
3) when being reproduced to filtered information, it is also desirable to meet preset condition according to the offer of account information Verification information after can check, improve the safety of sensitive information.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the method flow diagram of sensitive information of the present invention filtering;
Fig. 2 is the schematic diagram that the communication information of the present invention is instant messages;
Fig. 3 is the schematic diagram that the communication information of the present invention is solicited message;
Fig. 4 is the method flow diagram of present invention identification sensitive information;
Fig. 5 is the communication information of the present invention the case where sensitive information filters when being solicited message;
Fig. 6 is that the invention shows the flow charts of sensitive information;
Fig. 7 is flow chart of the Information Authentication of the present invention to show sensitive information;
Fig. 8 is the apparatus module schematic diagram of sensitive information of the present invention filtering;
Fig. 9 is computer equipment basic structure block diagram of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
In order to allow any people can device of the remote control for traveling, and execute shooting function, realize real time inspection The purpose of the image of shooting, the present invention provide a kind of method of sensitive information filtering, wherein when room is remotely being seen in this method use Application scenarios in when, the sensitive information filtering method include at least two terminals, one is remote terminal, be used for user couple What image and state of a control were checked, and the remote terminal of control instruction is sent, which can be computer, pen Note this, mobile phone perhaps other terminals and the unmanned machine can be robot or unmanned plane, telecar etc. is unmanned Equipment.And another is then the unmanned machine for being controlled to be moved and be able to carry out related shooting action.Therebetween Telecommunication, unmanned machine analyzes and determines the dependent instruction of transmission according to the motion state of itself, executes or forbids First state instruction sees room to achieve the purpose that remotely to control, while unmanned machine has automatic obstacle avoidance functions, intelligent Degree is high, and control mode is simple.
Below to a kind of method of sensitive information filtering provided by the present application, referring to Fig. 1, including:
S100, the communication information to be processed is received, wherein include characterizing the communication information access in the communication information The website information of address;
The communication information be for the information communicated between equipment and equipment, including instant messaging information, such as it is micro- The chat message of letter, QQ also includes solicited message, for example opens the solicited message of Website page, the sensitive information in the application The method of filtering is not only suitable for instant messaging information, is also applied for solicited message.
But either which kind of situation, it include characterizing the communication information to visit in the communication information being previously mentioned in the application Ask the website information of address.Such as:
When the communication information be instant messaging information when, the content of the communication information include: send communication account information, The communication body of website information and characterization communication particular content that the communication information to be accessed, website information herein is is wanted Website belonging to the specified account information that is sent to and the account information, such as the communication information are destined to and log in webpage Specified account, or the account logged in wechat, or the specified account logged in QQ or microblogging, Alipay.
When the communication information is solicited message, the content of the communication information includes: to send the account of the communication information The communication body of website information and characterization communication particular content that information, the communication information to be accessed, website information herein The address information of the Website page of display is opened for request.
S200, it is identified in the communication information according to preset detection list with the presence or absence of sensitive information, wherein the inspection It surveys list and enumerates set for sensitive information;
Identify that the process in the communication information with the presence or absence of sensitive information is a comparison according to preset detection list Process.In the application, what sensitive information actually referred to generation is some specific character strings, such as the word of characterization name, identity The contents such as card number, telephone number, bank's card number, express delivery number.Referring to Fig. 2, generally logical for the name occurred in instant messaging Cross in sentence whether occur " name ", " name ", in keyword as " title " and the sentence after semantics identity, The word as name rejecting the word in each character string in front and back of sentence containing the specific meaning and identifying.And identification card number, electricity Words number, bank's card number, express delivery number etc. have specific rule, for example telephone number is 11 digits, according to operator's front three Number it is different, the coding rule of bank's card number and express delivery number also has specific digit and ordering rule according to operator, lead to Cross in the server preset phone numbers associated, bank's card number, express delivery number, identification card number rule, to identify corresponding number It whether is sensitive information.
And the content of the webpage for solicited message mapping, the identification process of sensitive information are also the same, but by It is usually referring to Fig. 3, content is generally shown in specified position, therefore only to need to examine by what is editted in web page contents Appearance " name ", " name ", keyword as " title " are measured, subsequent content is then title, is occurred " bank's card number " Equal keywords, subsequent is exactly Bank Account Number, the keyword of " identification card number " occurs, subsequent is then the specific interior of identification card number Hold.
Pass through above-mentioned explanation, it is known that, in detection list, sensitive information enumerates set not only including the sensitive letter of characterization The keyword, such as " name, Bank Account Number, identification card number " etc. for ceasing particular content further include the rule for forming sensitive information, than Such as 110100 beginnings, add 18 ID card No. on date, 139 beginnings add the telephone number etc. of 11 bit digitals of area code.
Based on the above content, referring to Fig. 4, described identify in the communication information whether deposit according to preset detection list Include: in the method for sensitive information
S210, character field included in the communication information is obtained;
Sensitive information in two kinds of above-mentioned application scenarios is all the character field by keyword or characterization sensitive information It come what is identified, therefore firstly the need of extraction is character field all in the communication information during identifying.
S220, the character field that sensitive information is characterized in the character field and the detection list is compared, with judgement It whether there is the sensitive information in the communication information;
After extracting character field, need the character of all characterization sensitive informations in the character field and detection list Duan Jinhang is matched one by one, and what is matched then regards as sensitive information.
If S300, detecting in the communication information there are when the sensitive information, obtained in preset rules database With the website information have mapping relations sensitive information filtering rule, with according to the sensitive information filtering rule to described Sensitive information is filtered.
Preset rules database is the rule that will be filtered and formulate from different website information sensitive informations.No Same website information means that the content of display may be different.It is mentioned in above-mentioned steps S100, the communication information is according to application Occasion, content includes that the account information for sending communication, the website information to be accessed of the communication information and characterization communication have The communication body held in vivo.In the application, the rank of particular content and account in the corresponding webpage of website information can all reflect Different filtering rules is penetrated, specifically includes following several:
In one embodiment, sensitive information filtering rule includes: the character for blocking the designated position in the sensitive information Section.By shield portions character field to be protected to sensitive information.The position blocked is carried out by default rule.Such as:
Website information in the communication information are as follows:/web/policy/getPolicyList.do
Website information specifically includes the content in requisition for display:
In the present embodiment, the rule of the sensitive information filtering of configuration are as follows:
Illustrate: field represents data level, type representative needs that filtering rule used
After processing, sensitive information is shown are as follows:
Equally, in this application, the sensitive information filtering rule further include: obtain the type of the sensitive information, root The character field of the designated position in the sensitive information is blocked according to the type mapped sensitive information filtering rule.
The filtering that different types of sensitive information carries out different rules can be realized by configuring different filtering rules. For example, only display surname, when sensitive information is ID card No., hides referring to Fig. 5, blocking name when sensitive information is name Intermediate 8 bit digitals are kept off, when sensitive information is telephone number, 6 intermediate bit digitals is blocked, when sensitive information is bank's card number, hides 8 etc. among gear.
The rule blocked above is only one such, and in the application, different screenings is matched according to different website informations Gear is regular, such as website information A, website information B and website information C, shows same type in the corresponding webpage of three website informations The information of type is blocked rule by configuring different, can be occurred different when requesting access to these three website informations In circumstance of occlusion, such as the corresponding webpage of website information A, showing the rule of ID card No. to block centre 8 is number, and net In the corresponding webpage of location information B, show that the rule of ID card No. is to block last 8 bit digital, in the corresponding net of website information C In page, show that the rule of ID card No. is to block intermediate 6 bit digitals.
Further, due to further including the account information requested access in communication information, therefore can be to account information setting One permission, when carrying out sensitive information filtering, increase detection account information permission the step for, according to different accounts The permission of information blocks webpage information, for example account information includes user A, user B and user C, when three users are same When access the same webpage, user A is administrator right, the webpage that the user of the permission logins its detected sensitivity Without filtering when information, user B is certified member user, after the user of the permission logins webpage, is detecting net In page when have sensitive information, the sensitive information in webpage is blocked wherein sub-fraction content, for example ID card information hides Keep off 4 intermediate bit digitals;User C is unverified ordinary user, after the user of the permission logins webpage, then in the net of its display In page, sensitive information is blocked entirely.
Further, for some information, dynamic filtration can also be carried out according to content.The rule of one of dynamic filtration Then are as follows: the character field in the sensitive information is compared with common numerical data base, judges whether the character field is included in Character field in the common numerical data base;
The character field being comprised in described in display in common numerical data base;
When all character fields in the sensitive information not in the common numerical data base when, arbitrarily show described quick Feel one of character field in information.
For being filtered to name, common surname database and common first names data are set in one of the embodiments, It identifies the first name and last name in name when detecting sensitive information is name, is carried out in corresponding database respectively in library Matching, the filtering rule of sensitive information specifically: when the surname for detecting user is common surname Shi, then some hidden word from name, Otherwise surname is disclosed, name is hidden.In the case where hiding name, when user name is three and its above word, each word is retrieved Whether the word in common name database is not hidden, is hidden not in common name database when the word is in common name database In word hide surname and one of name when name attaches most importance to reduplicated word, when surname and name are all rarely used word, name is then preferentially disclosed. According to above-mentioned filtering rule, such as next display table for name can be obtained, such as:
Serial number Name Situation is shown after filtering
1 Chen Qiang Old *
2 Piao Lin * woods
3 Zhou Yiyi * one *
4 It is beautifully adorned to make a mistake * it makes a mistake
It wherein, is relatively conventional surname as the " old " of surname, when forming the name of two words, open " old ", and show Show name." Piao " be not common as surname, when forming the name of two words, hides the surname, open name.Illustrate in third In, due to there is overlapping word in name, therefore surname and one of name are hidden, in the 4th signal, due to surname and the corresponding word of name It is uncommon, then name is preferentially disclosed.
It in this application, further include one for hidden when being checked after the completion of sensitive information filtering The display methods of the sensitive information of hiding, referring to Fig. 6, specifically including:
S400, the request instruction of checking for obtaining the sensitive information, described check in request instruction includes executing request to refer to The account information of order;
Operation of the request instruction from client on the client, for example the sensitive information being blocked is double-clicked, or logical The Show Button on the page is crossed, request instruction is checked in triggering after click.It should be noted that in this application, what is be triggered looks into See in request instruction that needing includes the account information for executing request instruction, that is, needs to carry out authentication.
A kind of situation is that user is not logged under the page currently shown, is hidden when clicking the Show Button or double-clicking When the sensitive information information of gear, due to there is no account information, then it cannot trigger this and check request instruction, only be logined, or Person is to can trigger this by specific interface input identity information rear to check request instruction, in order to filtered sensitive letter Breath is checked.
S500, whether the verifying account information has checks permission;
Check that request instruction carries account information due to above-mentioned, different account informations may match different permissions, Such as backstage manager, authorities personnel, the member user by authentication and the ordinary user without authentication Deng for the ease of safety management, can different account informations being carried out with rights management, such as the only specified permission of certain pages User can just open and check, or for certain data in the page, the user only having permission can just be checked.
S600, the permission mapped rule when the account information has and checks permission, according to the account information Show the sensitive information.
Since different users is configured for different permissions, rule are checked for the sensitive information of different authority configurations Then, the backstage manager to continue, authorities personnel, the member user by authentication and without authentication are given an account of above Ordinary user for, the rule of corresponding configuration are as follows: backstage manager user can directly check all information on webpage;Supervisor The identifying code that the user of department needs to show on input page before showing sensitive information;By the member user of authentication Need to input the identifying code being sent to on the mobile phone of account information binding before showing sensitive information;And without identity The ordinary user of verifying cannot then check the sensitive information, need to complete authentication, and execute member user checks rule Sensitive information can be checked.
Further, referring to Fig. 7, the method for above-mentioned verifying includes:
S610, the first verification information is sent to the account information and waits the second verifying fed back by the account information Information;
Here account information includes the telephone number of user registration, and in the present embodiment, the first verification information is sent to electricity After talking about number, the designated position after waiting user to receive the first verification information in webpage inputs first verification information, uses First verification information of family input is referred to as the second verification information.
S620, judge whether first verification information and second verification information meet preset condition;
In this application, preset condition is a kind of judgment criteria, and the preset condition in the present embodiment is that first sent is tested What card information and user actually entered second verifies whether the same, and expression meets the preset condition when the same, when different, The preset condition is not met then.
S630, when meeting preset condition, completely show the sensitive information.
When user input the second verification information meet preset condition, then can completely show the sensitive information.
Further, before being identified according to preset detection list in the communication information with the presence or absence of sensitive information, Further include:
Judge whether the communication information there is sensitive information to filter permission, the sensitive information filtering permission includes executing Sensitive information filters and does not execute the sensitive information filtering.When detect the communication information have sensitive information filter permission When, being identified according to preset detection list whether there is sensitive information in the communication information.
When communication information lack of competence carries out sensitive information filtering, then directly shown.Without carrying out sensitive information mistake The reason of filter may be that the communication information is not important, perhaps have no security risk can worry also or be because of business demand, it is right The sensitive information filtering permission for the communication information answered is changed, by it is original need to carry out sensitive information be filled into without into Row filtering or permission reduce, and the sensitive information filtering rule of adaptation is caused to change.When permission changes, in step The sensitive information filtering rule in preset rules database in S300 also accordingly changes, to match the mistake of sensitive information Filter.
A kind of device of sensitive information filtering is also disclosed in the application, referring to Fig. 8, including:
Obtain module 100: for receiving the communication information to be processed, wherein include described in characterization in the communication information The website information of communication information access address;
The communication information is for the information communicated between equipment and equipment comprising instant messaging information, such as The chat message of wechat, QQ also includes solicited message, for example opens the solicited message of Website page, the sensitive letter in the application The method of breath filtering is not only suitable for instant messaging information, is also applied for solicited message.
But either which kind of situation, it include characterizing the communication information to visit in the communication information being previously mentioned in the application Ask the website information of address.Such as:
When the communication information be instant messaging information when, the content of the communication information include: send communication account information, The communication body of website information and characterization communication particular content that the communication information to be accessed, website information herein is is wanted Website belonging to the specified account information that is sent to and the account information, such as the communication information are destined to and log in webpage Specified account, or the account logged in wechat, or the specified account logged in QQ or microblogging, Alipay.
When for solicited message, the content of the communication information includes: to send account information, the communication information of the communication information The communication body of the website information and characterization communication particular content to be accessed, website information herein are that display is opened in request Website page address information.
Processing module 200: whether there is sensitive information for identifying according to preset detection list in the communication information, Wherein, the detection list enumerates set for sensitive information;
Identify that the process in the communication information with the presence or absence of sensitive information is a comparison according to preset detection list Process.In the application, what sensitive information actually referred to generation is some specific character strings, such as the word of characterization name, identity The contents such as card number, telephone number, bank's card number, express delivery number.The name occurred in instant messaging, which is generally passed through in sentence, is It is no occur " name ", " name ", in keyword as " title " and the sentence after semantics identity, reject sentence Word in each character string in front and back containing the specific meaning and the word as name that identifies.And identification card number, telephone number, bank Card number, express delivery number etc. have specific rule, for example telephone number is 11 digits, different according to the number of operator's front three The coding rule of sample, bank's card number and express delivery number also has specific digit and ordering rule according to operator, by server In preset phone numbers associated, bank's card number, express delivery number, identification card number rule, to identify whether corresponding number is sensitive Information.
And the content of the webpage for solicited message mapping, the identification process of sensitive information are also the same, but by It is usually by what is editted in web page contents, content is generally shown in specified position, therefore only needs to detect appearance " surname Name ", " name ", keyword as " title ", subsequent content is then title, keywords such as " bank's card numbers " occurs, Subsequent is exactly Bank Account Number, the keyword of " identification card number " occurs, subsequent is then the particular content of identification card number.
Pass through above-mentioned explanation, it is known that, in detection list, sensitive information enumerates set not only including the sensitive letter of characterization The keyword, such as " name, Bank Account Number, identification card number " etc. for ceasing particular content further include the rule for forming sensitive information, than Such as 110100 beginnings, add 18 ID card No. on date, 139 beginnings add the telephone number etc. of 11 bit digitals of area code.
Execution module 300: if for detecting in the communication information there are when the sensitive information, in preset rules number According to the sensitive information filtering rule that there are mapping relations with the website information is obtained in library, to be filtered according to the sensitive information Rule is filtered the sensitive information.
Preset rules database is the tool in order to be filtered and formulate from different website information sensitive informations The rule of body.Different website informations means that the content of display may be different.It is mentioned in above-mentioned steps S100, communication letter Breath according to the occasion of application, content include the website information that the account information for sending communication, the communication information to be accessed and The communication body of characterization communication particular content.In the application, particular content and account in the corresponding webpage of website information Rank can all map different filtering rules.
In one embodiment, sensitive information filtering rule includes: the character for blocking the designated position in the sensitive information Section.By shield portions character field to be protected to sensitive information.The position blocked is carried out by default rule.
Equally, in this application, the sensitive information filtering rule further include: obtain the type of the sensitive information, root The character field of the designated position in the sensitive information is blocked according to the type mapped sensitive information filtering rule.
Further, for some information, dynamic filtration can also be carried out according to content.The rule of one of dynamic filtration Then are as follows:
Character field in the sensitive information is compared with common numerical data base, judge the character field whether include Character field in the common numerical data base;
The character field being comprised in described in display in common numerical data base;
When all character fields in the sensitive information not in the common numerical data base when, arbitrarily show described quick Feel one of character field in information.
For being filtered to name, common surname database and common first names data are set in one of the embodiments, It identifies the first name and last name in name when detecting sensitive information is name, is carried out in corresponding database respectively in library Matching, the filtering rule of sensitive information specifically: when the surname for detecting user is common surname Shi, then some hidden word from name, Otherwise surname is disclosed, name is hidden.In the case where hiding name, when user name is three and its above word, each word is retrieved Whether the word in common name database is not hidden, is hidden not in common name database when the word is in common name database In word hide surname and one of name when name attaches most importance to reduplicated word, when surname and name are all rarely used word, name is then preferentially disclosed.
Further, the application further include:
First acquisition submodule: for obtaining character field included in the communication information;
First judging submodule: for by the character field and characterize it is described detection list in sensitive information character field It is compared, to judge in the communication information with the presence or absence of the sensitive information.
Sensitive information in above-mentioned several application scenarios is all the character field by keyword or characterization sensitive information It come what is identified, therefore firstly the need of extraction is character field all in the communication information during identifying.When extracting character Duan Hou is needed with the character field of all characterization sensitive informations in detection list to be matched the character field one by one, be matched Then regard as sensitive information.
Further, further includes:
First acquisition submodule: described to check in request instruction for obtaining the request instruction of checking of the sensitive information Account information including executing request instruction;
Operation of the request instruction from client on the client, for example the sensitive information being blocked is double-clicked, or logical The Show Button on the page is crossed, request instruction is checked in triggering after click.It should be noted that in this application, what is be triggered looks into See in request instruction that needing includes the account information for executing request instruction, that is, needs to carry out authentication.
A kind of situation is that user is not logged under the page currently shown, then when clicking the Show Button or double-click quilt When the sensitive information information blocked, due to there is no account information, therefore this cannot be triggered and check request instruction, only be logined, This either can trigger by specific interface input identity information rear and check request instruction, in order to filtered sensitivity Information is checked.
First verifying submodule: whether have for verifying the account information and check permission;
Since request instruction carries account information for above-mentioned checking, different account informations may match different power Limit, such as backstage manager, authorities personnel, the member user by authentication and the common use without authentication Family etc. can carry out rights management to different account informations for the ease of safety management, such as the only specified power of certain pages The user of limit can just open and check, or for certain data in the page, the user only having permission can just be checked.
First implementation sub-module: for the power when the account information has and checks permission, according to the account information Limit mapped rule shows the sensitive information.
Since different users is configured for different permissions, rule are checked for the sensitive information of different authority configurations Then, the backstage manager to continue, authorities personnel, the member user by authentication and without authentication are given an account of above Ordinary user for, the rule of corresponding configuration is that backstage manager user can directly check all information on webpage, is responsible for The identifying code that the user of department needs to show on input page before showing sensitive information, by the member user of authentication Need to input the identifying code being sent to on the mobile phone of account information binding before showing sensitive information, and without identity The ordinary user of verifying cannot then check the sensitive information, need to complete authentication, and execute member user checks rule Sensitive information can be checked.
Further, further includes:
Second acquisition submodule: for sending the first verification information to the account information and waiting by the account information Second verification information of feedback;
It here include the telephone number of user registration in account information, in the present embodiment, the first verification information is sent to In telephone number, the designated position after waiting user to receive the first verification information in webpage inputs first verification information, First verification information of user's input is referred to as the second verification information.
Second verifying submodule: judge whether first verification information and second verification information meet default item Part;
In this application, preset condition is a kind of judgment criteria, and the preset condition in the present embodiment is that first sent is tested What card information and user actually entered second verifies whether the same, and expression meets the preset condition when the same, when different, The preset condition is not met then.
Second implementation sub-module: for completely showing the sensitive information when meeting preset condition.
When user input the second verification information meet preset condition, then can completely show the sensitive information.
Further, before being identified according to preset detection list in the communication information with the presence or absence of sensitive information, Further include a lower module:
Second judgment submodule: for judging whether the communication information there is sensitive information to filter permission, the sensitivity Information filtering permission includes executing sensitive information filtering and not executing the sensitive information to filter.When detecting the communication information When filtering permission with sensitive information, being identified according to preset detection list whether there is sensitive information in the communication information.
When communication information lack of competence carries out sensitive information filtering, then directly shown.Without carrying out sensitive information mistake The reason of filter may be that the communication information is not important, perhaps have no security risk can worry also or be because of business demand, it is right The sensitive information filtering permission for the communication information answered is changed, by it is original need to carry out sensitive information be filled into without into Row filtering or permission reduce, and the sensitive information filtering rule of adaptation is caused to change.When permission changes, in step The sensitive information filtering rule in preset rules database in S300 also accordingly changes, to match the mistake of sensitive information Filter.
The embodiment of the present invention provides computer equipment basic structure block diagram and please refers to Fig. 9.
The computer equipment includes processor, non-volatile memory medium, memory and the net connected by system bus Network interface.Wherein, the non-volatile memory medium of the computer equipment is stored with operating system, database and computer-readable finger It enables, control information sequence can be stored in database, when which is executed by processor, may make that processor is real A kind of method of existing sensitive information filtering.For the processor of the computer equipment for providing calculating and control ability, support is entire The operation of computer equipment.Computer-readable instruction can be stored in the memory of the computer equipment, the computer-readable finger When order is executed by processor, processor may make to execute a kind of method that sensitive information filters.The network of the computer equipment connects Mouth is used for and terminal connection communication.It will be understood by those skilled in the art that structure shown in Fig. 9, only with the application side The block diagram of the relevant part-structure of case does not constitute the restriction for the computer equipment being applied thereon to application scheme, tool The computer equipment of body may include perhaps combining certain components than more or fewer components as shown in the figure or having not Same component layout.
The status information for prompting behavior that computer equipment is sent by receiving associated client, i.e., whether associated terminal It opens prompt and whether user closes the prompt task.By verifying whether above-mentioned task condition is reached, and then eventually to association End sends corresponding preset instructions, so that associated terminal can execute corresponding operation according to the preset instructions, to realize Effective supervision to associated terminal.Meanwhile when prompt information state and preset status command be not identical, server end control Associated terminal persistently carries out jingle bell, the problem of to prevent the prompt task of associated terminal from terminating automatically after executing a period of time.
The present invention also provides a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one When a or multiple processors execute, so that one or more processors execute the filtering of sensitive information described in any of the above-described embodiment Method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note Recall body (Random Access Memory, RAM) etc..
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of method of sensitive information filtering characterized by comprising
Receive the communication information to be processed, wherein include the net for characterizing the communication information access address in the communication information Location information;
Being identified according to preset detection list whether there is sensitive information in the communication information, wherein the detection list is Sensitive information enumerates set;
If detecting in the communication information there are when the sensitive information, obtained and the network address in preset rules database Information have mapping relations sensitive information filtering rule, with according to the sensitive information filtering rule to the sensitive information into Row filtering.
2. the method for sensitive information filtering according to claim 1, which is characterized in that described according to preset detection list Identify that the method in the communication information with the presence or absence of sensitive information includes:
Obtain character field included in the communication information;
The character field that sensitive information is characterized in the character field and the detection list is compared, to judge the communication letter It whether there is the sensitive information in breath.
3. the method for sensitive information filtering according to claim 2, which is characterized in that the sensitive information filtering rule packet It includes: blocking the character field of the designated position in the sensitive information;Or the sensitive information filtering rule includes:
Character field in the sensitive information is compared with common numerical data base, judges whether the character field is included in institute State the character field in common numerical data base;
The character field being comprised in described in display in common numerical data base;
When all character fields in the sensitive information not in the common numerical data base when, arbitrarily show the sensitive letter One of character field in breath;
Or the sensitive information filtering rule further include: the type for obtaining the sensitive information is mapped according to the type Sensitive information filtering rule block the character field of the designated position in the sensitive information.
4. the method for sensitive information filtering according to claim 1 to 3, which is characterized in that further include:
The request instruction of checking of the sensitive information is obtained, described check includes the account letter for executing request instruction in request instruction Breath;
It verifies the account information and whether has and check permission;
When the account information, which has, checks permission, the permission mapped rule according to the account information shows described quick Feel information.
5. the method for sensitive information filtering according to claim 4, which is characterized in that the permission of the account information is reflected The rule penetrated includes:
The first verification information is sent to the account information and waits the second verification information fed back by the account information;
Judge whether first verification information and second verification information meet preset condition;
When meeting preset condition, the sensitive information is completely shown.
6. the method for sensitive information filtering according to claim 1, which is characterized in that know according to preset detection list With the presence or absence of before sensitive information in the not described communication information, further includes:
Judge whether the communication information there is sensitive information to filter permission, the sensitive information filtering permission includes executing sensitivity Information filtering and do not execute sensitive information filtering.
7. a kind of device of sensitive information filtering characterized by comprising
Obtain module: for receiving the communication information to be processed, wherein include characterizing the communication information in the communication information The website information of access address;
Processing module: it whether there is sensitive information in the communication information for identifying according to preset detection list, wherein institute It states detection list and enumerates set for sensitive information;
Execution module: if for detecting in the communication information there are when the sensitive information, in preset rules database The sensitive information filtering rule that there are mapping relations with the website information is obtained, according to the sensitive information filtering rule pair The sensitive information is filtered.
8. the device of sensitive information filtering according to claim 7, which is characterized in that further include:
First acquisition submodule: for obtaining character field included in the communication information;
First judging submodule: for carrying out pair the character field for characterizing sensitive information in the character field and the detection list Than to judge in the communication information with the presence or absence of the sensitive information.
9. a kind of computer equipment, which is characterized in that including memory and processor, being stored with computer in the memory can Reading instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as claim 1 to 6 Any one of the method for the filtering of sensitive information described in claim the step of.
10. a kind of storage medium for being stored with computer-readable instruction, which is characterized in that the computer-readable instruction is by one Or multiple processors are when executing, so that one or more processors are executed as described in any one of claims 1 to 6 claim Sensitive information filtering method the step of.
CN201811123047.1A 2018-09-26 2018-09-26 Method, apparatus, computer equipment and the storage medium of sensitive information filtering Pending CN109492423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811123047.1A CN109492423A (en) 2018-09-26 2018-09-26 Method, apparatus, computer equipment and the storage medium of sensitive information filtering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811123047.1A CN109492423A (en) 2018-09-26 2018-09-26 Method, apparatus, computer equipment and the storage medium of sensitive information filtering

Publications (1)

Publication Number Publication Date
CN109492423A true CN109492423A (en) 2019-03-19

Family

ID=65689928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811123047.1A Pending CN109492423A (en) 2018-09-26 2018-09-26 Method, apparatus, computer equipment and the storage medium of sensitive information filtering

Country Status (1)

Country Link
CN (1) CN109492423A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110688628A (en) * 2019-10-09 2020-01-14 北京达佳互联信息技术有限公司 Multimedia information processing method and device and server
CN110830246A (en) * 2019-10-31 2020-02-21 北京东软望海科技有限公司 Intranet and extranet secure transmission control method and device, computer equipment and storage medium
CN111400765A (en) * 2020-03-25 2020-07-10 支付宝(杭州)信息技术有限公司 Private data access method and device and electronic equipment
CN113297513A (en) * 2021-07-28 2021-08-24 北京健康之家科技有限公司 Sensitive information coding method and device based on cloud mobile phone and storage medium
CN113496035A (en) * 2020-04-08 2021-10-12 阿里巴巴集团控股有限公司 Information, note information, code detection method, device and storage medium
CN114257563A (en) * 2021-12-20 2022-03-29 创盛视联数码科技(北京)有限公司 Method for filtering chat content callback in live broadcast room
CN114640713A (en) * 2020-12-15 2022-06-17 国际商业机器公司 Data access monitoring and control
CN115114557A (en) * 2022-08-30 2022-09-27 平安银行股份有限公司 Page data acquisition method and device based on block chain
CN115730345A (en) * 2022-11-03 2023-03-03 支付宝(杭州)信息技术有限公司 Private data processing method, detection engine and system
CN114640713B (en) * 2020-12-15 2024-04-30 国际商业机器公司 Data access monitoring and control

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8225396B1 (en) * 2009-03-27 2012-07-17 Symantec Corporation Systems and methods for detecting and warning users about hidden sensitive information contained in webpages
CN104615940A (en) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 Sensitive information displaying method and device
CN105471823A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 Sensitive information processing method, device, server and security determination system
CN107256367A (en) * 2017-06-06 2017-10-17 珠海市魅族科技有限公司 A kind of information processing method and device, terminal device and computer-readable recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8225396B1 (en) * 2009-03-27 2012-07-17 Symantec Corporation Systems and methods for detecting and warning users about hidden sensitive information contained in webpages
CN105471823A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 Sensitive information processing method, device, server and security determination system
CN104615940A (en) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 Sensitive information displaying method and device
CN107256367A (en) * 2017-06-06 2017-10-17 珠海市魅族科技有限公司 A kind of information processing method and device, terminal device and computer-readable recording medium

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110688628B (en) * 2019-10-09 2021-08-13 北京达佳互联信息技术有限公司 Multimedia information processing method and device and server
CN110688628A (en) * 2019-10-09 2020-01-14 北京达佳互联信息技术有限公司 Multimedia information processing method and device and server
CN110830246A (en) * 2019-10-31 2020-02-21 北京东软望海科技有限公司 Intranet and extranet secure transmission control method and device, computer equipment and storage medium
CN111400765B (en) * 2020-03-25 2021-11-02 支付宝(杭州)信息技术有限公司 Private data access method and device and electronic equipment
CN111400765A (en) * 2020-03-25 2020-07-10 支付宝(杭州)信息技术有限公司 Private data access method and device and electronic equipment
CN113496035A (en) * 2020-04-08 2021-10-12 阿里巴巴集团控股有限公司 Information, note information, code detection method, device and storage medium
CN114640713A (en) * 2020-12-15 2022-06-17 国际商业机器公司 Data access monitoring and control
CN114640713B (en) * 2020-12-15 2024-04-30 国际商业机器公司 Data access monitoring and control
CN113297513A (en) * 2021-07-28 2021-08-24 北京健康之家科技有限公司 Sensitive information coding method and device based on cloud mobile phone and storage medium
CN114257563A (en) * 2021-12-20 2022-03-29 创盛视联数码科技(北京)有限公司 Method for filtering chat content callback in live broadcast room
CN114257563B (en) * 2021-12-20 2023-10-24 创盛视联数码科技(北京)有限公司 Filtering method for chat content callback in live broadcasting room
CN115114557A (en) * 2022-08-30 2022-09-27 平安银行股份有限公司 Page data acquisition method and device based on block chain
CN115114557B (en) * 2022-08-30 2023-03-31 平安银行股份有限公司 Page data acquisition method and device based on block chain
CN115730345A (en) * 2022-11-03 2023-03-03 支付宝(杭州)信息技术有限公司 Private data processing method, detection engine and system
CN115730345B (en) * 2022-11-03 2023-10-20 支付宝(杭州)信息技术有限公司 Privacy data processing method, detection engine and system

Similar Documents

Publication Publication Date Title
CN109492423A (en) Method, apparatus, computer equipment and the storage medium of sensitive information filtering
US9767164B2 (en) Context based data searching
US8219816B2 (en) IVR call routing using encrypted data
EP2830296B1 (en) Method and apparatus for processing data and message
US7983399B2 (en) Remote notification system and method and intelligent agent therefor
CN105787366A (en) Android software visualization safety analysis method based on module relations
CN105516133A (en) User identity verification method, server and client
WO2020098122A1 (en) Workflow engine control method and apparatus, computer device and storage medium
CN103365812A (en) Method and system for data privacy engine
CN105939370A (en) Method and device for updating URL library
CN110113315A (en) A kind of processing method and equipment of business datum
CN106471497A (en) Auxiliary using context browses
CN108848276A (en) Telephone number method for detecting availability, system, equipment and storage medium
CN106845208A (en) abnormal application control method, device and terminal device
CN109377618A (en) Guard method and device
WO2005031523A2 (en) Systems and methods for sharing data between entities
CN101180825B (en) Identity system for use in a computing environment
CN115146815A (en) Service processing method, device, computer and readable storage medium
CN106776066A (en) Multi-system function processing method and device
CN105208179A (en) Telephone number recognition system and method, and electronic product
US20140214423A1 (en) Technology For Combating Mobile Phone Criminal Activity
CN112650732A (en) Service processing method, device, equipment and storage medium
CN109871211A (en) Information displaying method and device
US20070271229A1 (en) System and method for data searching among multiple enterprise applications
CN108449518A (en) Insurance contract pays a return visit method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination