CN109492430A - A kind of internet Keywork method for secret protection and device based on obfuscated manner - Google Patents
A kind of internet Keywork method for secret protection and device based on obfuscated manner Download PDFInfo
- Publication number
- CN109492430A CN109492430A CN201811277941.4A CN201811277941A CN109492430A CN 109492430 A CN109492430 A CN 109492430A CN 201811277941 A CN201811277941 A CN 201811277941A CN 109492430 A CN109492430 A CN 109492430A
- Authority
- CN
- China
- Prior art keywords
- keyword
- search
- module
- obscure
- initialization module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to a kind of internet Keywork method for secret protection and device based on obfuscated manner, belongs to computer information processing field.Search initialization module will be sent to using keyword obscures keyword generation module, and N number of additional keyword is obscured according to using the format of keyword to generate, search service provider obtains desired search result from confusion result receiving module according to using keyword and obscuring keyword generation search result.Usefulness of the present invention is: being received by search initialization module and uses keyword, by obscuring, keyword generation module generation is multiple to obscure keyword, and keyword will be used and obscure keyword and be sent collectively to search service provider, and multiple search results are generated by search service provider, the search result of needs is then found out by search initialization module, the principle of the invention is clear, easy to operate, can effectively reduce the probability that privacy of user is leaked.
Description
Technical field
The present invention relates to a kind of internet Keywork method for secret protection and device based on obfuscated manner, belongs to computer
Field of information processing.
Background technique
In current web universe, there are the situations of a large amount of privacy abuse.For example it is searched by what main stream website platform inputted
Rope keyword, once completing hunting action, used keyword will soon be by the advertisement as other related web site platforms
It launches keyword to be used, be often the case that, you search for " sport footwear " in search engine, can be in the corresponding push of other websites
In advertisement occur be directed to " sport footwear " advertisement pushing, form directed entirely to privacy utilize.For keyword presenter's
For privacy, it may be said that problem is quite serious, in view of the above-mentioned problems, occurring a variety of guard methods in industry, also to solve face
The problem of facing.
Such as application No. is 201310308414.6, a kind of patent name are as follows: efficient secret protection ciphertext under cloud environment
The patent of invention of querying method, this patent need data set provider and cloud using one to achieve the purpose that secret protection
The interaction design of cause completes secret protection, cannot achieve unilateral secret protection.
For another example application No. is 201310275303.X, patent names are as follows: one kind protects internet by third-party platform
The method of privacy of user, this patent complete secret protection using third-party mode, belong to it is a kind of be actively engaged in many ways and
The Privacy Preservation Mechanism of mutual trust equally cannot achieve unilateral secret protection.
In order to achieve the purpose that protect privacy of user in industry, Obfuscating Algorithms are developed, Obfuscating Algorithms are exactly to issuing out
The program gone is reorganized and is handled, so that treated code and code completes identical function before handling, and obscure
Code afterwards is difficult to be difficult to obtain the real semanteme of program decompiling success by decompiling.The program generation being confused
Code, still in accordance with original File Format and instruction set, implementing result also with obscure before, only obfuscator will be in code
All variables, function, class title become brief English alphabet code name, in the condition for lacking corresponding function name and program annotation
Under, even if will be also difficult to read by decompiling.It is irreversible for obscuring simultaneously, some during obscuring not influence normally
The information of operation will permanently lose, and the loss of these information becomes more difficult to understand program.
This patent uses internet Keywork method for secret protection and device based on obfuscated manner, is mentioned with solving keyword
The problem of privacy out is leaked.
Summary of the invention
The technical problems to be solved by the present invention are: providing a kind of internet Keywork secret protection based on obfuscated manner
Method and apparatus, to solve the problems, such as that the privacy of keyword presenter is leaked.
In order to solve the above-mentioned technical problem, the present invention is achieved by the following technical solutions: one kind being based on obfuscated manner
Internet Keywork method for secret protection, method includes the following steps:
The parameter N for obscuring keyword generation module is arranged in S1, searchers according to actual needs, and parameter N is used to describe degree of aliasing, mix
Keyword generation module of confusing, which is also connected to, to be obscured on wordbook.
S2, searchers access search initialization module, and searchers uses keyword, search to the input of search initialization module
Initialization module loads searched page, and search initialization module will be sent to using keyword obscures keyword generation module;
S3, obscure keyword generation module reading and obscure wordbook, and is multiple additional according to using the format of keyword to generate
Obscure keyword, and keyword radom insertion will be used to obscure in keyword to multiple, the insertion position using keyword is to sit
Coordinate is returned to search initialization module by mark, then will be used keyword and be obscured keyword and send jointly to confusion result and connect
Receive module;
S4, confusion result receiving module access search service provider, obtain search service provider according to use keyword and
All all search results for obscuring keyword generation.
S5, search initialization module obtain desired inspection from confusion result receiving module according to keyword and coordinate is used
Rope is as a result, remaining search result is then abandoned by confusion result receiving module.
A kind of internet Keywork privacy protection device based on obfuscated manner, including obscure keyword generation module, mix
Confuse wordbook, search initialization module, confusion result receiving module.
The keyword generation module of confusing is connected together with wordbook is obscured.
Compared with prior art, usefulness of the present invention is: being received by search initialization module and uses keyword, led to
Cross obscure keyword generation module generate it is multiple obscure keyword, and keyword will be used and obscure keyword and be sent collectively to search
Rope service provider, and multiple search results are generated by search service provider, then found out by search initialization module
The search result needed, the principle of the invention is clear, easy to operate, can effectively reduce the probability that privacy of user is leaked.
Detailed description of the invention:
The following further describes the present invention with reference to the drawings.
Fig. 1 is structural schematic diagram of the invention.
Specific embodiment:
With reference to the accompanying drawing and specific embodiment the present invention will be described in detail: one kind as shown in Figure 1 be based on the side of obscuring
The internet Keywork method for secret protection of formula, method includes the following steps:
The parameter N for obscuring keyword generation module 2 is arranged in S1, searchers 1 according to actual needs, and parameter N is used to describe degree of aliasing,
Obscure keyword generation module 2 and be also connected to and obscures on wordbook 3.
S2, searchers 1 access search initialization module 4, and searchers 1 uses keyword to the input of search initialization module 4
5, search initialization module 4 loads searched page, and search initialization module 4 will be sent to using keyword 5 obscures keyword life
At module 2;
S3, obscure the reading of keyword generation module 2 and obscure wordbook 3, and is multiple additional according to using the format of keyword 5 to generate
Obscure keyword 6, and 5 radom insertion of keyword will be used to obscure in keyword 6 to multiple, and use the insertion position of keyword 5
It is set to coordinate 7, coordinate 7 is returned into search initialization module 4, then keyword 5 will be used and obscure keyword 6 and sent jointly to
Confusion result receiving module 8;
S4, confusion result receiving module 8 access search service provider 9, obtain search service provider 9 according to using keyword
5 and it is all obscure keyword 6 generation all search results 10.
S5, search initialization module 4 obtain from confusion result receiving module 8 and want according to keyword 5 and coordinate 7 is used
Search result 10 neutralize it is relevant using keyword 5 as a result, in search result 10 remaining search result 10 then by obscure knot
Fruit receiving module 8 abandons.
In use, searchers 1 sets using keyword 5 first, then keyword life is obscured in setting according to actual needs
At the parameter N of module 2.
Then keyword 5 will be used to be input in search initialization module 4, search initialization module 4 is received using pass
After keyword 5, search initialization module 4 will be then conveyed to using keyword 5 obscures keyword generation module 2.
Obscure keyword generation module 2 and receive and obscure wordbook 3 using after keyword 5, then recalling reading, passes through
Obscure wordbook 3 according to use the format of keyword 5 generate it is N number of it is additional obscure keyword 6, and keyword 5 will be used to be inserted into
To obscuring in keyword 6, and calculates and obscuring the coordinate 7 in keyword 6 using keyword 5.
Then obscuring keyword generation module 2 is sent to search initialization module 4 for coordinate 7, will also use 5 He of keyword
It is multiple to obscure keyword 6 and be sent to confusion result receiving module 8.
Confusion result receiving module 8 will then use keyword 5 and multiple obscure keyword 6 and send jointly to search service
Provider 9, and generate multiple search results 10 by search service provider 9, and search service provider 9 is by multiple inspections of generation
Hitch fruit 10 is sent back to confusion result receiving module 8.
Simultaneously scan for the search result that initialization module 4 reads needs according to coordinate 7 from confusion result receiving module 8
10, remaining search result 10 is abandoned.
Thus by one using keyword 5 generate it is multiple obscure keyword 6, and it is more that keyword 5 will be used to be inserted in
It is a to obscure in keyword 6, and remember the coordinate 7 using keyword 5, keyword 5 will be used and multiple obscure 6 one starting of keyword
Give search service provider 9, while generating multiple search results 10, it would be desirable to search result 10 can be mixed in all inspections
In hitch fruit 10, such search initialization module 4 will read the inspection of needs according to coordinate 7 from confusion result receiving module 8
Hitch fruit 10, remaining search result 10 are abandoned, so that the use that search initialization module 4 will cannot find out client is closed
Keyword 5, to effectively raise the safety of user's search.
It is emphasized that: the above is only presently preferred embodiments of the present invention, not make in any form to the present invention
Limitation, any simple modification, equivalent change and modification to the above embodiments according to the technical essence of the invention,
All of which are still within the scope of the technical scheme of the invention.
Claims (3)
1. a kind of internet Keywork method for secret protection based on obfuscated manner, which is characterized in that this method includes following step
It is rapid:
The parameter N for obscuring keyword generation module (2) is arranged in S1, searchers (1) according to actual needs, and parameter N is used to describe to mix
Degree of confusing is obscured keyword generation module (2) and is also connected to and obscures on wordbook (3);
S2, searchers (1) access search initialization module (4), and searchers (1) inputs to search initialization module (4) using pass
Keyword (5), search initialization module (4) load searched page, and search initialization module (4) will use keyword (5) to be sent to
Obscure keyword generation module (2);
S3, obscure keyword generation module (2) read obscure wordbook (3), and according to use keyword (5) format generate it is more
A additional obscures keyword (6), and keyword (5) radom insertion will be used to obscure in keyword (6) to multiple, uses key
The insertion position of word (5) be coordinate (7), coordinate (7) is returned to search initialization module (4), then will use keyword (5) and
Obscure keyword (6) and sends jointly to confusion result receiving module (8);
S4, confusion result receiving module (8) access search service provider (9) obtain search service provider (9) according to using
Keyword (5) and all search results (10) for obscuring keyword (6) generation;
S5, search initialization module (4) are obtained according to keyword (5) and coordinate (7) is used from confusion result receiving module (8)
Desired search result (10) neutralizes related using keyword (5) as a result, remaining search result in search result (10)
(10) it is then abandoned by confusion result receiving module (8).
2. a kind of internet Keywork privacy protection device based on obfuscated manner, it is characterised in that: raw including obscuring keyword
At module (2), obscure wordbook (3), search initialization module (4), confusion result receiving module (8).
3. the internet Keywork privacy protection device according to claim 2 based on obfuscated manner, it is characterised in that: institute
It states keyword generation module of confusing (2) and is connected together with wordbook (3) is obscured.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811277941.4A CN109492430A (en) | 2018-10-30 | 2018-10-30 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811277941.4A CN109492430A (en) | 2018-10-30 | 2018-10-30 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109492430A true CN109492430A (en) | 2019-03-19 |
Family
ID=65691660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811277941.4A Pending CN109492430A (en) | 2018-10-30 | 2018-10-30 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109492430A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733196A (en) * | 2021-04-02 | 2021-04-30 | 之江实验室 | Privacy protection method and system for resisting member reasoning attack based on vector confusion |
CN114065262A (en) * | 2021-11-26 | 2022-02-18 | 华中科技大学 | User privacy protection method in information retrieval |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462285A (en) * | 2014-11-28 | 2015-03-25 | 广东工业大学 | Privacy protection method for mobile service inquiry system |
CN106096439A (en) * | 2016-06-03 | 2016-11-09 | 武汉大学 | A kind of intimacy protection system obscured based on mobile user profile and method |
CN107358115A (en) * | 2017-06-26 | 2017-11-17 | 浙江大学 | A kind of multiattribute data for considering practicality goes privacy methods |
CN107748848A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
EP3358875A1 (en) * | 2017-02-03 | 2018-08-08 | Alcatel Lucent | Method for protecting privacy in data queries |
-
2018
- 2018-10-30 CN CN201811277941.4A patent/CN109492430A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462285A (en) * | 2014-11-28 | 2015-03-25 | 广东工业大学 | Privacy protection method for mobile service inquiry system |
CN106096439A (en) * | 2016-06-03 | 2016-11-09 | 武汉大学 | A kind of intimacy protection system obscured based on mobile user profile and method |
EP3358875A1 (en) * | 2017-02-03 | 2018-08-08 | Alcatel Lucent | Method for protecting privacy in data queries |
CN107358115A (en) * | 2017-06-26 | 2017-11-17 | 浙江大学 | A kind of multiattribute data for considering practicality goes privacy methods |
CN107748848A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733196A (en) * | 2021-04-02 | 2021-04-30 | 之江实验室 | Privacy protection method and system for resisting member reasoning attack based on vector confusion |
CN114065262A (en) * | 2021-11-26 | 2022-02-18 | 华中科技大学 | User privacy protection method in information retrieval |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhasin et al. | Hardware Trojan horses in cryptographic IP cores | |
Craigen et al. | Defining cybersecurity | |
Kaur et al. | Empirical analysis of web attacks | |
Pedreira et al. | A review of attacks, vulnerabilities, and defenses in industry 4.0 with new challenges on data sovereignty ahead | |
Altulaihan et al. | A survey on web application penetration testing | |
US20140344569A1 (en) | Protecting data | |
Gao et al. | Android malware detection via graphlet sampling | |
Roberts et al. | Intelligence-driven incident response: Outwitting the adversary | |
US8485428B1 (en) | Systems and methods for providing security information about quick response codes | |
CN108881230B (en) | Secure transmission method and device for government affair big data | |
CN109492430A (en) | A kind of internet Keywork method for secret protection and device based on obfuscated manner | |
Mauri et al. | Stride-ai: An approach to identifying vulnerabilities of machine learning assets | |
Ali et al. | [Retracted] Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code | |
Jiang et al. | Strongly separable codes | |
Serag et al. | {ZBCAN}: A {Zero-Byte}{CAN} Defense System | |
CN116992052B (en) | Long text abstracting method and device for threat information field and electronic equipment | |
CN116055067B (en) | Weak password detection method, device, electronic equipment and medium | |
US20200033839A1 (en) | Rule-based communicating of equipment data from an industrial system to an analysis system using uni-directional interfaces | |
Shaltout et al. | Applicable image security based on computational genetic approach and self-adaptive substitution | |
Chen et al. | Deuedroid: Detecting underground economy apps based on utg similarity | |
CN106817216A (en) | A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm | |
CN114338017B (en) | Sorting method and system based on secret sharing | |
CN110990848A (en) | Sensitive word encryption method and device based on hive data warehouse and storage medium | |
CN108134799B (en) | Novel coding and decoding method and device thereof | |
Dillon | Feature-level malware obfuscation in deep learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190319 |