CN110135140A - Information protecting method, device, computer equipment and storage medium - Google Patents

Information protecting method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110135140A
CN110135140A CN201910311763.0A CN201910311763A CN110135140A CN 110135140 A CN110135140 A CN 110135140A CN 201910311763 A CN201910311763 A CN 201910311763A CN 110135140 A CN110135140 A CN 110135140A
Authority
CN
China
Prior art keywords
page
content
information protection
information
screenshotss
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910311763.0A
Other languages
Chinese (zh)
Inventor
许剑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910311763.0A priority Critical patent/CN110135140A/en
Publication of CN110135140A publication Critical patent/CN110135140A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

This application involves a kind of information protecting method, device, computer equipment and storage mediums.The described method includes: obtaining page open request, the corresponding page is opened according to page open request;Identify the page type of the page;Corresponding information protection content is obtained according to page type;The page info for obtaining the page judges whether match information protects content to page info;When page info match information protects content, and detects that the corresponding screenshotss of page info operate, authentication is triggered;If authentication passes through, screenshotss operation is responded;If authentication does not pass through, information protection is triggered, executes pre-operation corresponding with information protection.The comprehensive of information protection can be improved using this method.

Description

Information protecting method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of information protecting method, device, computer equipment and Storage medium.
Background technique
The fast development of Internet technology, the problem of accelerating the efficiency of information propagation, but also bring information security simultaneously. Also, with the development of intelligent terminal technology and universal, mode of the screenshotss as common information propagation a kind of between intelligent terminal. By screen printing content, screen is propagated to social good friend, improves communication efficiency between good friend.
However, being such as related to interface for password input, personal information and fund account information if screen content is related to sensitive interface When equal privacy interfaces, if supporting screenshotss operation, the leakage of personal information will lead to.Traditionally application program, for sensitive interface Developer, which pre-sets, forbids screenshotss, to prevent information leakage through screenshotss.But this mode is excessively limited to, and is only capable of pair Forbid screenshotss in specific sensitive interface.It when user opens other sensitive interfaces, can not achieve the effect that anti-screenshotss, believe Breath still has disclosure risk.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of information protection that can prevent information leakage comprehensively Method, apparatus, computer equipment and storage medium.
A kind of information protecting method, which comprises
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to the page type;
The page info for obtaining the page, judges whether the page info matches the information protection content;
When the page info matches the information protection content, and detect the corresponding screenshotss behaviour of the page info When making, authentication is triggered;
If the authentication passes through, the screenshotss operation is responded;
If the authentication does not pass through, information protection is triggered, executes pre-operation corresponding with the information protection.
The information protection content includes default sensitive content in one of the embodiments,;It is described according to the page Type obtains the step of corresponding information protection content, comprising:
When the page type is the online page, default sensitive content is obtained with server communication;
The page info includes content of pages;Whether the page info for obtaining the page, judge page info The step of matching the information protection content, comprising:
The content of pages is scanned, judges whether to include default sensitive content;
If so, the page info matches the information protection content.
The scanning content of pages in one of the embodiments, judges whether to include the side for presetting sensitive content Formula, any one or more including following manner: analyzing the keyword of the content of pages, detects whether to include default sensitivity Content;Or judge whether the content of pages includes default sensitive content by regular expression;Or the control of the detection page, root It whether include default sensitive content according to the determined property of control.
The information protection content is information protection page listings in one of the embodiments,;It is described according to the page Noodles type obtains the step of corresponding information protection content, comprising:
When the page type is the primary page, local information protection page listings are loaded;
The page info includes page iden-tity;Whether the page info for obtaining the page, judge page info The step of matching the information protection content, comprising:
Page iden-tity is obtained,
Determine current page whether in the information protection page listings according to the page iden-tity;
If current page, in the information protection page listings, the page info matches in the information protection Hold.
In one of the embodiments, the method also includes:
When the page info matching information protection content, and detect the corresponding screenshotss operation of the page info When, it generates warning information and obtains default contact information;
The warning information is sent to contact person according to the contact information.
The triggering information protection in one of the embodiments, executes pre-operation corresponding with the information protection, packet It includes:
Identify the information protection content in the position of current screen;
It is operated according to the screenshotss and obtains screenshotss content picture;
According to the position of the information protection content, increasing in the corresponding position of the screenshotss content picture not can recognize sample Formula obtains screenshot picture.
Information protection is triggered in one of the embodiments, after executing pre-operation corresponding with the information protection, also Include:
It generates information protection information and shows.
A kind of information protection device, described device include:
Module is obtained, for obtaining page open request, the corresponding page is opened according to page open request;
Identification module, for identification page type of the page;
The acquisition module is also used to obtain corresponding information protection content according to the page type;;
Judgment module judges whether the page info matches the information for obtaining the page info of the page Protect content;
Trigger module is used for when the page info matches the information protection content, and detects the page letter When ceasing the operation of corresponding screenshotss, authentication is triggered;
Respond module responds the screenshotss operation if the authentication passes through;
Execution module triggers information protection if the authentication does not pass through, and executes corresponding with the information protection Pre-operation.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device realizes information protecting method described in any of the above embodiments when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Described in any item information protecting methods are realized when row.
Above- mentioned information guard method, device, computer equipment and storage medium request to open correspondence according to the opening of user After the page, identifies the page type of the page and corresponding information protection content is obtained according to the page type of the page, then when logical When crossing judgement and determine page info match information protection content, and detecting the screenshotss operation to page info, triggering identity is tested Card triggers information protection according to authentication result, executes pre-operation corresponding with information protection.Due to according to different classes of pages Type setting information protects content, it is ensured that can cover various page types.Information protection is carried out respectively again according to page info, is expanded Big information protection Page Range, and authentication further is carried out to screenshotss personnel, information security is improved comprehensively.
Detailed description of the invention
Fig. 1 is the application scenario diagram of information protecting method in one embodiment;
Fig. 2 is the flow diagram of information protecting method in one embodiment;
Fig. 3 be one embodiment in judge page info whether match information protection content flow diagram;
Fig. 4 is the structural block diagram of information protection device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Information protecting method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, user is whole End 102 is communicated by network with server 104.User terminal 102 obtains page open request, is requested according to page open Open the corresponding page;The page type of the identification page of user terminal 102;User terminal 102 is obtained according to page type and is corresponded to Information protection content;User terminal 102 obtains the page info of the page, judges whether page info matches the information protection Content;When page info match information protects content, and detects that the corresponding screenshotss of page info operate, user terminal 102 Trigger authentication;If user terminal 102 determines that authentication passes through, screenshotss operation is responded;If user terminal 102 determines body Part verifying does not pass through, then user terminal 102 triggers information protection, executes pre-operation corresponding with information protection.Wherein, terminal 102 can be, but not limited to be various personal computers, laptop, smart phone, tablet computer and portable wearable set Standby, server 104 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of information protecting method, it is applied in Fig. 1 in this way It is illustrated for user terminal, comprising the following steps:
Step S202 obtains page open request, opens the corresponding page according to page open request.
Wherein, page open request refers to the instruction for requesting user terminal to open corresponding page.Specifically, Yong Hutong The application program for crossing touch screen or key operation user terminal generates page open request, if user requests the page opened at this Ground, then the page open request generated of user terminal response user's operation opens the corresponding page from local be loaded directly into.If User requests the page opened there is no locally, then user terminal response opens request and loads page on corresponding line to server Face.It, can access address by the page or preset page number when user terminal loads the corresponding page to server The corresponding page is loaded to server.
Step S204 identifies the page type of the page.
Wherein, the different pages has different page types, and page type includes the Native page (the primary page), plug-in unit The page and the H5 page.The primary page is local page, and the plug-in unit page and the H5 page are the online page.Specifically, work as user terminal After opening the corresponding page according to the request of the page open of user, the page type for the page that is opened is identified first.
Step S206 obtains corresponding information protection content according to page type.
Wherein, information protection content is by previously according to letter corresponding with page type set by different page types Protected mode is ceased, different page types has different information protecting methods.That is, information protection content include with it is primary The corresponding information protection content of the page, and the corresponding information protection content of the plug-in unit page and information protection corresponding with the H5 page Content.It in the present embodiment, is the page for needing to open online since the plug-in unit page and the H5 page all need not exist for local Face, the corresponding information protection content of the plug-in unit page and the H5 page are identical.
Specifically, after user terminal response user, which opens request, opens the corresponding page, user terminal identification judgement should The page type of the page obtains the corresponding information protection content of primary page type if page type is the primary page.If page Noodles type is the plug-in unit page or the H5 page, then obtains the plug-in unit page and the corresponding information protection content of the H5 page.Wherein, information Protection content can send storage locally in advance by server, when obtaining, directly obtain corresponding information protection from local Content can save the time.It can also be by requesting to obtain the corresponding information protection content of page type to server in real time, it can To save local resource, it is ensured that use the information protection content of latest edition.
Step S208 obtains the page info of the page, judges whether match information protects content to page info.
Wherein, page info refers to information included by the page that is opened, including content of pages and page iden-tity.Specifically Ground obtains the page of the page after user terminal gets corresponding information protection content according to the page type judged Information, judges whether the page info matches with the information protection content got, that is, judges whether the page needs Information protection is carried out, the content of pages of the general page contains sensitive content or the page belongs to the preset information protection page, i.e., The page needs to carry out information protection.
Step S210 when page info match information protects content, and detects the corresponding screenshotss operation of page info When, trigger authentication.
Step S212 responds screenshotss operation if authentication passes through.
Step S214 triggers information protection if authentication does not pass through, and executes pre-operation corresponding with information protection.
Wherein, triggering information protection, which refers to, is taken corresponding guarantor after determining the page of the page to need information protection Shield operation, pre-operation are pre-set protection operation.
Specifically, if user terminal judges that page info matches with information protection content, the page is carried out in real time Monitoring.When user terminal monitors that user carries out screenshotss operation to the page, user terminal can determine that the page info is deposited By the risk of screenshotss.User terminal triggers authentication, and authentication request is sent to screenshotss personnel.Authentication includes But be not limited to password authentification, voice print verification, fingerprint authentication and recognition of face verifying etc..Receive the verifying knot that screenshotss personnel return Fruit, such as password is then received if password authentification, then judge whether the password is correct.It is if voice print verification, then received to be The voice of screenshotss personnel input, the vocal print feature by analyzing voice determine identity.If fingerprint authentication, then received is screenshotss The finger print information that personnel are inputted by touch-control.If recognition of face, then received is people that screenshotss personnel are shot by camera Face picture identifies determining identity by carrying out to face picture.Further, when the verifying that user terminal is returned according to screenshotss personnel As a result it identifies and determines that risk is not present in screenshotss personnel identity, then respond screenshotss operation and cut the page where page info Screen, obtains screenshot picture.
But if determining screenshotss personnel according to authentication result, there may be Information Security Risk, synchronous triggerings Start information protection mechanism, preset protection is executed by information protection mechanism and is operated, for example, by the correlation function of user terminal Setting is not available, it can be made not to be available by closing the function button of correlation function.
In one embodiment, executing pre-operation corresponding with information protection includes that setting communication function key is unavailable; Communication function key includes any one or more in screenshotss key, downloading key, saving button or record screen key.Specifically Ground, closing for function button can carry out corresponding setting according to the concrete condition of the page, for example, can not be following on the page The page info of the page info of load or the page itself can not support downloading, then can be with when closing communication function key Downloading key is not closed.By setting unavailable for communication function key in the present embodiment, that is, indicate to close user's use The function that terminal is propagated.When information can not be propagated, also can not just cause to reveal.
Above- mentioned information guard method requests after opening corresponding page according to the opening of user, identifies the page type of the page And corresponding information protection content is obtained according to the page type of the page, then when by judging to determine page info match information When protecting content, and detect that triggering authentication triggers according to authentication result and believes when operating to the screenshotss of page info Breath protection, executes pre-operation corresponding with information protection.Due to protecting content according to different page type setting informations, it is ensured that energy Enough cover various page types.Information protection is carried out respectively again according to page info, expands information protection Page Range, and Authentication further is carried out to screenshotss personnel, improves information security comprehensively.
In one embodiment, since the pre-set information protection content of different page type institutes is different, i.e., according to page The information protection content that noodles type is got is different.Wherein, in the present embodiment, when page type is the primary page, institute is pre- The information protection content being first arranged is information protection page listings.
Then as shown in figure 3, when page type is the primary page, judge whether match information protects content packet to page info Include following steps:
Step S302 obtains page iden-tity.
Wherein, page info includes content of pages and page iden-tity, and page iden-tity then refers to for being associated with the page and presetting Information protection page listings number.It specifically, is the page for needing to judge the primary page when page type is the primary page Whether face information meets the corresponding information protection content of the primary page, then obtains from page info and set in advance for the page first The page iden-tity set.
Whether step S304 determines current page in information protection page listings according to page iden-tity.
Step S306, if current page, in information protection page listings, page info match information protects content.
Specifically, due to the primary page be by developer mark required for information protection the page, so exploit person Information protection page listings are stored in service previously according to needing the page of information protection to establish information protection page listings by member Device.Storage needs the page of information protection namely in information protection page listings, wherein is deposited in information protection page listings The page of storage has corresponding page iden-tity.User terminal obtains information protection page listings from local, and searching from the list is The no page iden-tity for having the page, if so, then indicating that the page is stored in information protection page listings, then it represents that when the page Need the page of information protection, that is, page info match information protects content.
In the present embodiment, although information protection page listings are user terminals from local acquisition, but in addition to direct in advance It is stored in except local, periodically can also be sent to the user terminal information protection page listings by server, or service Device waits user terminal that information protection page listings are sent to user terminal again when sending request.Therefore, when user terminal obtains It, can be from the local information protection page for directly acquiring server and periodically sending in advance after getting the page iden-tity of the page List has searched whether the corresponding page according to page iden-tity from information protection page listings.Alternatively, list also can be generated Acquisition request is sent to server, and information protection page listings are then returned to use after server receives list acquisition request Family terminal, user terminal have searched whether the corresponding page further according to page iden-tity from information protection page listings.Only when When including the page corresponding with page iden-tity in information protection page listings, then it represents that the page belongs to information protection page listings In the page, be the page protected, i.e., the page info of the page and information protection content are matched.Alternatively, with Family terminal can also send over together page iden-tity with list acquisition request, after server receives page iden-tity, The corresponding page can have been searched whether from principal and subordinate's information protection page listings according to page iden-tity, directly return result to use Family terminal, user terminal determine whether match information protects content to page info according to result.No matter which kind of mode is matched Judgement, as long as the page has the corresponding page in information protection page listings, then it represents that the page is to need the page to be protected, Namely page info match information protects content.In the present embodiment, judged that raising is sentenced according to the characteristic of the primary page Disconnected accuracy.
In one embodiment, since the pre-set information protection content of different page type institutes is different, i.e., according to page The information protection content that noodles type is got is different.Wherein, in the present embodiment, when page type is the online page, i.e. plug-in unit When the page and the H5 page, the pre-set information protection content of institute is sensitive content.
Then when page type is the online page, i.e. the plug-in unit page or the H5 page, judge whether page info matches letter Breath protection content the following steps are included:
Step S1 scans content of pages, judges whether to include default sensitive content.
Step S2, if so, content of pages match information protects content.
Wherein, page info be include page iden-tity and content of pages, page iden-tity is used for the primary page, then content of pages The online page of user.Then when the page is the online page, content of pages is obtained from page info.Default sensitive content refers to hidden Personal letter breath, such as personal user information, personal account information or it is related to the amount of money, password etc..Due to the plug-in unit page and H5 pages Face is the page on line, and the no primary page of normal direction, which generally passes through to preset, needs the page to be protected to carry out recognizing the need for protect.Cause This, needs the sensitive content of information protection and judges whether the page needs information protection by presetting.Sensitive content be by Operation personnel safeguards and configures, and therefore, is established in default sensitivity by the sensitive content that operation personnel protects as needed Hold.The type and particular content of sensitive content, can be configured according to practical business.Specifically, when user terminal determines page When noodles type is the plug-in unit page or the H5 page, then with server communication, default sensitive content is obtained to server by request.
Specifically, when page type is the plug-in unit page or the H5 page, user terminal obtains the page from page info Content scans accessed content of pages, and whether test and analyze in content of pages includes in sensitive content, such as the detection page Whether include the sensitive vocabulary such as individual, account, the amount of money, identity card, or whether contain mailbox, mobile phone, identity card, amount of money etc. if holding Character, or it is whether useful in password, input frame control of amount of money input etc..If determining based on the analysis results, content of pages includes Above-mentioned described sensitive content, it is determined that the page is to need the page to be protected, that is to say, that the letter of the page corresponding to content of pages Breath is matched with information protection content.
In one embodiment, content of pages is scanned, judges whether to include default sensitive content to include in following manner Any one or more: analyzing the keyword of content of pages, detects whether to include default sensitive content;Or pass through regular expression Judge whether content of pages includes default sensitive content;Or detection the page control, according to the determined property of control whether include Default sensitive content.
Specifically, when scanning content of pages, content that the page is shown, that is, page text etc. can be obtained.Pass through The keyword of page Word Input content of pages belongs to individual, account, the amount of money, identity card etc. by judging whether keyword has Sensitive vocabulary determines whether content of pages includes sensitive content.Alternatively, judging whether contain postal in the page by regular expression The sensitive contents such as case, mobile phone, identity card, the amount of money.Wherein, regular expression is that (including general character is (for example, a is arrived to character string Letter between z) and spcial character (referred to as " metacharacter ")) operation a kind of logical formula, be exactly with predefined one The combination of a little specific characters and these specific characters, forms one " regular character string ", this " regular character string " is used to express To a kind of filter logic of character string.Regular expression is a kind of Text Mode, and mode description wants matched when searching for text One or more character strings.That is, by whether including mailbox, mobile phone, identity in regular expression filtering page content The character informations such as card, the amount of money.Alternatively, by obtain the page set by control, according to control property to determine whether comprising Sensitive information.Since the effect of the page control, that is, control property can be set when page control is generally arranged, for example, control Part is button or input frame etc..That is, can learn whether the control is for using by the control property for obtaining page control Family inputs the input frame control of password, the amount of money or other sensitive datas, if so, indicate that the page includes sensitive content, Determine that the page is that have the sensitive content belonged in default sensitive content namely page info and information protection content phase Match.
In one embodiment, when the page info matching information protection content, and detect that page info is corresponding When screenshotss operate, generates warning information and obtain default contact information;The warning information is sent according to contact information To contact person.
Specifically, when terminal detects screenshotss operation, then alarm information can be sent to default contact person for prompting User's this time screenshotss operation is dangerous, information leakage is easily caused, to prevent user's screenshotss or propagate screenshotss content.Its In, default contact person can be user and preset, and can set with the other users of user's close relation or default contact person It is set to user, that is, is then sent to the user terminal when sending alarm information.Work as if information protection is applied to public working environment In, then detect internal work personnel to office terminal carry out screenshotss when, due to there may be leakage corporate business risk, Then company Security Personnel or leading body at a higher level can be set by default contact person, by the way that screenshotss trend is sent to Security Personnel Or leading body at a higher level, to prevent employee from leaking the information such as corporate business.
In one embodiment, executing pre-operation mode corresponding with information protection further includes any one of following manner Kind: when detecting screenshotss operation, closes network connection or close the communications applications of terminal, or when detecting screenshotss operation, Alarm information is sent to default contact person, or when detecting screenshotss operation, triggers authentication, and pass through in authentication Afterwards, response screenshotss operation, or when detecting screenshotss operation, unrecognizable pattern is generated in screenshotss content, or when detection To when screenshotss operation, position of the sensitive content recognized in picture is determined, increase unrecognizable pattern in corresponding position, Obtain screenshot picture.
It wherein, will due to when determining that the page info and information protection content match, triggering information protection mechanism Screenshotss, downloading, preservation and record screen etc. are propagated keypress function setting and are not available.And when different model user terminal can not pass through Above-mentioned communication function can be realized in function button, carries out screenshotss for example, shaking etc., then closing keypress function still can not carry out Information protection.Therefore, in the present embodiment, information can be protected in the case where being not related to and closing and state communication function key Shield.
Specifically, when user terminal detects that user has screenshotss operation, because i.e. no matter which kind of operation side user passes through Formula starts screenshotss function, but as long as starting screenshotss function, user terminal can be detected.Therefore, user terminal is once examined Screenshotss are measured, then can be closed the network of user terminal so that user can not be propagated outward screenshotss content by network, or Person closes the communications applications of user terminal being currently running, such as mailbox, immediate communication tool etc..When communications applications can not In use, equally screenshotss content cannot be propagated outward.
Alternatively, when user terminal detect screenshotss operation when, trigger identification verification function, by authentication to user into Row identification, and after authentication passes through, then respond the operation of user's screenshotss.Ensure that the user of no screenshotss permission can not be into The operation of row screenshotss, to prevent information leakage, ensures information security.
In one embodiment, information protection is triggered, executes pre-operation corresponding with information protection further include: identification information Protect content in the position of current screen;It is operated according to screenshotss and obtains screenshotss content picture;According to the position of information protection content, Increasing in the corresponding position of screenshotss content picture not can recognize pattern, obtain screenshot picture.
Specifically, it when user terminal monitors screenshotss operation, generates and not can recognize pattern.Or as determining screenshotss personnel Authentication not by when regeneration not can recognize pattern.It, will not according to not can recognize that pattern modifies to screenshotss content It can recognize the sensitive information in style replacement screenshotss content.Wherein, it not can recognize that pattern includes but is not limited to fuzzy Show Styles With blank Show Styles etc..Specifically, it when user detects screenshotss operation, generates fuzzy Show Styles or blank shows sample Formula.Also, identify sensitive information position in screenshot picture by influencing identification technology, that is, needs in screenshotss content into The content of row information protection, i.e. sensitive information.If sensitive information quantity reaches preset value, can directly by fuzzy Show Styles and Blank Show Styles returns to terminal.It, can be by fuzzy Show Styles and sky if sensitive information quantity does not reach preset value White Show Styles is replaced with sensitive information, is equivalent to and is carried out fuzzy or space management to sensitive information, by sensitive information The screenshotss content being replaced returns to user as final screenshot picture.In the present embodiment, by screenshotss content modification, Not only meet user's screenshotss demand, also sensitive information is protected, prevents from revealing.
In one embodiment, after executing pre-operation corresponding with information protection mechanism, generation information is further comprised the steps of: Protect information.
Wherein, information protection information refers to for prompting the operations such as user its this screenshots, downloading, preservation or record screen to relate to And the prompt information to sensitive information.Specifically, when according to function such as information protection mechanism closing screenshotss, downloading, preservation and record screens Can, then it can return and " since the page includes sensitive information, be in information protection state, screenshotss, downloading, preservation and record screen etc. Function is not available " prompt information remind the above-mentioned function of user be not available.Alternatively, having received modification after user's screenshotss Prompt informations such as " the screenshotss content include sensitive information, has carried out protection processing " equally can be generated in screenshotss content afterwards.When Real-time display is in the display device of user terminal after information protection information generates, for can not only be informed by prompt information Why function is not available user, why screenshotss content is modified, moreover it is possible to further deepen user sensitive information protective awareness.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 4, providing a kind of information protection device, comprising: obtain module 402, identification Module 404, judgment module 406 and trigger module 408, in which:
Module 402 is obtained, for obtaining page open request, the corresponding page is opened according to page open request;
Identification module 404, for identification page type of the page;
The acquisition module 402 is also used to obtain corresponding information protection content according to page type;;
Judgment module 406 judges whether page info matches in the information protection for obtaining the page info of the page Hold;
Trigger module 408 is used for when page info matches the information protection content, and detects that page info is corresponding Screenshotss operation when, trigger authentication;
Respond module 410 responds screenshotss operation if authentication passes through;
Execution module 412 triggers information protection if authentication does not pass through, and executes pre- behaviour corresponding with information protection Make.
In one embodiment, module 402 is obtained to be also used to obtain when page type is the online page with server communication Take default sensitive content;Judgment module 404 is also used to scan content of pages, judges whether to include default sensitive content;If so, The page info matches the information protection content.
In one embodiment, judgment module 404 is also used to analyze the keyword of content of pages, detects whether to include default Sensitive content;Or judge whether content of pages includes default sensitive content by regular expression;Or the control of the detection page, root It whether include default sensitive content according to the determined property of control.
In one embodiment, module 402 is obtained to be also used to load local information when page type is the primary page Protect page listings;Whether judgment module 404 is also used to obtain page iden-tity, determine current page in information according to page iden-tity It protects in page listings;If current page, in information protection page listings, page info match information protects content.
In one embodiment, trigger module 406 is also used to protect content when page info match information, and detects page When information corresponding screenshotss in face operate, generates warning information and simultaneously obtain default contact information;It will be described according to contact information Warning information is sent to contact person.
In one embodiment, execution module 412 is also used to identification information protection content in the position of current screen;According to Screenshotss operation obtains screenshotss content picture;According to the position of information protection content, increase in the corresponding position of screenshotss content picture It not can recognize pattern, obtain screenshot picture.
In one embodiment, information protection device further includes generation module, for generating information protection information and showing.
Specific about information protection device limits the restriction that may refer to above for information protecting method, herein not It repeats again.Modules in above- mentioned information protective device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 5.The computer equipment includes processor, the memory, network interface, display connected by system bus Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate with external terminal by network connection.When the computer program is executed by processor with Realize a kind of information protecting method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, The input unit of the computer equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell Key, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of when executing computer program
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to page type;
The page info for obtaining the page judges whether match information protects content to page info;
When page info match information protects content, and when detecting page info corresponding screenshotss operation, body is triggered Part verifying;
If authentication passes through, screenshotss operation is responded;
If authentication does not pass through, information protection is triggered, executes pre-operation corresponding with information protection.
In one embodiment, it also performs the steps of when processor executes computer program when page type is online When the page, default sensitive content is obtained with server communication;Content of pages is scanned, judges whether to include default sensitive content;If It is that then the page info matches the information protection content.
In one embodiment, the pass of analysis content of pages is also performed the steps of when processor executes computer program Key word detects whether to include default sensitive content;Or judge whether content of pages includes in default sensitivity by regular expression Hold;Or the control of the detection page, it whether include default sensitive content according to the determined property of control.
In one embodiment, it is also performed the steps of when processor executes computer program when page type is primary When the page, local information protection page listings are loaded;Obtain page iden-tity, according to page iden-tity determine current page whether In information protection page listings;If current page, in information protection page listings, page info match information protects content.
In one embodiment, it also performs the steps of when processor executes computer program and believes when page info matches When ceasing protection content, and detecting that the corresponding screenshotss of page info operate, generating warning information, simultaneously contact information is preset in acquisition; The warning information is sent to contact person according to contact information.
In one embodiment, identification information protection content is also performed the steps of when processor executes computer program In the position of current screen;It is operated according to screenshotss and obtains screenshotss content picture;According to the position of information protection content, in screenshotss The corresponding position for holding picture, which increases, not can recognize pattern, obtain screenshot picture.
In one embodiment, it is also performed the steps of when processor executes computer program and generates information protection information And it shows.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to page type;
The page info for obtaining the page judges whether match information protects content to page info;
When page info match information protects content, and when detecting page info corresponding screenshotss operation, body is triggered Part verifying;
If authentication passes through, screenshotss operation is responded;
If authentication does not pass through, information protection is triggered, executes pre-operation corresponding with information protection.
In one embodiment, also performed the steps of when computer program is executed by processor when page type be When the line page, default sensitive content is obtained with server communication;Content of pages is scanned, judges whether to include default sensitive content; If so, the page info matches the information protection content.
In one embodiment, analysis content of pages is also performed the steps of when computer program is executed by processor Keyword detects whether to include default sensitive content;Or judge whether content of pages includes default sensitivity by regular expression Content;Or the control of the detection page, it whether include default sensitive content according to the determined property of control.
In one embodiment, it is also performed the steps of when computer program is executed by processor when page type is original When the raw page, local information protection page listings are loaded;Page iden-tity is obtained, whether current page is determined according to page iden-tity In information protection page listings;If current page is in information protection page listings, in the protection of page info match information Hold.
In one embodiment, it is also performed the steps of when computer program is executed by processor when page info matches Information protection content, and when detecting page info corresponding screenshotss operation, it generates warning information and simultaneously obtains default contact person's letter Breath;The warning information is sent to contact person according to contact information.
In one embodiment, it is also performed the steps of when computer program is executed by processor in identification information protection Hold in the position of current screen;It is operated according to screenshotss and obtains screenshotss content picture;According to the position of information protection content, in screenshotss The corresponding position of content picture, which increases, not can recognize pattern, obtain screenshot picture.
In one embodiment, it is also performed the steps of when computer program is executed by processor and generates information protection letter It ceases and shows.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of information protecting method, which comprises
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to the page type;
The page info for obtaining the page, judges whether the page info matches the information protection content;
When the page info matches the information protection content, and detects that the corresponding screenshotss of the page info operate, Trigger authentication;
If the authentication passes through, the screenshotss operation is responded;
If the authentication does not pass through, information protection is triggered, executes pre-operation corresponding with the information protection.
2. the method according to claim 1, wherein the information protection content includes default sensitive content;Institute State the step of corresponding information protection content is obtained according to the page type, comprising:
When the page type is the online page, default sensitive content is obtained with server communication;
The page info includes content of pages;The page info for obtaining the page, judges whether page info matches The step of information protection content, comprising:
The content of pages is scanned, judges whether to include default sensitive content;
If so, the page info matches the information protection content.
3. according to the method described in claim 2, it is characterized in that, the scanning content of pages, judges whether to include pre- If the mode of sensitive content, any one or more including following manner: the keyword of the content of pages is analyzed, detection is No includes default sensitive content;Or judge whether the content of pages includes default sensitive content by regular expression;Or inspection Whether the control for surveying the page includes default sensitive content according to the determined property of control.
4. the method according to claim 1, wherein the information protection content is information protection page listings; Described the step of corresponding information protection content is obtained according to the page type, comprising:
When the page type is the primary page, local information protection page listings are loaded;
The page info includes page iden-tity;The page info for obtaining the page, judges whether page info matches The step of information protection content, comprising:
Page iden-tity is obtained,
Determine current page whether in the information protection page listings according to the page iden-tity;
If current page, in the information protection page listings, the page info matches the information protection content.
5. the method according to claim 1, wherein the method also includes:
When the page info matches the information protection content, and detects that the corresponding screenshotss of the page info operate, It generates warning information and obtains default contact information;
The warning information is sent to contact person according to the contact information.
6. the method according to claim 1, wherein the triggering information protection, executes and the information protection Corresponding pre-operation, comprising:
Identify the information protection content in the position of current screen;
It is operated according to the screenshotss and obtains screenshotss content picture;
According to the position of the information protection content, increasing in the corresponding position of the screenshotss content picture not can recognize pattern, Obtain screenshot picture.
7. the method according to claim 1, wherein the triggering information protection, executes and the information protection After corresponding pre-operation, further includes:
It generates information protection information and shows.
8. a kind of information protection device, which is characterized in that described device includes:
Module is obtained, for obtaining page open request, the corresponding page is opened according to page open request;
Identification module, for identification page type of the page;
The acquisition module is also used to obtain corresponding information protection content according to the page type;;
Judgment module judges whether the page info matches the information protection for obtaining the page info of the page Content;
Trigger module is used for when the page info matches the information protection content, and detects the page info pair When the screenshotss operation answered, authentication is triggered;
Respond module responds the screenshotss operation if the authentication passes through;
Execution module triggers information protection if the authentication does not pass through, and executes pre- behaviour corresponding with the information protection Make.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910311763.0A 2019-04-18 2019-04-18 Information protecting method, device, computer equipment and storage medium Pending CN110135140A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910311763.0A CN110135140A (en) 2019-04-18 2019-04-18 Information protecting method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910311763.0A CN110135140A (en) 2019-04-18 2019-04-18 Information protecting method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110135140A true CN110135140A (en) 2019-08-16

Family

ID=67570155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910311763.0A Pending CN110135140A (en) 2019-04-18 2019-04-18 Information protecting method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110135140A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111753176A (en) * 2020-06-29 2020-10-09 金电联行(北京)信息技术有限公司 Automatic reminding system, browser end and method for enterprise credit investigation red blacklist
CN112764824A (en) * 2019-10-21 2021-05-07 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for triggering identity authentication in application program
CN113297513A (en) * 2021-07-28 2021-08-24 北京健康之家科技有限公司 Sensitive information coding method and device based on cloud mobile phone and storage medium
CN113794718A (en) * 2021-09-14 2021-12-14 交通运输信息安全中心有限公司 Security authentication method and security authentication device for multiple application systems

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631359A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Control method and device of webpage operation
CN105678181A (en) * 2015-12-28 2016-06-15 上海爱数信息技术股份有限公司 Screen capture prevention apparatus and method based on browser event
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN107180194A (en) * 2017-05-11 2017-09-19 北京安赛创想科技有限公司 View-based access control model analysis system carries out the method and device of Hole Detection
CN107330336A (en) * 2017-05-23 2017-11-07 中国人民解放军信息工程大学 The instant encryption and decryption method and system of (SuSE) Linux OS memory pages
CN108491729A (en) * 2018-02-26 2018-09-04 挖财网络技术有限公司 The method and device of dynamic protection privacy of user in Android system
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631359A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Control method and device of webpage operation
CN105678181A (en) * 2015-12-28 2016-06-15 上海爱数信息技术股份有限公司 Screen capture prevention apparatus and method based on browser event
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN107180194A (en) * 2017-05-11 2017-09-19 北京安赛创想科技有限公司 View-based access control model analysis system carries out the method and device of Hole Detection
CN107330336A (en) * 2017-05-23 2017-11-07 中国人民解放军信息工程大学 The instant encryption and decryption method and system of (SuSE) Linux OS memory pages
CN108491729A (en) * 2018-02-26 2018-09-04 挖财网络技术有限公司 The method and device of dynamic protection privacy of user in Android system
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112764824A (en) * 2019-10-21 2021-05-07 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for triggering identity authentication in application program
CN112764824B (en) * 2019-10-21 2023-10-10 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for triggering identity verification in application program
CN111753176A (en) * 2020-06-29 2020-10-09 金电联行(北京)信息技术有限公司 Automatic reminding system, browser end and method for enterprise credit investigation red blacklist
CN113297513A (en) * 2021-07-28 2021-08-24 北京健康之家科技有限公司 Sensitive information coding method and device based on cloud mobile phone and storage medium
CN113794718A (en) * 2021-09-14 2021-12-14 交通运输信息安全中心有限公司 Security authentication method and security authentication device for multiple application systems
CN113794718B (en) * 2021-09-14 2023-08-29 交通运输信息安全中心有限公司 Security authentication method and security authentication device for multiple application systems

Similar Documents

Publication Publication Date Title
CN110135140A (en) Information protecting method, device, computer equipment and storage medium
CN108377240B (en) Abnormal interface detection method and device, computer equipment and storage medium
CN108876133A (en) Risk assessment processing method, device, server and medium based on business information
CN110505201B (en) Conference information processing method, conference information processing device, computer equipment and storage medium
CN110489415B (en) Data updating method and related equipment
CN106713579B (en) Telephone number identification method and device
CN108256322B (en) Security testing method and device, computer equipment and storage medium
CN101452567B (en) Seal apparatus, seal system, and method for controlling the seal apparatus
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
US11721116B2 (en) Managing camera actions
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN110851872A (en) Risk assessment method and device for private data leakage
CN107491691A (en) A kind of long-range forensic tools Safety Analysis System based on machine learning
CN115567284A (en) Content security filtering method and system based on characters and pictures
CN111324375A (en) Code management method and device, computer equipment and storage medium
CN111488603A (en) Method and device for identifying sensitive content of printed file
CN111125748A (en) Judgment method and device for unauthorized query, computer equipment and storage medium
CN111259374B (en) Authority abnormity detection method and device, computer equipment and storage medium
CN115688107B (en) Fraud-related APP detection system and method
CN111352990A (en) Report generation management method and device, computer equipment and storage medium
CN110399046A (en) The processing method of candidate item, device, equipment and storage medium in input method
CN115422583A (en) Data desensitization method, system, medium and computing device
CN115048645A (en) Detection method, device, equipment and medium for collecting privacy information beyond range
CN110148002A (en) It is sold back to a grain-producing area method and device, the electronic equipment, storage medium of receipt

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190816

WD01 Invention patent application deemed withdrawn after publication