CN110135140A - Information protecting method, device, computer equipment and storage medium - Google Patents
Information protecting method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110135140A CN110135140A CN201910311763.0A CN201910311763A CN110135140A CN 110135140 A CN110135140 A CN 110135140A CN 201910311763 A CN201910311763 A CN 201910311763A CN 110135140 A CN110135140 A CN 110135140A
- Authority
- CN
- China
- Prior art keywords
- page
- content
- information protection
- information
- screenshotss
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
This application involves a kind of information protecting method, device, computer equipment and storage mediums.The described method includes: obtaining page open request, the corresponding page is opened according to page open request;Identify the page type of the page;Corresponding information protection content is obtained according to page type;The page info for obtaining the page judges whether match information protects content to page info;When page info match information protects content, and detects that the corresponding screenshotss of page info operate, authentication is triggered;If authentication passes through, screenshotss operation is responded;If authentication does not pass through, information protection is triggered, executes pre-operation corresponding with information protection.The comprehensive of information protection can be improved using this method.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of information protecting method, device, computer equipment and
Storage medium.
Background technique
The fast development of Internet technology, the problem of accelerating the efficiency of information propagation, but also bring information security simultaneously.
Also, with the development of intelligent terminal technology and universal, mode of the screenshotss as common information propagation a kind of between intelligent terminal.
By screen printing content, screen is propagated to social good friend, improves communication efficiency between good friend.
However, being such as related to interface for password input, personal information and fund account information if screen content is related to sensitive interface
When equal privacy interfaces, if supporting screenshotss operation, the leakage of personal information will lead to.Traditionally application program, for sensitive interface
Developer, which pre-sets, forbids screenshotss, to prevent information leakage through screenshotss.But this mode is excessively limited to, and is only capable of pair
Forbid screenshotss in specific sensitive interface.It when user opens other sensitive interfaces, can not achieve the effect that anti-screenshotss, believe
Breath still has disclosure risk.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of information protection that can prevent information leakage comprehensively
Method, apparatus, computer equipment and storage medium.
A kind of information protecting method, which comprises
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to the page type;
The page info for obtaining the page, judges whether the page info matches the information protection content;
When the page info matches the information protection content, and detect the corresponding screenshotss behaviour of the page info
When making, authentication is triggered;
If the authentication passes through, the screenshotss operation is responded;
If the authentication does not pass through, information protection is triggered, executes pre-operation corresponding with the information protection.
The information protection content includes default sensitive content in one of the embodiments,;It is described according to the page
Type obtains the step of corresponding information protection content, comprising:
When the page type is the online page, default sensitive content is obtained with server communication;
The page info includes content of pages;Whether the page info for obtaining the page, judge page info
The step of matching the information protection content, comprising:
The content of pages is scanned, judges whether to include default sensitive content;
If so, the page info matches the information protection content.
The scanning content of pages in one of the embodiments, judges whether to include the side for presetting sensitive content
Formula, any one or more including following manner: analyzing the keyword of the content of pages, detects whether to include default sensitivity
Content;Or judge whether the content of pages includes default sensitive content by regular expression;Or the control of the detection page, root
It whether include default sensitive content according to the determined property of control.
The information protection content is information protection page listings in one of the embodiments,;It is described according to the page
Noodles type obtains the step of corresponding information protection content, comprising:
When the page type is the primary page, local information protection page listings are loaded;
The page info includes page iden-tity;Whether the page info for obtaining the page, judge page info
The step of matching the information protection content, comprising:
Page iden-tity is obtained,
Determine current page whether in the information protection page listings according to the page iden-tity;
If current page, in the information protection page listings, the page info matches in the information protection
Hold.
In one of the embodiments, the method also includes:
When the page info matching information protection content, and detect the corresponding screenshotss operation of the page info
When, it generates warning information and obtains default contact information;
The warning information is sent to contact person according to the contact information.
The triggering information protection in one of the embodiments, executes pre-operation corresponding with the information protection, packet
It includes:
Identify the information protection content in the position of current screen;
It is operated according to the screenshotss and obtains screenshotss content picture;
According to the position of the information protection content, increasing in the corresponding position of the screenshotss content picture not can recognize sample
Formula obtains screenshot picture.
Information protection is triggered in one of the embodiments, after executing pre-operation corresponding with the information protection, also
Include:
It generates information protection information and shows.
A kind of information protection device, described device include:
Module is obtained, for obtaining page open request, the corresponding page is opened according to page open request;
Identification module, for identification page type of the page;
The acquisition module is also used to obtain corresponding information protection content according to the page type;;
Judgment module judges whether the page info matches the information for obtaining the page info of the page
Protect content;
Trigger module is used for when the page info matches the information protection content, and detects the page letter
When ceasing the operation of corresponding screenshotss, authentication is triggered;
Respond module responds the screenshotss operation if the authentication passes through;
Execution module triggers information protection if the authentication does not pass through, and executes corresponding with the information protection
Pre-operation.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device realizes information protecting method described in any of the above embodiments when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Described in any item information protecting methods are realized when row.
Above- mentioned information guard method, device, computer equipment and storage medium request to open correspondence according to the opening of user
After the page, identifies the page type of the page and corresponding information protection content is obtained according to the page type of the page, then when logical
When crossing judgement and determine page info match information protection content, and detecting the screenshotss operation to page info, triggering identity is tested
Card triggers information protection according to authentication result, executes pre-operation corresponding with information protection.Due to according to different classes of pages
Type setting information protects content, it is ensured that can cover various page types.Information protection is carried out respectively again according to page info, is expanded
Big information protection Page Range, and authentication further is carried out to screenshotss personnel, information security is improved comprehensively.
Detailed description of the invention
Fig. 1 is the application scenario diagram of information protecting method in one embodiment;
Fig. 2 is the flow diagram of information protecting method in one embodiment;
Fig. 3 be one embodiment in judge page info whether match information protection content flow diagram;
Fig. 4 is the structural block diagram of information protection device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Information protecting method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, user is whole
End 102 is communicated by network with server 104.User terminal 102 obtains page open request, is requested according to page open
Open the corresponding page;The page type of the identification page of user terminal 102;User terminal 102 is obtained according to page type and is corresponded to
Information protection content;User terminal 102 obtains the page info of the page, judges whether page info matches the information protection
Content;When page info match information protects content, and detects that the corresponding screenshotss of page info operate, user terminal 102
Trigger authentication;If user terminal 102 determines that authentication passes through, screenshotss operation is responded;If user terminal 102 determines body
Part verifying does not pass through, then user terminal 102 triggers information protection, executes pre-operation corresponding with information protection.Wherein, terminal
102 can be, but not limited to be various personal computers, laptop, smart phone, tablet computer and portable wearable set
Standby, server 104 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of information protecting method, it is applied in Fig. 1 in this way
It is illustrated for user terminal, comprising the following steps:
Step S202 obtains page open request, opens the corresponding page according to page open request.
Wherein, page open request refers to the instruction for requesting user terminal to open corresponding page.Specifically, Yong Hutong
The application program for crossing touch screen or key operation user terminal generates page open request, if user requests the page opened at this
Ground, then the page open request generated of user terminal response user's operation opens the corresponding page from local be loaded directly into.If
User requests the page opened there is no locally, then user terminal response opens request and loads page on corresponding line to server
Face.It, can access address by the page or preset page number when user terminal loads the corresponding page to server
The corresponding page is loaded to server.
Step S204 identifies the page type of the page.
Wherein, the different pages has different page types, and page type includes the Native page (the primary page), plug-in unit
The page and the H5 page.The primary page is local page, and the plug-in unit page and the H5 page are the online page.Specifically, work as user terminal
After opening the corresponding page according to the request of the page open of user, the page type for the page that is opened is identified first.
Step S206 obtains corresponding information protection content according to page type.
Wherein, information protection content is by previously according to letter corresponding with page type set by different page types
Protected mode is ceased, different page types has different information protecting methods.That is, information protection content include with it is primary
The corresponding information protection content of the page, and the corresponding information protection content of the plug-in unit page and information protection corresponding with the H5 page
Content.It in the present embodiment, is the page for needing to open online since the plug-in unit page and the H5 page all need not exist for local
Face, the corresponding information protection content of the plug-in unit page and the H5 page are identical.
Specifically, after user terminal response user, which opens request, opens the corresponding page, user terminal identification judgement should
The page type of the page obtains the corresponding information protection content of primary page type if page type is the primary page.If page
Noodles type is the plug-in unit page or the H5 page, then obtains the plug-in unit page and the corresponding information protection content of the H5 page.Wherein, information
Protection content can send storage locally in advance by server, when obtaining, directly obtain corresponding information protection from local
Content can save the time.It can also be by requesting to obtain the corresponding information protection content of page type to server in real time, it can
To save local resource, it is ensured that use the information protection content of latest edition.
Step S208 obtains the page info of the page, judges whether match information protects content to page info.
Wherein, page info refers to information included by the page that is opened, including content of pages and page iden-tity.Specifically
Ground obtains the page of the page after user terminal gets corresponding information protection content according to the page type judged
Information, judges whether the page info matches with the information protection content got, that is, judges whether the page needs
Information protection is carried out, the content of pages of the general page contains sensitive content or the page belongs to the preset information protection page, i.e.,
The page needs to carry out information protection.
Step S210 when page info match information protects content, and detects the corresponding screenshotss operation of page info
When, trigger authentication.
Step S212 responds screenshotss operation if authentication passes through.
Step S214 triggers information protection if authentication does not pass through, and executes pre-operation corresponding with information protection.
Wherein, triggering information protection, which refers to, is taken corresponding guarantor after determining the page of the page to need information protection
Shield operation, pre-operation are pre-set protection operation.
Specifically, if user terminal judges that page info matches with information protection content, the page is carried out in real time
Monitoring.When user terminal monitors that user carries out screenshotss operation to the page, user terminal can determine that the page info is deposited
By the risk of screenshotss.User terminal triggers authentication, and authentication request is sent to screenshotss personnel.Authentication includes
But be not limited to password authentification, voice print verification, fingerprint authentication and recognition of face verifying etc..Receive the verifying knot that screenshotss personnel return
Fruit, such as password is then received if password authentification, then judge whether the password is correct.It is if voice print verification, then received to be
The voice of screenshotss personnel input, the vocal print feature by analyzing voice determine identity.If fingerprint authentication, then received is screenshotss
The finger print information that personnel are inputted by touch-control.If recognition of face, then received is people that screenshotss personnel are shot by camera
Face picture identifies determining identity by carrying out to face picture.Further, when the verifying that user terminal is returned according to screenshotss personnel
As a result it identifies and determines that risk is not present in screenshotss personnel identity, then respond screenshotss operation and cut the page where page info
Screen, obtains screenshot picture.
But if determining screenshotss personnel according to authentication result, there may be Information Security Risk, synchronous triggerings
Start information protection mechanism, preset protection is executed by information protection mechanism and is operated, for example, by the correlation function of user terminal
Setting is not available, it can be made not to be available by closing the function button of correlation function.
In one embodiment, executing pre-operation corresponding with information protection includes that setting communication function key is unavailable;
Communication function key includes any one or more in screenshotss key, downloading key, saving button or record screen key.Specifically
Ground, closing for function button can carry out corresponding setting according to the concrete condition of the page, for example, can not be following on the page
The page info of the page info of load or the page itself can not support downloading, then can be with when closing communication function key
Downloading key is not closed.By setting unavailable for communication function key in the present embodiment, that is, indicate to close user's use
The function that terminal is propagated.When information can not be propagated, also can not just cause to reveal.
Above- mentioned information guard method requests after opening corresponding page according to the opening of user, identifies the page type of the page
And corresponding information protection content is obtained according to the page type of the page, then when by judging to determine page info match information
When protecting content, and detect that triggering authentication triggers according to authentication result and believes when operating to the screenshotss of page info
Breath protection, executes pre-operation corresponding with information protection.Due to protecting content according to different page type setting informations, it is ensured that energy
Enough cover various page types.Information protection is carried out respectively again according to page info, expands information protection Page Range, and
Authentication further is carried out to screenshotss personnel, improves information security comprehensively.
In one embodiment, since the pre-set information protection content of different page type institutes is different, i.e., according to page
The information protection content that noodles type is got is different.Wherein, in the present embodiment, when page type is the primary page, institute is pre-
The information protection content being first arranged is information protection page listings.
Then as shown in figure 3, when page type is the primary page, judge whether match information protects content packet to page info
Include following steps:
Step S302 obtains page iden-tity.
Wherein, page info includes content of pages and page iden-tity, and page iden-tity then refers to for being associated with the page and presetting
Information protection page listings number.It specifically, is the page for needing to judge the primary page when page type is the primary page
Whether face information meets the corresponding information protection content of the primary page, then obtains from page info and set in advance for the page first
The page iden-tity set.
Whether step S304 determines current page in information protection page listings according to page iden-tity.
Step S306, if current page, in information protection page listings, page info match information protects content.
Specifically, due to the primary page be by developer mark required for information protection the page, so exploit person
Information protection page listings are stored in service previously according to needing the page of information protection to establish information protection page listings by member
Device.Storage needs the page of information protection namely in information protection page listings, wherein is deposited in information protection page listings
The page of storage has corresponding page iden-tity.User terminal obtains information protection page listings from local, and searching from the list is
The no page iden-tity for having the page, if so, then indicating that the page is stored in information protection page listings, then it represents that when the page
Need the page of information protection, that is, page info match information protects content.
In the present embodiment, although information protection page listings are user terminals from local acquisition, but in addition to direct in advance
It is stored in except local, periodically can also be sent to the user terminal information protection page listings by server, or service
Device waits user terminal that information protection page listings are sent to user terminal again when sending request.Therefore, when user terminal obtains
It, can be from the local information protection page for directly acquiring server and periodically sending in advance after getting the page iden-tity of the page
List has searched whether the corresponding page according to page iden-tity from information protection page listings.Alternatively, list also can be generated
Acquisition request is sent to server, and information protection page listings are then returned to use after server receives list acquisition request
Family terminal, user terminal have searched whether the corresponding page further according to page iden-tity from information protection page listings.Only when
When including the page corresponding with page iden-tity in information protection page listings, then it represents that the page belongs to information protection page listings
In the page, be the page protected, i.e., the page info of the page and information protection content are matched.Alternatively, with
Family terminal can also send over together page iden-tity with list acquisition request, after server receives page iden-tity,
The corresponding page can have been searched whether from principal and subordinate's information protection page listings according to page iden-tity, directly return result to use
Family terminal, user terminal determine whether match information protects content to page info according to result.No matter which kind of mode is matched
Judgement, as long as the page has the corresponding page in information protection page listings, then it represents that the page is to need the page to be protected,
Namely page info match information protects content.In the present embodiment, judged that raising is sentenced according to the characteristic of the primary page
Disconnected accuracy.
In one embodiment, since the pre-set information protection content of different page type institutes is different, i.e., according to page
The information protection content that noodles type is got is different.Wherein, in the present embodiment, when page type is the online page, i.e. plug-in unit
When the page and the H5 page, the pre-set information protection content of institute is sensitive content.
Then when page type is the online page, i.e. the plug-in unit page or the H5 page, judge whether page info matches letter
Breath protection content the following steps are included:
Step S1 scans content of pages, judges whether to include default sensitive content.
Step S2, if so, content of pages match information protects content.
Wherein, page info be include page iden-tity and content of pages, page iden-tity is used for the primary page, then content of pages
The online page of user.Then when the page is the online page, content of pages is obtained from page info.Default sensitive content refers to hidden
Personal letter breath, such as personal user information, personal account information or it is related to the amount of money, password etc..Due to the plug-in unit page and H5 pages
Face is the page on line, and the no primary page of normal direction, which generally passes through to preset, needs the page to be protected to carry out recognizing the need for protect.Cause
This, needs the sensitive content of information protection and judges whether the page needs information protection by presetting.Sensitive content be by
Operation personnel safeguards and configures, and therefore, is established in default sensitivity by the sensitive content that operation personnel protects as needed
Hold.The type and particular content of sensitive content, can be configured according to practical business.Specifically, when user terminal determines page
When noodles type is the plug-in unit page or the H5 page, then with server communication, default sensitive content is obtained to server by request.
Specifically, when page type is the plug-in unit page or the H5 page, user terminal obtains the page from page info
Content scans accessed content of pages, and whether test and analyze in content of pages includes in sensitive content, such as the detection page
Whether include the sensitive vocabulary such as individual, account, the amount of money, identity card, or whether contain mailbox, mobile phone, identity card, amount of money etc. if holding
Character, or it is whether useful in password, input frame control of amount of money input etc..If determining based on the analysis results, content of pages includes
Above-mentioned described sensitive content, it is determined that the page is to need the page to be protected, that is to say, that the letter of the page corresponding to content of pages
Breath is matched with information protection content.
In one embodiment, content of pages is scanned, judges whether to include default sensitive content to include in following manner
Any one or more: analyzing the keyword of content of pages, detects whether to include default sensitive content;Or pass through regular expression
Judge whether content of pages includes default sensitive content;Or detection the page control, according to the determined property of control whether include
Default sensitive content.
Specifically, when scanning content of pages, content that the page is shown, that is, page text etc. can be obtained.Pass through
The keyword of page Word Input content of pages belongs to individual, account, the amount of money, identity card etc. by judging whether keyword has
Sensitive vocabulary determines whether content of pages includes sensitive content.Alternatively, judging whether contain postal in the page by regular expression
The sensitive contents such as case, mobile phone, identity card, the amount of money.Wherein, regular expression is that (including general character is (for example, a is arrived to character string
Letter between z) and spcial character (referred to as " metacharacter ")) operation a kind of logical formula, be exactly with predefined one
The combination of a little specific characters and these specific characters, forms one " regular character string ", this " regular character string " is used to express
To a kind of filter logic of character string.Regular expression is a kind of Text Mode, and mode description wants matched when searching for text
One or more character strings.That is, by whether including mailbox, mobile phone, identity in regular expression filtering page content
The character informations such as card, the amount of money.Alternatively, by obtain the page set by control, according to control property to determine whether comprising
Sensitive information.Since the effect of the page control, that is, control property can be set when page control is generally arranged, for example, control
Part is button or input frame etc..That is, can learn whether the control is for using by the control property for obtaining page control
Family inputs the input frame control of password, the amount of money or other sensitive datas, if so, indicate that the page includes sensitive content,
Determine that the page is that have the sensitive content belonged in default sensitive content namely page info and information protection content phase
Match.
In one embodiment, when the page info matching information protection content, and detect that page info is corresponding
When screenshotss operate, generates warning information and obtain default contact information;The warning information is sent according to contact information
To contact person.
Specifically, when terminal detects screenshotss operation, then alarm information can be sent to default contact person for prompting
User's this time screenshotss operation is dangerous, information leakage is easily caused, to prevent user's screenshotss or propagate screenshotss content.Its
In, default contact person can be user and preset, and can set with the other users of user's close relation or default contact person
It is set to user, that is, is then sent to the user terminal when sending alarm information.Work as if information protection is applied to public working environment
In, then detect internal work personnel to office terminal carry out screenshotss when, due to there may be leakage corporate business risk,
Then company Security Personnel or leading body at a higher level can be set by default contact person, by the way that screenshotss trend is sent to Security Personnel
Or leading body at a higher level, to prevent employee from leaking the information such as corporate business.
In one embodiment, executing pre-operation mode corresponding with information protection further includes any one of following manner
Kind: when detecting screenshotss operation, closes network connection or close the communications applications of terminal, or when detecting screenshotss operation,
Alarm information is sent to default contact person, or when detecting screenshotss operation, triggers authentication, and pass through in authentication
Afterwards, response screenshotss operation, or when detecting screenshotss operation, unrecognizable pattern is generated in screenshotss content, or when detection
To when screenshotss operation, position of the sensitive content recognized in picture is determined, increase unrecognizable pattern in corresponding position,
Obtain screenshot picture.
It wherein, will due to when determining that the page info and information protection content match, triggering information protection mechanism
Screenshotss, downloading, preservation and record screen etc. are propagated keypress function setting and are not available.And when different model user terminal can not pass through
Above-mentioned communication function can be realized in function button, carries out screenshotss for example, shaking etc., then closing keypress function still can not carry out
Information protection.Therefore, in the present embodiment, information can be protected in the case where being not related to and closing and state communication function key
Shield.
Specifically, when user terminal detects that user has screenshotss operation, because i.e. no matter which kind of operation side user passes through
Formula starts screenshotss function, but as long as starting screenshotss function, user terminal can be detected.Therefore, user terminal is once examined
Screenshotss are measured, then can be closed the network of user terminal so that user can not be propagated outward screenshotss content by network, or
Person closes the communications applications of user terminal being currently running, such as mailbox, immediate communication tool etc..When communications applications can not
In use, equally screenshotss content cannot be propagated outward.
Alternatively, when user terminal detect screenshotss operation when, trigger identification verification function, by authentication to user into
Row identification, and after authentication passes through, then respond the operation of user's screenshotss.Ensure that the user of no screenshotss permission can not be into
The operation of row screenshotss, to prevent information leakage, ensures information security.
In one embodiment, information protection is triggered, executes pre-operation corresponding with information protection further include: identification information
Protect content in the position of current screen;It is operated according to screenshotss and obtains screenshotss content picture;According to the position of information protection content,
Increasing in the corresponding position of screenshotss content picture not can recognize pattern, obtain screenshot picture.
Specifically, it when user terminal monitors screenshotss operation, generates and not can recognize pattern.Or as determining screenshotss personnel
Authentication not by when regeneration not can recognize pattern.It, will not according to not can recognize that pattern modifies to screenshotss content
It can recognize the sensitive information in style replacement screenshotss content.Wherein, it not can recognize that pattern includes but is not limited to fuzzy Show Styles
With blank Show Styles etc..Specifically, it when user detects screenshotss operation, generates fuzzy Show Styles or blank shows sample
Formula.Also, identify sensitive information position in screenshot picture by influencing identification technology, that is, needs in screenshotss content into
The content of row information protection, i.e. sensitive information.If sensitive information quantity reaches preset value, can directly by fuzzy Show Styles and
Blank Show Styles returns to terminal.It, can be by fuzzy Show Styles and sky if sensitive information quantity does not reach preset value
White Show Styles is replaced with sensitive information, is equivalent to and is carried out fuzzy or space management to sensitive information, by sensitive information
The screenshotss content being replaced returns to user as final screenshot picture.In the present embodiment, by screenshotss content modification,
Not only meet user's screenshotss demand, also sensitive information is protected, prevents from revealing.
In one embodiment, after executing pre-operation corresponding with information protection mechanism, generation information is further comprised the steps of:
Protect information.
Wherein, information protection information refers to for prompting the operations such as user its this screenshots, downloading, preservation or record screen to relate to
And the prompt information to sensitive information.Specifically, when according to function such as information protection mechanism closing screenshotss, downloading, preservation and record screens
Can, then it can return and " since the page includes sensitive information, be in information protection state, screenshotss, downloading, preservation and record screen etc.
Function is not available " prompt information remind the above-mentioned function of user be not available.Alternatively, having received modification after user's screenshotss
Prompt informations such as " the screenshotss content include sensitive information, has carried out protection processing " equally can be generated in screenshotss content afterwards.When
Real-time display is in the display device of user terminal after information protection information generates, for can not only be informed by prompt information
Why function is not available user, why screenshotss content is modified, moreover it is possible to further deepen user sensitive information protective awareness.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 4, providing a kind of information protection device, comprising: obtain module 402, identification
Module 404, judgment module 406 and trigger module 408, in which:
Module 402 is obtained, for obtaining page open request, the corresponding page is opened according to page open request;
Identification module 404, for identification page type of the page;
The acquisition module 402 is also used to obtain corresponding information protection content according to page type;;
Judgment module 406 judges whether page info matches in the information protection for obtaining the page info of the page
Hold;
Trigger module 408 is used for when page info matches the information protection content, and detects that page info is corresponding
Screenshotss operation when, trigger authentication;
Respond module 410 responds screenshotss operation if authentication passes through;
Execution module 412 triggers information protection if authentication does not pass through, and executes pre- behaviour corresponding with information protection
Make.
In one embodiment, module 402 is obtained to be also used to obtain when page type is the online page with server communication
Take default sensitive content;Judgment module 404 is also used to scan content of pages, judges whether to include default sensitive content;If so,
The page info matches the information protection content.
In one embodiment, judgment module 404 is also used to analyze the keyword of content of pages, detects whether to include default
Sensitive content;Or judge whether content of pages includes default sensitive content by regular expression;Or the control of the detection page, root
It whether include default sensitive content according to the determined property of control.
In one embodiment, module 402 is obtained to be also used to load local information when page type is the primary page
Protect page listings;Whether judgment module 404 is also used to obtain page iden-tity, determine current page in information according to page iden-tity
It protects in page listings;If current page, in information protection page listings, page info match information protects content.
In one embodiment, trigger module 406 is also used to protect content when page info match information, and detects page
When information corresponding screenshotss in face operate, generates warning information and simultaneously obtain default contact information;It will be described according to contact information
Warning information is sent to contact person.
In one embodiment, execution module 412 is also used to identification information protection content in the position of current screen;According to
Screenshotss operation obtains screenshotss content picture;According to the position of information protection content, increase in the corresponding position of screenshotss content picture
It not can recognize pattern, obtain screenshot picture.
In one embodiment, information protection device further includes generation module, for generating information protection information and showing.
Specific about information protection device limits the restriction that may refer to above for information protecting method, herein not
It repeats again.Modules in above- mentioned information protective device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in Figure 5.The computer equipment includes processor, the memory, network interface, display connected by system bus
Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine equipment is used to communicate with external terminal by network connection.When the computer program is executed by processor with
Realize a kind of information protecting method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen,
The input unit of the computer equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell
Key, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor perform the steps of when executing computer program
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to page type;
The page info for obtaining the page judges whether match information protects content to page info;
When page info match information protects content, and when detecting page info corresponding screenshotss operation, body is triggered
Part verifying;
If authentication passes through, screenshotss operation is responded;
If authentication does not pass through, information protection is triggered, executes pre-operation corresponding with information protection.
In one embodiment, it also performs the steps of when processor executes computer program when page type is online
When the page, default sensitive content is obtained with server communication;Content of pages is scanned, judges whether to include default sensitive content;If
It is that then the page info matches the information protection content.
In one embodiment, the pass of analysis content of pages is also performed the steps of when processor executes computer program
Key word detects whether to include default sensitive content;Or judge whether content of pages includes in default sensitivity by regular expression
Hold;Or the control of the detection page, it whether include default sensitive content according to the determined property of control.
In one embodiment, it is also performed the steps of when processor executes computer program when page type is primary
When the page, local information protection page listings are loaded;Obtain page iden-tity, according to page iden-tity determine current page whether
In information protection page listings;If current page, in information protection page listings, page info match information protects content.
In one embodiment, it also performs the steps of when processor executes computer program and believes when page info matches
When ceasing protection content, and detecting that the corresponding screenshotss of page info operate, generating warning information, simultaneously contact information is preset in acquisition;
The warning information is sent to contact person according to contact information.
In one embodiment, identification information protection content is also performed the steps of when processor executes computer program
In the position of current screen;It is operated according to screenshotss and obtains screenshotss content picture;According to the position of information protection content, in screenshotss
The corresponding position for holding picture, which increases, not can recognize pattern, obtain screenshot picture.
In one embodiment, it is also performed the steps of when processor executes computer program and generates information protection information
And it shows.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to page type;
The page info for obtaining the page judges whether match information protects content to page info;
When page info match information protects content, and when detecting page info corresponding screenshotss operation, body is triggered
Part verifying;
If authentication passes through, screenshotss operation is responded;
If authentication does not pass through, information protection is triggered, executes pre-operation corresponding with information protection.
In one embodiment, also performed the steps of when computer program is executed by processor when page type be
When the line page, default sensitive content is obtained with server communication;Content of pages is scanned, judges whether to include default sensitive content;
If so, the page info matches the information protection content.
In one embodiment, analysis content of pages is also performed the steps of when computer program is executed by processor
Keyword detects whether to include default sensitive content;Or judge whether content of pages includes default sensitivity by regular expression
Content;Or the control of the detection page, it whether include default sensitive content according to the determined property of control.
In one embodiment, it is also performed the steps of when computer program is executed by processor when page type is original
When the raw page, local information protection page listings are loaded;Page iden-tity is obtained, whether current page is determined according to page iden-tity
In information protection page listings;If current page is in information protection page listings, in the protection of page info match information
Hold.
In one embodiment, it is also performed the steps of when computer program is executed by processor when page info matches
Information protection content, and when detecting page info corresponding screenshotss operation, it generates warning information and simultaneously obtains default contact person's letter
Breath;The warning information is sent to contact person according to contact information.
In one embodiment, it is also performed the steps of when computer program is executed by processor in identification information protection
Hold in the position of current screen;It is operated according to screenshotss and obtains screenshotss content picture;According to the position of information protection content, in screenshotss
The corresponding position of content picture, which increases, not can recognize pattern, obtain screenshot picture.
In one embodiment, it is also performed the steps of when computer program is executed by processor and generates information protection letter
It ceases and shows.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of information protecting method, which comprises
Page open request is obtained, the corresponding page is opened according to page open request;
Identify the page type of the page;
Corresponding information protection content is obtained according to the page type;
The page info for obtaining the page, judges whether the page info matches the information protection content;
When the page info matches the information protection content, and detects that the corresponding screenshotss of the page info operate,
Trigger authentication;
If the authentication passes through, the screenshotss operation is responded;
If the authentication does not pass through, information protection is triggered, executes pre-operation corresponding with the information protection.
2. the method according to claim 1, wherein the information protection content includes default sensitive content;Institute
State the step of corresponding information protection content is obtained according to the page type, comprising:
When the page type is the online page, default sensitive content is obtained with server communication;
The page info includes content of pages;The page info for obtaining the page, judges whether page info matches
The step of information protection content, comprising:
The content of pages is scanned, judges whether to include default sensitive content;
If so, the page info matches the information protection content.
3. according to the method described in claim 2, it is characterized in that, the scanning content of pages, judges whether to include pre-
If the mode of sensitive content, any one or more including following manner: the keyword of the content of pages is analyzed, detection is
No includes default sensitive content;Or judge whether the content of pages includes default sensitive content by regular expression;Or inspection
Whether the control for surveying the page includes default sensitive content according to the determined property of control.
4. the method according to claim 1, wherein the information protection content is information protection page listings;
Described the step of corresponding information protection content is obtained according to the page type, comprising:
When the page type is the primary page, local information protection page listings are loaded;
The page info includes page iden-tity;The page info for obtaining the page, judges whether page info matches
The step of information protection content, comprising:
Page iden-tity is obtained,
Determine current page whether in the information protection page listings according to the page iden-tity;
If current page, in the information protection page listings, the page info matches the information protection content.
5. the method according to claim 1, wherein the method also includes:
When the page info matches the information protection content, and detects that the corresponding screenshotss of the page info operate,
It generates warning information and obtains default contact information;
The warning information is sent to contact person according to the contact information.
6. the method according to claim 1, wherein the triggering information protection, executes and the information protection
Corresponding pre-operation, comprising:
Identify the information protection content in the position of current screen;
It is operated according to the screenshotss and obtains screenshotss content picture;
According to the position of the information protection content, increasing in the corresponding position of the screenshotss content picture not can recognize pattern,
Obtain screenshot picture.
7. the method according to claim 1, wherein the triggering information protection, executes and the information protection
After corresponding pre-operation, further includes:
It generates information protection information and shows.
8. a kind of information protection device, which is characterized in that described device includes:
Module is obtained, for obtaining page open request, the corresponding page is opened according to page open request;
Identification module, for identification page type of the page;
The acquisition module is also used to obtain corresponding information protection content according to the page type;;
Judgment module judges whether the page info matches the information protection for obtaining the page info of the page
Content;
Trigger module is used for when the page info matches the information protection content, and detects the page info pair
When the screenshotss operation answered, authentication is triggered;
Respond module responds the screenshotss operation if the authentication passes through;
Execution module triggers information protection if the authentication does not pass through, and executes pre- behaviour corresponding with the information protection
Make.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910311763.0A CN110135140A (en) | 2019-04-18 | 2019-04-18 | Information protecting method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910311763.0A CN110135140A (en) | 2019-04-18 | 2019-04-18 | Information protecting method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110135140A true CN110135140A (en) | 2019-08-16 |
Family
ID=67570155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910311763.0A Pending CN110135140A (en) | 2019-04-18 | 2019-04-18 | Information protecting method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135140A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111753176A (en) * | 2020-06-29 | 2020-10-09 | 金电联行(北京)信息技术有限公司 | Automatic reminding system, browser end and method for enterprise credit investigation red blacklist |
CN112764824A (en) * | 2019-10-21 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Method, device, equipment and storage medium for triggering identity authentication in application program |
CN113297513A (en) * | 2021-07-28 | 2021-08-24 | 北京健康之家科技有限公司 | Sensitive information coding method and device based on cloud mobile phone and storage medium |
CN113794718A (en) * | 2021-09-14 | 2021-12-14 | 交通运输信息安全中心有限公司 | Security authentication method and security authentication device for multiple application systems |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631359A (en) * | 2015-12-23 | 2016-06-01 | 北京奇虎科技有限公司 | Control method and device of webpage operation |
CN105678181A (en) * | 2015-12-28 | 2016-06-15 | 上海爱数信息技术股份有限公司 | Screen capture prevention apparatus and method based on browser event |
CN106372473A (en) * | 2016-09-02 | 2017-02-01 | 深圳中兴网信科技有限公司 | Screen capturing method, screen capturing device, terminal and server |
CN107180194A (en) * | 2017-05-11 | 2017-09-19 | 北京安赛创想科技有限公司 | View-based access control model analysis system carries out the method and device of Hole Detection |
CN107330336A (en) * | 2017-05-23 | 2017-11-07 | 中国人民解放军信息工程大学 | The instant encryption and decryption method and system of (SuSE) Linux OS memory pages |
CN108491729A (en) * | 2018-02-26 | 2018-09-04 | 挖财网络技术有限公司 | The method and device of dynamic protection privacy of user in Android system |
CN109085975A (en) * | 2018-08-06 | 2018-12-25 | Oppo广东移动通信有限公司 | Screenshotss method, apparatus, storage medium and electronic device |
-
2019
- 2019-04-18 CN CN201910311763.0A patent/CN110135140A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631359A (en) * | 2015-12-23 | 2016-06-01 | 北京奇虎科技有限公司 | Control method and device of webpage operation |
CN105678181A (en) * | 2015-12-28 | 2016-06-15 | 上海爱数信息技术股份有限公司 | Screen capture prevention apparatus and method based on browser event |
CN106372473A (en) * | 2016-09-02 | 2017-02-01 | 深圳中兴网信科技有限公司 | Screen capturing method, screen capturing device, terminal and server |
CN107180194A (en) * | 2017-05-11 | 2017-09-19 | 北京安赛创想科技有限公司 | View-based access control model analysis system carries out the method and device of Hole Detection |
CN107330336A (en) * | 2017-05-23 | 2017-11-07 | 中国人民解放军信息工程大学 | The instant encryption and decryption method and system of (SuSE) Linux OS memory pages |
CN108491729A (en) * | 2018-02-26 | 2018-09-04 | 挖财网络技术有限公司 | The method and device of dynamic protection privacy of user in Android system |
CN109085975A (en) * | 2018-08-06 | 2018-12-25 | Oppo广东移动通信有限公司 | Screenshotss method, apparatus, storage medium and electronic device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112764824A (en) * | 2019-10-21 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Method, device, equipment and storage medium for triggering identity authentication in application program |
CN112764824B (en) * | 2019-10-21 | 2023-10-10 | 腾讯科技(深圳)有限公司 | Method, device, equipment and storage medium for triggering identity verification in application program |
CN111753176A (en) * | 2020-06-29 | 2020-10-09 | 金电联行(北京)信息技术有限公司 | Automatic reminding system, browser end and method for enterprise credit investigation red blacklist |
CN113297513A (en) * | 2021-07-28 | 2021-08-24 | 北京健康之家科技有限公司 | Sensitive information coding method and device based on cloud mobile phone and storage medium |
CN113794718A (en) * | 2021-09-14 | 2021-12-14 | 交通运输信息安全中心有限公司 | Security authentication method and security authentication device for multiple application systems |
CN113794718B (en) * | 2021-09-14 | 2023-08-29 | 交通运输信息安全中心有限公司 | Security authentication method and security authentication device for multiple application systems |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110135140A (en) | Information protecting method, device, computer equipment and storage medium | |
CN108377240B (en) | Abnormal interface detection method and device, computer equipment and storage medium | |
CN108876133A (en) | Risk assessment processing method, device, server and medium based on business information | |
CN110505201B (en) | Conference information processing method, conference information processing device, computer equipment and storage medium | |
CN110489415B (en) | Data updating method and related equipment | |
CN106713579B (en) | Telephone number identification method and device | |
CN108256322B (en) | Security testing method and device, computer equipment and storage medium | |
CN101452567B (en) | Seal apparatus, seal system, and method for controlling the seal apparatus | |
CN109117616B (en) | Verification method and device, electronic equipment and computer readable storage medium | |
US11721116B2 (en) | Managing camera actions | |
CN109460653B (en) | Rule engine based verification method, verification device, storage medium and apparatus | |
CN107302586A (en) | A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing | |
CN110851872A (en) | Risk assessment method and device for private data leakage | |
CN107491691A (en) | A kind of long-range forensic tools Safety Analysis System based on machine learning | |
CN115567284A (en) | Content security filtering method and system based on characters and pictures | |
CN111324375A (en) | Code management method and device, computer equipment and storage medium | |
CN111488603A (en) | Method and device for identifying sensitive content of printed file | |
CN111125748A (en) | Judgment method and device for unauthorized query, computer equipment and storage medium | |
CN111259374B (en) | Authority abnormity detection method and device, computer equipment and storage medium | |
CN115688107B (en) | Fraud-related APP detection system and method | |
CN111352990A (en) | Report generation management method and device, computer equipment and storage medium | |
CN110399046A (en) | The processing method of candidate item, device, equipment and storage medium in input method | |
CN115422583A (en) | Data desensitization method, system, medium and computing device | |
CN115048645A (en) | Detection method, device, equipment and medium for collecting privacy information beyond range | |
CN110148002A (en) | It is sold back to a grain-producing area method and device, the electronic equipment, storage medium of receipt |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190816 |
|
WD01 | Invention patent application deemed withdrawn after publication |