CN110874483A - Method and device for preventing personal information from being leaked - Google Patents

Method and device for preventing personal information from being leaked Download PDF

Info

Publication number
CN110874483A
CN110874483A CN201910915976.4A CN201910915976A CN110874483A CN 110874483 A CN110874483 A CN 110874483A CN 201910915976 A CN201910915976 A CN 201910915976A CN 110874483 A CN110874483 A CN 110874483A
Authority
CN
China
Prior art keywords
information
module
output end
control system
input end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910915976.4A
Other languages
Chinese (zh)
Inventor
尹利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Contact Media Co Ltd
Original Assignee
Hefei Contact Media Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Contact Media Co Ltd filed Critical Hefei Contact Media Co Ltd
Priority to CN201910915976.4A priority Critical patent/CN110874483A/en
Publication of CN110874483A publication Critical patent/CN110874483A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

The invention discloses a method and a device for preventing personal information from being leaked, which specifically comprise the following steps: s1, information is uploaded through the information uploading unit, information is input through the information input module, useless information contained in the information is filtered and screened out through the information filtering module, the uploaded information is classified through the classification of the information classifying module, the classified information is uploaded to the central control system through the information transmission module, and the uploaded information is stored into the database through the central control system. According to the method and the device for preventing the leakage of the personal information, the analysis result output module outputs the side-looking result, the personal information is protected through the operation of multiple protection, the leakage of the personal information is prevented, the storage safety is improved, the information is encrypted by the encryption module, other people are prevented from looking over confidential documents, and the protection of the personal information is improved.

Description

Method and device for preventing personal information from being leaked
Technical Field
The invention relates to the technical field of information protection, in particular to a method and a device for preventing personal information from being leaked.
Background
With the rapid development of information technology, computers and networks become necessary tools and approaches for daily office, information systems provide safety requirements for storage, access control and transmission of key data of information and how to prevent information loss and leakage of the key data while improving the working efficiency of staff, and a statistic of FBI & CSI shows that: over 85% of security threats come from the interior of a company, and an investigation of a global enterprise data security center Imperva also shows that 58% of visitors can consciously take away data information of the company before being refereed, and with more and more leakage events occurring in the enterprise, the enterprise is realized to establish a set of protection processes of compliance entry, authorized use, encrypted transmission, secure storage, audit output and recording processes, so that the data security can be comprehensively protected, with the development of enterprise informatization, more and more use and daily work of an information system become indispensable tools and means, the enterprise production efficiency is greatly improved through enterprise informatization, and particularly, in recent years, from ERP to SOA, mature enterprises are increasingly dependent on an information system to operate, develop and develop; the development of technologies such as virtualization, cloud computing and the like saves a large amount of special line cost for many enterprises across regions and countries, and provides guarantees of real-time performance, reliability and confidentiality of information transmission, electronic commerce, overseas branch companies and enterprise monopoly … … enterprises in various regions use information technology to break barriers between regions, and meanwhile, a large amount of confidential data such as customer data, marketing schemes, financial statements, research and development data and the like which concern core competitiveness of enterprises are generated, however, the double-edged sword characteristic of the information technology is continuously shown in an intranet: the strong openness and interoperability urge the events such as commercial divulgence, network spy and the like to rapidly heat the information security event, and the information leakage prevention becomes the focus of increasing attention of enterprises.
The existing mode for protecting personal information is to carry out identity authentication on the information so as to realize leakage prevention of the personal information, but the mode has lower safety performance, the personal information still has the possibility of leakage, and the personal important information cannot be well protected.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a method and a device for preventing personal information from being leaked, and solves the problems that the safety performance is low, the personal information is possibly leaked, and the personal important information cannot be well protected.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: a method for preventing personal information leakage specifically comprises the following steps:
s1, information is uploaded through an information uploading unit, information is input through an information input module, useless information contained in the information is filtered and screened out through an information filtering module, the uploaded information is classified through classification of an information classification module, an information transmission module uploads the classified information to a central control system, and the central control system stores the uploaded information into a database;
s2, an identity acquisition unit acquires the identity of the uploader, an identity information acquisition unit acquires the fingerprint, facial features, account numbers and voice features of the uploader, an information receiving module receives the acquired information, an information identification module identifies the received information, the identified information is uploaded through the information uploading unit, and a central control system stores the identity information in a database;
s3, the encryption unit encrypts information, the information key generation module generates keys aiming at different types of information to protect the information, the information encryption unit encrypts the information and then carries out simulation test on the encryption, meanwhile, the decryption module is set to be convenient for a user to use, and the analysis result output module outputs a side-looking result;
s4, when the information is looked up by people except the uploader, after the information is verified by the identity verification module, the instruction receiving module is started to receive the use request from the uploader, the information that the uploader wants to look up is received by the looking up instruction receiving module, the instruction is transmitted to the processing center, whether the potential safety hazard exists is judged by the judging module, whether the uploader refers to looking up the core event or looking up the sensitive word is judged, if so, the display module displays the early warning information, and meanwhile, the wireless communication module transmits the event to the mobile terminal.
The invention also discloses a device for preventing personal information leakage, which comprises a central control system, wherein the input end of the central control system is connected with the output end of the information uploading unit, the input end of the central control system is connected with the output end of the identity acquisition unit, the input end of the central control system is connected with the output end of the information searching unit, the central control system is bidirectionally connected with the encryption unit, the central control system is bidirectionally connected with the database, the central control system is bidirectionally connected with the early warning module, the central control system is bidirectionally connected with the wireless communication module, and the wireless communication module is bidirectionally connected with the mobile terminal.
Preferably, the input end of the central control system is connected with the output end of the power module through a wire, the output end of the power module is electrically connected with the input end of the information uploading unit through a wire, and the output end of the power module is electrically connected with the input end of the identity acquisition unit through a wire.
Preferably, the information uploading unit comprises an information input module, and an output end of the information input module is connected with an input end of the information filtering module.
Preferably, the output end of the information filtering module is connected with the input end of the information classifying module, and the output end of the information classifying module is connected with the input end of the information transmitting module.
Preferably, the identity acquisition unit comprises an identity information acquisition unit, the identity information acquisition unit acquires fingerprints, facial features, account numbers and sound features, the output end of the identity information acquisition unit is connected with the input end of the information receiving module, the output end of the information receiving module is connected with the input end of the information identification module, and the output end of the information identification module is connected with the input end of the information uploading module.
Preferably, the encryption unit comprises an information key generation module, an output end of the information key generation module is connected with an input end of the information encryption unit, an output end of the information encryption unit is connected with an input end of the encryption simulation test module, an output end of the encryption simulation test module is connected with an input end of the analysis result output module, and the information encryption unit and the decryption module are in bidirectional connection.
Preferably, the information consulting unit comprises a processing center, the input end of the processing center is connected with the output end of the starting instruction receiving module, the input end of the processing center is connected with the output end of the consulting instruction receiving module, the output end of the processing center is connected with the input end of the judging module, the input end of the processing center is connected with the output end of the identity verifying module, and the output end of the processing center is connected with the input end of the display module.
(III) advantageous effects
The invention provides a method and a device for preventing personal information from being leaked. Compared with the prior art, the method has the following beneficial effects:
(1) the method and the device for preventing the personal information leakage, the identity of an uploader is collected through an identity collection unit S2, the identity information collection unit collects the fingerprint, facial features, account numbers and sound features of the uploader, an information receiving module receives the collected information, the received information is identified through an information identification module, the identified information is uploaded through an information uploading unit, a central control system stores the identity information in a database, S3 the information is encrypted through an encryption unit, an information key generation module generates keys aiming at different types of information and protects the information, after the information is encrypted through an information encryption unit, simulation test is carried out on the encryption, a decryption module is set for the convenience of a user, an analysis result output module outputs side-looking results, and through the operation of multiple protection, the personal information is protected, leakage of the personal information is prevented, and storage safety is improved.
(2) The encryption unit comprises an information key generation module, the output end of the information key generation module is connected with the input end of the information encryption unit, the output end of the information encryption unit is connected with the input end of the encryption simulation test module, the output end of the encryption simulation test module is connected with the input end of the analysis result output module, the information encryption unit and the decryption module are in bidirectional connection, the encryption unit is used for encrypting information, confidential files are prevented from being checked by other people, and the protection of personal information is improved.
(3) The method and the device for preventing the personal information leakage are characterized in that through S4, when people except an uploader look up the information, after the information is verified through the identity verification module, the instruction receiving module is started to receive a use request from the uploader, the information which the uploader wants to look up is received by the instruction receiving module, the instruction is transmitted to the processing center, whether the potential safety hazard exists is judged through the judging module, whether the uploader refers to the core event or the sensitive word, if so, the display module displays the early warning information, meanwhile, the wireless communication module transmits the event to the mobile terminal, and a series of judgments when the core event is triggered can effectively monitor and intercept the personal information leakage.
Drawings
FIG. 1 is a schematic block diagram of the architecture of the system of the present invention;
FIG. 2 is a schematic block diagram of the structure of an information uploading unit according to the present invention;
FIG. 3 is a schematic block diagram of the structure of an identity acquisition unit of the present invention;
FIG. 4 is a schematic block diagram of the structure of an encryption unit of the present invention;
FIG. 5 is a schematic block diagram of the structure of the information lookup unit of the present invention.
In the figure: 1-a central control system, 2-an information uploading unit, 21-an information recording module, 22-an information filtering module, 23-an information classifying module, 24-an information transmission module, 3-an identity acquisition unit, 31-an identity information acquisition unit, 32-an information receiving module, 33-an information identifying module, 34-an information uploading module, 4-an information searching unit, 41-a processing center, 42-a starting instruction receiving module, 43-a searching instruction receiving module, 44-a judging module, 45-an identity verification module, 46-a display module, 5-an encryption unit, 51-an information key generating module, 52-an information encryption unit, 53-an encryption simulation testing module, 54-an analysis result output module, a data processing module, 55-decryption module, 6-database, 7-early warning module, 8-wireless communication module, 9-mobile terminal and 10-power module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-5, an embodiment of the present invention provides a technical solution: the method for preventing personal information leakage specifically comprises the following steps:
s1, information is uploaded through the information uploading unit 2, information is input through the information input module 21, useless information contained in the information is filtered and screened out through the information filtering module 22, the uploaded information is classified through the classification of the information classifying module 23, the information transmission module 24 uploads the classified information to the central control system 1, and the central control system 1 stores the uploaded information into the database 6;
s2, the identity acquisition unit 3 acquires the identity of the uploader, the identity information acquisition unit 31 acquires the fingerprint, facial features, account numbers and voice features of the uploader, the information receiving module 32 receives the acquired information, the information receiving module 33 identifies the received information, the information uploading unit 2 uploads the identified information, and the central control system 1 stores the identity information in the database 6;
s3, the encryption unit 5 encrypts the information, the information key generation module 51 generates keys for different types of information, protects the information, performs a simulation test on the encryption after the encryption by the information encryption unit 52, sets the decryption module 55 for the convenience of the user, and the analysis result output module 54 outputs the side-view result;
s4, when the information is referred by the people except the uploader, after the authentication by the authentication module 45, the instruction receiving module 42 is started to receive the use request from the reviewer, the review instruction receiving module 43 receives the information that the reviewer wants to refer to, and transmits the instruction to the processing center 41, and the determination module 44 determines whether there is a potential safety hazard, and determines whether the reviewer refers to review the core event or review the sensitive word, and if so, the display module 46 displays the warning information, and the wireless communication module 8 transmits the event to the mobile terminal 9.
The invention also discloses a device for preventing personal information leakage, which comprises a central control system 1, wherein the input end of the central control system 1 is connected with the output end of an information uploading unit 2, the input end of the central control system 1 is connected with the output end of the identity acquisition unit 3, the input end of the central control system 1 is connected with the output end of the information consulting unit 4, the central control system 1 is connected with the encryption unit 5 in a bidirectional way, the information is encrypted by the encryption unit 5, so that other people are prevented from looking at confidential documents, the protection to personal information is improved, the central control system 1 is connected with the database 6 in a bidirectional way, and the central control system 1 and the early warning module 7 are in bidirectional connection, the central control system 1 and the wireless communication module 8 are in bidirectional connection, and the wireless communication module 8 and the mobile terminal 9 are in bidirectional connection.
In the invention, the input end of the central control system 1 is connected with the output end of the power supply module 10 through a lead, the output end of the power supply module 10 is electrically connected with the input end of the information uploading unit 2 through a lead, and the output end of the power supply module 10 is electrically connected with the input end of the identity acquisition unit 3 through a lead.
In the invention, the information uploading unit 2 comprises an information input module 21, and the output end of the information input module 21 is connected with the input end of the information filtering module 22.
In the present invention, the output end of the information filtering module 22 is connected to the input end of the information classifying module 23, and the output end of the information classifying module 23 is connected to the input end of the information transmitting module 24.
In the invention, the identity acquisition unit 3 comprises an identity information acquisition unit 31, the identity information acquisition unit 31 acquires fingerprints, facial features, account numbers and sound features, the output end of the identity information acquisition unit 31 is connected with the input end of an information receiving module 32, the output end of the information receiving module 32 is connected with the input end of an information identification module 33, and the output end of the information identification module 33 is connected with the input end of an information uploading module 34.
In the invention, the encryption unit 5 comprises an information key generation module 51, the output end of the information key generation module 51 is connected with the input end of the information encryption unit 52, the output end of the information encryption unit 52 is connected with the input end of the encryption simulation test module 53, the output end of the encryption simulation test module 53 is connected with the input end of the analysis result output module 54, the information encryption unit 52 and the decryption module 55 are in bidirectional connection, personal information is protected through multiple protection operations, personal information is prevented from being leaked, and the storage safety is improved.
In the present invention, the information consulting unit 4 includes a processing center 41, a series of judgments when a core event is triggered can effectively monitor and intercept personal information leakage, an input end of the processing center 41 is connected to an output end of the start instruction receiving module 42, an input end of the processing center 41 is connected to an output end of the consulting instruction receiving module 43, an output end of the processing center 41 is connected to an input end of the judging module 44, an input end of the processing center 41 is connected to an output end of the identity verifying module 45, and an output end of the processing center 41 is connected to an input end of the display module 46.
And those not described in detail in this specification are well within the skill of those in the art.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A method for preventing leakage of personal information, characterized by: the method specifically comprises the following steps:
s1, information is uploaded through the information uploading unit (2), information is entered through the information entry module (21), useless information contained in the information is filtered and screened out through the information filtering module (22), the uploaded information is classified through the classification of the information classification module (23), the classified information is uploaded to the central control system (1) through the information transmission module (24), and the uploaded information is stored into the database (6) through the central control system (1);
s2, an identity acquisition unit (3) acquires the identity of an uploader, an identity information acquisition unit (31) acquires the fingerprint, facial features, account numbers and voice features of the uploader, an information receiving module (32) receives the acquired information, the received information is identified through an information identification module (33), then the identified information is uploaded through an information uploading unit (2), and a central control system (1) stores the identity information in a database (6);
s3, an encryption unit (5) encrypts information, an information key generation module (51) generates keys aiming at different types of information, protects the information, after the information is encrypted by an information encryption unit (52), a simulation test is carried out on the encryption, a decryption module (55) is set for the convenience of a user, and an analysis result output module (54) outputs a side-looking result;
s4, when the information is consulted by people except the uploader, after the information is verified by the identity verification module (45), the instruction receiving module (42) is started to receive the use request from the consultant, the consultation instruction receiving module (43) receives the information which the consultant wants to consult, the instruction is transmitted to the processing center (41), whether the potential safety hazard exists is judged by the judgment module (44), whether the consultant refers to consult the core event or consult the sensitive word is judged, if so, the display module (46) displays the early warning information, and the wireless communication module (8) transmits the event to the mobile terminal (9).
2. The utility model provides a device for preventing personal information reveals, includes central control system (1), the input of central control system (1) is connected with the output of information upload unit (2) to the input of central control system (1) is connected with the output of identity acquisition unit (3), its characterized in that: the input end of the central control system (1) is connected with the output end of the information lookup unit (4), the central control system (1) is in bidirectional connection with the encryption unit (5), the central control system (1) is in bidirectional connection with the database (6), the central control system (1) is in bidirectional connection with the early warning module (7), the central control system (1) is in bidirectional connection with the wireless communication module (8), and the wireless communication module (8) is in bidirectional connection with the mobile terminal (9).
3. An apparatus for preventing personal information leakage according to claim 2, wherein: the input end of the central control system (1) is connected with the output end of the power supply module (10) through a wire, the output end of the power supply module (10) is electrically connected with the input end of the information uploading unit (2) through a wire, and the output end of the power supply module (10) is electrically connected with the input end of the identity acquisition unit (3) through a wire.
4. An apparatus for preventing personal information leakage according to claim 2, wherein: the information uploading unit (2) comprises an information input module (21), and the output end of the information input module (21) is connected with the input end of the information filtering module (22).
5. An apparatus for preventing personal information leakage according to claim 4, wherein: the output end of the information filtering module (22) is connected with the input end of the information classifying module (23), and the output end of the information classifying module (23) is connected with the input end of the information transmission module (24).
6. An apparatus for preventing personal information leakage according to claim 2, wherein: identity acquisition unit (3) include identity information acquisition unit (31), fingerprint, facial feature, account number and sound characteristic are gathered to identity information acquisition unit (31), the output and the input of information receiving module (32) of identity information acquisition unit (31) are connected to the output and the input of information identification module (33) of information receiving module (32) are connected, the output and the input of information upload module (34) of information identification module (33) are connected.
7. An apparatus for preventing personal information leakage according to claim 2, wherein: the encryption unit (5) comprises an information key generation module (51), the output end of the information key generation module (51) is connected with the input end of the information encryption unit (52), the output end of the information encryption unit (52) is connected with the input end of an encryption simulation test module (53), the output end of the encryption simulation test module (53) is connected with the input end of an analysis result output module (54), and the information encryption unit (52) and a decryption module (55) are in bidirectional connection.
8. An apparatus for preventing personal information leakage according to claim 2, wherein: the information consulting unit (4) comprises a processing center (41), wherein the input end of the processing center (41) is connected with the output end of a starting instruction receiving module (42), the input end of the processing center (41) is connected with the output end of a consulting instruction receiving module (43), the output end of the processing center (41) is connected with the input end of a judging module (44), the input end of the processing center (41) is connected with the output end of an identity verifying module (45), and the output end of the processing center (41) is connected with the input end of a display module (46).
CN201910915976.4A 2019-09-26 2019-09-26 Method and device for preventing personal information from being leaked Withdrawn CN110874483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910915976.4A CN110874483A (en) 2019-09-26 2019-09-26 Method and device for preventing personal information from being leaked

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910915976.4A CN110874483A (en) 2019-09-26 2019-09-26 Method and device for preventing personal information from being leaked

Publications (1)

Publication Number Publication Date
CN110874483A true CN110874483A (en) 2020-03-10

Family

ID=69717825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910915976.4A Withdrawn CN110874483A (en) 2019-09-26 2019-09-26 Method and device for preventing personal information from being leaked

Country Status (1)

Country Link
CN (1) CN110874483A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832071A (en) * 2020-06-30 2020-10-27 郑州工业应用技术学院 Information security system and information security method
CN113051322A (en) * 2021-03-08 2021-06-29 佳源科技股份有限公司 Big data-based information collection and analysis system
CN113486391A (en) * 2021-05-10 2021-10-08 广州城建职业学院 Financial data processing method based on cloud computing

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832071A (en) * 2020-06-30 2020-10-27 郑州工业应用技术学院 Information security system and information security method
CN111832071B (en) * 2020-06-30 2024-04-16 郑州工业应用技术学院 Information security system and information security method
CN113051322A (en) * 2021-03-08 2021-06-29 佳源科技股份有限公司 Big data-based information collection and analysis system
CN113486391A (en) * 2021-05-10 2021-10-08 广州城建职业学院 Financial data processing method based on cloud computing

Similar Documents

Publication Publication Date Title
CN112560027A (en) Data safety monitoring system
CN110874483A (en) Method and device for preventing personal information from being leaked
TWI493950B (en) Conditional electric document right management system and method
CN102227116B (en) Safe local area network management method and local area network
CN111967024A (en) File sensitive data protection method and device
CN109960917A (en) A kind of time slot scrambling and device of document
CN111046405B (en) Data processing method, device, equipment and storage medium
CN110826094A (en) Information leakage monitoring method and device
CN111914300A (en) Document encryption device and method for preventing file leakage
Karthikeyan et al. Strategy of Trible–E on Solving Trojan Defense in Cyber Crime Cases
CN108390857A (en) A kind of method and apparatus of high sensitive network to low sensitive network export
Thomas et al. ETHICAL ISSUES OF USER BEHAVIORAL ANALYSIS THROUGH MACHINE LEARNING.
CN204680024U (en) Computer security based on dynamic human face recognition technology is taken precautions against and early warning system
KR20110038545A (en) User identification apparatus, ubiquitous identity management system
CN115600189A (en) Commercial password application security evaluation system
CN112632592B (en) Block chain credible privacy computing power improving system based on TEE technology
CN115062325A (en) Internet of things enterprise management software data security protection method
CN116246745A (en) High-security storage database system based on medical data
CN111046428A (en) Client data information security protection system and method for scientific and technological service
Li et al. Data security and risk assessment in cloud computing
CN111291400A (en) Financial data protection system based on block chain
TWI539323B (en) Personal data inventory system and method
CN108537061A (en) A kind of financial data security system
CN116010465B (en) Financial business management system and method
CN115758324B (en) Data security access control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200310