CN114846470A - Compliance detection method and device for stored information, electronic device and storage medium - Google Patents

Compliance detection method and device for stored information, electronic device and storage medium Download PDF

Info

Publication number
CN114846470A
CN114846470A CN202080084650.2A CN202080084650A CN114846470A CN 114846470 A CN114846470 A CN 114846470A CN 202080084650 A CN202080084650 A CN 202080084650A CN 114846470 A CN114846470 A CN 114846470A
Authority
CN
China
Prior art keywords
information
storage
stored
specified
storage information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080084650.2A
Other languages
Chinese (zh)
Inventor
郭子亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN114846470A publication Critical patent/CN114846470A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The application discloses a compliance detection method and device for stored information, electronic equipment and a storage medium, and relates to the technical field of electronic equipment. The method is applied to the electronic equipment, and comprises the following steps: the method comprises the steps of obtaining a plurality of pieces of storage information from a target storage position, matching the plurality of pieces of storage information with specified information to obtain a matching result, wherein the specified information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, the personal information is information needing to be encrypted and stored, and whether the storage information meets storage regulations is determined based on the matching result. According to the compliance detection method and device for the stored information, the electronic device and the storage medium, the stored information is matched with the personal information in the plaintext format and the personal information in the non-encrypted coding format, and whether the stored information meets the storage regulation or not is determined based on the matching result, so that the compliance of the stored information is automatically and rapidly detected, and the personal information of a user is protected.

Description

Compliance detection method and device for stored information, electronic device and storage medium Technical Field
The present application relates to the field of electronic device technologies, and in particular, to a method and an apparatus for compliance detection of stored information, an electronic device, and a storage medium.
Background
In recent years, with the rapid development of information technology and the popularization of internet application, more and more organizations collect and use a large amount of personal information, bring convenience to the life of people, and simultaneously have the problems of illegal collection, abuse, leakage and the like of the personal information, so that the personal information security faces serious threats.
Disclosure of Invention
In view of the above problems, the present application provides a compliance detection method, apparatus, electronic device and storage medium for storing information to solve the above problems.
In a first aspect, an embodiment of the present application provides a compliance detection method for stored information, which is applied to an electronic device, and the method includes: acquiring a plurality of storage information from a target storage location; matching the plurality of pieces of storage information with specified information to obtain a matching result, wherein the specified information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information needing to be encrypted and stored; and determining whether the storage information conforms to storage regulations based on the matching result.
In a second aspect, an embodiment of the present application provides a compliance detection apparatus for storing information, which is applied to an electronic device, and the apparatus includes: the storage information acquisition module is used for acquiring a plurality of pieces of storage information from the target storage position; a matching result obtaining module, configured to match the multiple pieces of stored information with specified information to obtain a matching result, where the specified information includes personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information that needs to be encrypted and stored; and the compliance detection module is used for determining whether the storage information conforms to the storage regulations or not based on the matching result.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory and a processor, the memory being coupled to the processor, the memory storing instructions, and the processor performing the above method when the instructions are executed by the processor.
In a fourth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, and the program code can be called by a processor to execute the above method.
According to the compliance detection method and device for the storage information, the electronic device and the storage medium, the plurality of pieces of storage information are obtained from the target storage position, the plurality of pieces of storage information are matched with the designated information, and the matching result is obtained, wherein the designated information comprises the personal information in the plaintext format and the personal information in the non-encrypted coding format, the personal information is information needing to be encrypted and stored, whether the storage information meets the storage regulation or not is determined based on the matching result, and therefore the storage information, the personal information in the plaintext format and the personal information in the non-encrypted coding format are matched, and whether the storage information meets the storage regulation or not is determined based on the matching result, so that the compliance of the storage information is automatically and quickly detected, and the personal information of a user is protected.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 illustrates a flow diagram showing a compliance detection method for storing information provided by an embodiment of the present application;
FIG. 2 illustrates a flow diagram showing a compliance detection method for storing information provided by yet another embodiment of the present application;
FIG. 3 illustrates a flow diagram showing a compliance detection method for storing information provided by yet another embodiment of the present application;
FIG. 4 is a flow chart illustrating step S340 of the compliance detection method for storing information shown in FIG. 3 of the present application;
FIG. 5 is a flow chart illustrating step S360 of the compliance detection method for stored information illustrated in FIG. 3 of the present application;
FIG. 6 illustrates a flow diagram showing a compliance detection method for storing information provided by another embodiment of the present application;
FIG. 7 is a flowchart illustrating one embodiment of step S440 of the compliance detection method of stored information illustrated in FIG. 6 of the present application;
FIG. 8 is a flowchart illustrating a further embodiment of step S440 of the compliance detection method for stored information illustrated in FIG. 6 of the present application;
FIG. 9 illustrates a flowchart showing a compliance detection method for storing information provided by yet another embodiment of the present application;
FIG. 10 illustrates a flow diagram showing a compliance detection method for storing information provided by yet another embodiment of the present application;
FIG. 11 illustrates a block diagram of a compliance detection device storing information provided by an embodiment of the present application;
FIG. 12 is a block diagram of an electronic device for performing a compliance detection method of storing information according to an embodiment of the present application;
fig. 13 illustrates a storage unit for storing or carrying program codes for implementing a compliance detection method for storing information according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
In recent years, with the rapid development of information technology and the popularization of internet application, more and more organizations collect and use a large amount of personal information, bring convenience to the life of people, and simultaneously have the problems of illegal collection, abuse, leakage and the like of the personal information, so that the personal information security faces serious threats. Aiming at the safety problem faced by personal information, relevant behaviors of a personal information controller in information processing links of collection, storage, use, sharing, transfer, public disclosure and the like are regulated, so that the disordering of illegal collection, abuse, leakage and the like of the personal information is restrained, and the legal rights and interests of individuals and social public interests are guaranteed to the maximum extent. In 2018, European Union of 5 months promulgated general data protection regulations, GDPR for short, in China, personal information safety regulations, personal information self-evaluation guidelines for illegal collection and use of app, and the like are issued, personal data needs to be protected, and personal sensitive information needs to be stored in an encrypted manner. Different non-encrypted data processing modes exist, the data types are multiple, the data sensitivity degrees are different, the manual filtering, troubleshooting and searching labor cost is high, and the efficiency is low.
In view of the above problems, the inventor has found through long-term research and proposed a method, an apparatus, an electronic device, and a storage medium for compliance detection of stored information according to embodiments of the present application, in which the stored information is matched with personal information in a plaintext format and personal information in a non-encrypted coding format, and whether the stored information meets storage regulations is determined based on a matching result, so that compliance of the stored information is automatically and quickly detected, and personal information of a user is protected. The following embodiments describe a specific compliance detection method for stored information in detail.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a compliance detection method for stored information according to an embodiment of the present application. The compliance detection method of the stored information is used for matching the stored information with the personal information in the plaintext format and the personal information in the non-encrypted coding format, and determining whether the stored information conforms to the storage regulation or not based on the matching result, so that the compliance of the stored information is automatically and quickly detected, and the personal information of a user is protected. In a specific embodiment, the compliance detection method of the stored information is applied to the compliance detection apparatus 200 of the stored information as shown in fig. 11 and the electronic device 100 (fig. 12) configured with the compliance detection apparatus 200 of the stored information. The specific process of the present embodiment will be described below by taking an electronic device as an example, and it is understood that the electronic device applied in the present embodiment may be a smart phone, a tablet computer, a wearable electronic device, and the like, which is not limited herein. As will be described in detail with respect to the flow shown in fig. 1, the compliance detection method for stored information may specifically include the following steps:
step S110: a plurality of storage information is retrieved from a target storage location.
In this embodiment, when performing compliance detection on the storage information, a detection person may first determine a storage location to be detected as a target storage location, and obtain a plurality of pieces of storage information stored in the target storage location from the target storage location.
In some embodiments, after determining the target storage location, an internal storage private directory of the target storage location may be obtained, and a plurality of storage information under the internal storage private directory may be obtained. The internal storage private directory refers to a directory of data/data/packet names, namely after a target storage position is determined, the directory of the data/data/packet names in the target storage position can be obtained, and a plurality of pieces of storage information stored under the directory of the data/data/packet names are obtained.
Step S120: and matching the plurality of pieces of storage information with the designated information to obtain a matching result, wherein the designated information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information which needs to be encrypted and stored.
In some embodiments, the designation information for use as a criterion for the plurality of pieces of stored information may be set and stored in advance. Therefore, in the present embodiment, after acquiring the plurality of pieces of storage information from the target storage location, the plurality of pieces of storage information may be respectively matched with the specifying information to obtain the matching result, wherein as one manner, after acquiring the plurality of pieces of storage information from the target storage location, the plurality of pieces of storage information may be respectively matched with the specifying information in a polling manner to obtain the matching result.
In this embodiment, the personal information refers to various information recorded in an electronic or other manner, which can identify the identity of a specific natural person or reflect the activity condition of the specific natural person alone or in combination with other information, such as name, date of birth, identification document number, biometric identification information, address, communication contact, communication record and content, account number password, property information, credit information, track, accommodation information, health physiological information, transaction information, and the like.
In some embodiments, the designated information includes the personal information in a clear text format and the personal information in an unencrypted encoded format. The plaintext refers to that data is not processed and presented in any way, that is, the personal information in the plaintext indicates that the personal information is not processed and presented in any way, for example, names are presented in the format of zhang san, li si, and the like. Wherein, the non-encrypted encoding format includes but is not limited to: URL encoding format and Base64 encoding format. The URL code is a format for packing form input by a browser, belongs to a coding algorithm and is not an encryption algorithm, namely the personal information in the URL code format refers to the personal information processed by the URL coding algorithm. The Base64 encoding is one of the most common encoding modes for transmitting 8-bit byte codes on a network, the Base64 is a method for representing binary data based on 64 printable characters, belongs to an encoding algorithm and is not an encryption algorithm, namely, personal information in the Base64 encoding format refers to personal information processed by the Base64 encoding algorithm.
Of course, in this embodiment, other more non-encrypted encoding formats may also be included, which is not limited herein.
In some embodiments, the specific information may further include personal information in a simple encryption encoding format, that is, the personal information of the simple encryption encoding person is also encrypted, but the encryption is too simple, the personal information of the user is protected weakly, and if the stored information matches the specific information, the stored information may be considered not to be in compliance with the storage rule.
Step S130: and determining whether the storage information conforms to storage regulations based on the matching result.
In this embodiment, after obtaining the matching results of the plurality of pieces of storage information and the specifying information, it may be determined whether the pieces of storage information conform to the storage regulations based on the matching results, that is, it may be determined whether the pieces of personal information in the pieces of storage information are all stored in encrypted form based on the matching results, where it may be determined that the pieces of storage information conform to the storage regulations when it is determined that the pieces of personal information in the pieces of storage information are all stored in encrypted form, and it may be determined that the pieces of storage information do not conform to the storage regulations when it is determined that the pieces of personal information in the pieces of storage information are not all stored in encrypted form. Therefore, in the embodiment, the personal information is automatically converted into the personal information containing the plaintext format and the non-encrypted encoding format by predefining the designated information, and whether the stored information meets the storage regulation or not is automatically monitored, so that the cost of manual detection can be reduced, and the privacy of the user can be protected.
According to the compliance detection method for the stored information, the stored information is obtained from the target storage position, the stored information is matched with the designated information, a matching result is obtained, the designated information comprises the personal information in the plaintext format and the personal information in the non-encrypted coding format, the personal information is information needing to be encrypted and stored, whether the stored information meets the storage regulation or not is determined based on the matching result, and therefore the stored information, the personal information in the plaintext format and the personal information in the non-encrypted coding format are matched, whether the stored information meets the storage regulation or not is determined based on the matching result, the compliance of the stored information is automatically and rapidly detected, and the personal information of a user is protected.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a compliance detection method for stored information according to another embodiment of the present application. The method is applied to the electronic device, and will be described in detail with reference to the flow shown in fig. 2, and the compliance detection method for stored information may specifically include the following steps:
step S210: a plurality of storage information is retrieved from a target storage location.
Step S220: and matching the plurality of pieces of storage information with the designated information to obtain a matching result, wherein the designated information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information which needs to be encrypted and stored.
For the detailed description of steps S210 to S220, refer to steps S110 to S120, which are not described herein again.
Step S230: when the matching result represents that at least one piece of storage information in the plurality of pieces of storage information is matched with the specified information, determining that the storage information does not conform to the storage regulation.
In some embodiments, after obtaining a matching result of the plurality of storage information and the specific information, the matching result may be judged to obtain a judgment result, wherein when the judgment result indicates that at least one of the plurality of storage information matches the specific information, it may be determined that the storage information does not comply with the storage regulation, and when the judgment result indicates that all of the plurality of storage information do not match the specific information, it may be determined that the storage information complies with the storage regulation. Specifically, when at least one of the plurality of pieces of storage information matches the specifying information, the at least one piece of storage information characterizing the plurality of pieces of storage information is stored in the personal information in a plain format or in the personal information in an unencrypted encoded format, that is, at least one piece of storage information is not encrypted at the time of storing the personal information, and therefore, it can be determined that the storage information does not comply with the storage regulation.
According to the compliance detection method for the stored information, a plurality of pieces of stored information are obtained from a target storage position, the plurality of pieces of stored information are matched with the designated information, a matching result is obtained, the designated information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, the personal information is information needing to be encrypted and stored, and when the matching result indicates that at least one piece of stored information in the plurality of pieces of stored information is matched with the designated information, it is determined that the stored information does not conform to the storage regulation. Compared with the compliance detection method for the stored information shown in fig. 1, the embodiment further improves the accuracy of compliance judgment of the stored information by determining that the stored information does not conform to the storage regulation when at least one of the plurality of stored information matches the specific information.
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating a compliance detection method for stored information according to still another embodiment of the present application. The method is applied to the electronic device, and will be described in detail with reference to the flow shown in fig. 3, and the compliance detection method for stored information may specifically include the following steps:
step S310: a plurality of storage information is retrieved from a target storage location.
Step S320: and matching the plurality of pieces of storage information with the designated information to obtain a matching result, wherein the designated information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information which needs to be encrypted and stored.
For the detailed description of steps S310 to S320, please refer to steps S110 to S120, which are not described herein again.
Step S330: and processing the matching result by a len method in python to obtain a len value.
The len () method in python is used to return the length of the object (character, list, tuple, etc.) or the number of items. In some embodiments, after obtaining the matching results of the plurality of stored information and the specified information, the matching results may be processed by a len method in python to obtain a len value.
Step S340: it is determined whether the storage information conforms to a storage specification based on the len value.
Referring to fig. 4, fig. 4 is a flowchart illustrating a step S340 of the compliance detection method for storing information shown in fig. 3 according to the present application. As will be described in detail with respect to the flow shown in fig. 4, the method may specifically include the following steps:
step S341: when the len value is not 0, it is determined that the storage information does not comply with the storage regulation.
In some embodiments, after the matching result is processed by the len method in python to obtain the len value, the len value can be determined. When the len value is not 0, the storage information matched with the specified information is included in the plurality of storage information, namely the plurality of storage information include the personal information in a plaintext format or the personal information in a non-encrypted coding format, and illegal data exists in the private directory of the target storage position, so that the fact that the storage information does not conform to the storage regulation can be determined.
Step S342: when the len value is 0, it is determined that the storage information conforms to storage regulations.
When the len value is 0, the storage information matched with the specified information is not included in the plurality of storage information, namely the plurality of storage information does not include the personal information in the plaintext format and the personal information in the non-encrypted coding format, and illegal data does not exist in the private directory of the target storage location, so that the storage information can be determined to be in accordance with the storage regulation.
Step S350: and when the storage information is determined not to conform to the storage regulation, generating a detection result file locally at the electronic equipment.
In some embodiments, when it is determined that the storage information does not comply with the storage regulation, a detection result file (file _ result.txt) may be generated locally at the electronic device to record the storage information that does not comply with the storage regulation through the detection result file.
Step S360: and storing the storage information which does not accord with the storage regulation in the plurality of storage information into the detection result file.
In some embodiments, after the detection result file is generated locally at the electronic device, the storage information which does not meet the storage regulation in the plurality of storage information may be saved in the detection result file to provide a reference basis for correction for the storage information corrector.
Referring to fig. 5, fig. 5 is a flowchart illustrating a step S360 of the compliance detection method for storing information shown in fig. 3 according to the present application. As will be explained in detail with respect to the flow shown in fig. 5, the method may specifically include the following steps:
step S361: and acquiring storage information which does not conform to the storage regulation from the plurality of pieces of storage information as target storage information.
In some embodiments, when it is determined that the storage information that does not comply with the storage regulation is included in the plurality of storage information, the storage information that does not comply with the storage regulation may be acquired from the plurality of storage information as the target storage information. For example, when the plurality of storage information includes first storage information, second storage information, third storage information, and fourth storage information, and the first stored information does not match the specified information, the second stored information matches the specified information, the third stored information does not match the specified information, and when the fourth stored information matches the specified information, it may be determined that the information stored in the first stored information and the third stored information is not personal information, or the stored information is personal information in an encrypted format, and the stored information of the second stored information and the fourth stored information is personal information in a plain text format or personal information in a non-encrypted encoded format, and therefore, the first storage information and the third storage information may be determined to comply with the storage regulation, and the second storage information and the fourth storage information may be determined not to comply with the storage regulation, and the second storage information and the fourth storage information may be used as target storage information.
Step S362: and acquiring a file path of the target storage information.
In some embodiments, after the target storage information is obtained, a file path of the target storage information may be obtained. For example, when the acquired target storage information is the second storage information and the fourth storage information, the file path of the second storage information may be acquired, and the storage path of the fourth storage information may be acquired.
Step S363: and saving the target storage information and the file path of the target storage information into the detection result file.
In some embodiments, when the target storage information and the file path of the target storage information are acquired, the target storage information and the file path of the target storage information may be saved in the detection result file, so that the storage information reviewer provides a reference for revising. For example, when the acquired target storage information is the second storage information and the fourth storage information, the second storage information, the fourth storage information, the file path of the second storage information, and the file path of the fourth storage information may all be saved in the detection result file. Of course, in this embodiment, when saving the target storage information and the file path of the target storage information in the detection result file, the file path of the target storage information and the file path of the target storage information may be saved in correspondence or after establishing a correspondence relationship, for example, the file path of the second storage information and the second storage information is saved in one area, or the file path of the second storage information and the file path of the second storage information is saved after establishing a mapping relationship; and storing the fourth storage information and the file path of the fourth storage information in an area, or storing the fourth storage information and the file path of the fourth storage information after establishing a mapping relation.
According to the compliance detection method for the storage information, provided by yet another embodiment of the application, the plurality of pieces of storage information are acquired from the target storage position, the plurality of pieces of storage information are matched with the designated information, a matching result is acquired, the designated information includes personal information in a plaintext format and personal information in a non-encrypted coding format, the personal information is information which needs to be encrypted and stored, the matching result is processed through a len method in python, a len value is acquired, and whether the storage information meets storage regulations or not is determined based on the len value. And when the storage information is determined not to accord with the storage regulation, generating a detection result file locally in the electronic equipment, and storing the storage information which does not accord with the storage regulation in the plurality of storage information into the detection result file. Compared with the compliance detection method for stored information shown in fig. 1, the embodiment further determines the matching result based on the len method of python, so as to improve the efficiency and accuracy of the determination. In addition, the embodiment also generates a detection result file locally in the electronic device to save the storage information which does not conform to the storage regulation, so as to provide a correction reference of the storage information.
Referring to fig. 6, fig. 6 is a schematic flowchart illustrating a compliance detection method for stored information according to another embodiment of the present application. The method is applied to the electronic device, and will be described in detail with reference to the flow shown in fig. 6, where the compliance detection method for stored information may specifically include the following steps:
step S410: and acquiring an execution parameter script.
In this embodiment, the execution parameter script may be acquired when the compliance check is performed on the stored information.
Step S420: and when the execution parameter script accords with the execution condition, acquiring the plurality of storage information from the target storage position.
In some embodiments, an execution condition may be set and stored in advance, and the execution condition is used as a judgment basis for executing the parameter script. Therefore, in this embodiment, after the execution parameter script is obtained, the execution parameter script may be compared with the execution condition to determine whether the execution parameter script meets the execution condition, wherein when the determination result indicates that the execution parameter script meets the execution condition, the plurality of storage information may be obtained from the target storage location, and when the determination result indicates that the execution parameter script does not meet the execution condition, the plurality of storage information may not be obtained from the target storage location.
The execution conditions comprise file _ data _ search.py, search.txt and package _ name, wherein the file _ data _ search.py refers to an execution script for specifically implementing the method, the search.txt refers to a specified detected file which is predefined and contains personal information in a plaintext format and personal information in an unencrypted encoding format, and the package _ name refers to a detected service package name. In some embodiments, after the execution parameter script is obtained, it may be determined whether the execution parameter script includes file _ data _ search.py, search.txt, and package _ name, when the execution parameter script includes file _ data _ search.py, search.txt, and package _ name, it is determined that the execution parameter script meets the execution condition, and when the execution parameter script does not include any one or more of file _ data _ search.py, search.txt, and package _ name, it is determined that the execution parameter script does not meet the execution condition, it is determined that the execution parameter script does not obtain the plurality of storage information from the target storage location.
Step S430: and acquiring the specified information from the specified detected file stored locally in the electronic equipment.
In some embodiments, the specified detected file search. txt may be preset and stored locally in the electronic device, and the specified information is recorded and stored in the detected file. After the execution parameter script is obtained, the corresponding specified detected file can be found locally in the electronic device according to search.
Step S440: and matching the plurality of pieces of storage information with the specified information to obtain a matching result, wherein the specified information comprises the personal information in a plaintext format and the personal information in a non-encrypted coding format, and the personal information is information which needs to be encrypted and stored.
For detailed description of step S440, please refer to step S120, which is not described herein.
Referring to fig. 7, fig. 7 is a flowchart illustrating an embodiment of step S440 of the compliance detection method for stored information shown in fig. 6 of the present application. The specific information is stored in the specific detected file in a specific encoding format, and as will be described in detail with respect to the flow shown in fig. 7, the method may specifically include the following steps:
step S441A: and converting the current formats of the plurality of pieces of storage information into the specified coding formats to obtain the plurality of pieces of storage information of the specified coding formats.
When the plurality of pieces of stored information and the designated information are matched, there may be a problem that the information is abnormal in the matching process because the plurality of pieces of stored information or the designated information are conversion codes, for example, when some information in the plurality of pieces of stored information or the designated information is a chinese character, the chinese character may cause a problem that the information cannot be recognized, and a problem that the information is abnormal in the matching process between the plurality of pieces of stored information and the designated information may be caused. Therefore, in some embodiments, the specific information stored in the specific detected file may be stored in a specific encoding format, and after obtaining the plurality of stored information, the current format of the plurality of stored information may be converted into the specific encoding format, so as to obtain the stored information in the plurality of specific encoding formats, so as to ensure the normal matching between the plurality of stored information and the specific information.
In some embodiments, the current data format of the plurality of storage information may be converted into the specified encoding format by an encode method in python, so as to obtain the storage information in the plurality of specified encoding formats. Among them, the encode () method in python functions to encode a character string in an encoding format specified by encoding.
In some embodiments, the specified encoding format includes an utf-8 encoding format. That is, the specifying information may be stored in the specified detected file in the encoding format of utf-8, and after obtaining the plurality of pieces of storage information, the plurality of pieces of storage information may be converted into the encoding format of utf-8 to obtain the plurality of pieces of storage information in the encoding format of utf-8.
Step S442A: and matching the storage information of the plurality of specified coding formats with the specified information of the specified coding format.
In some embodiments, after the storage information of the plurality of specified encoding formats is obtained, the storage information of the plurality of specified encoding formats and the specified information of the specified encoding format stored in the specified detected file can be matched, so that the storage information and the specified information can be normally matched, and the problem of data abnormality can be avoided.
Referring to fig. 8, fig. 8 is a flowchart illustrating a step S440 of the compliance detection method for stored information shown in fig. 6 according to another embodiment of the present application. As will be explained in detail with respect to the flow shown in fig. 8, the method may specifically include the following steps:
step S441B: and converting the current formats of the plurality of pieces of storage information into the specified coding formats to obtain the plurality of pieces of storage information of the specified coding formats.
When the plurality of pieces of stored information and the designated information are matched, there may be a problem that the information is abnormal in the matching process because the plurality of pieces of stored information or the designated information are conversion codes, for example, when some information in the plurality of pieces of stored information or the designated information is a chinese character, the chinese character may cause a problem that the information cannot be recognized, and a problem that the information is abnormal in the matching process between the plurality of pieces of stored information and the designated information may be caused. Therefore, in some embodiments, the current data format of the plurality of storage information may be converted into the specified encoding format by an encode method in python, and the storage information of the plurality of specified encoding formats may be obtained.
In some embodiments, the specified encoding format includes an utf-8 encoding format. After obtaining the plurality of pieces of storage information, the plurality of pieces of storage information may be converted into the utf-8 encoding format to obtain the storage information of the plurality of utf-8 encoding formats.
Step S442B: and converting the current format of the specified information into the specified coding format to obtain the specified information of the specified coding format.
In some embodiments, the specific information may be stored in the specific detected file in the form of personal information in a plain text format or personal information in an unencrypted encoding format, so that in some embodiments, the current data format of the specific information may be converted into the specific encoding format by an encode method in python, and the specific information in the specific encoding format may be obtained.
In some embodiments, the specified encoding format includes an utf-8 encoding format. After obtaining the specifying information, the specifying information may be converted into the utf-8 encoding format to obtain the specifying information of the utf-8 encoding format.
Step S443B: and matching the storage information of the plurality of specified coding formats with the specified information of the specified coding format.
In some embodiments, after the storage information of the plurality of specified encoding formats and the specified information of the specified encoding formats are obtained, the storage information of the plurality of specified encoding formats and the specified information of the specified encoding formats may be matched to ensure normal matching of the storage information and the specified information and avoid the problem of data abnormality.
Step S450: and determining whether the storage information conforms to storage regulations based on the matching result.
For details of step S450, please refer to step S130, which is not repeated herein.
According to the compliance detection method for the stored information, the execution parameter script is obtained, when the execution parameter script meets the execution condition, the plurality of pieces of stored information are obtained from the target storage file, the designated information is obtained from the execution detected file stored locally in the electronic device, the plurality of pieces of stored information and the designated information are matched to obtain the matching result, wherein the designated information comprises the personal information in the plaintext format and the personal information in the non-encrypted coding format, the personal information is the information needing to be encrypted and stored, and whether the stored information meets the storage regulation or not is determined based on the matching result. Compared with the compliance detection method for stored information shown in fig. 1, the embodiment further determines the execution parameter script, and obtains the specified information from the specified detected file stored locally in the electronic device, so as to improve the accuracy of stored information detection.
Referring to fig. 9, fig. 9 is a schematic flowchart illustrating a compliance detection method for stored information according to yet another embodiment of the present application. The method is applied to the electronic device, and will be described in detail with reference to the flow shown in fig. 9, where the compliance detection method for stored information may specifically include the following steps:
step S510: and when the target storage position is a client database, downloading the plurality of storage information from the client database to the local of the electronic equipment.
In some embodiments, each application may acquire personal information of the user during use and store the personal information of the user in the client database for subsequent authentication, verification, and the like, and thus, the target storage location may include the client database.
In this embodiment, when the target storage location is a client database, the data size of the storage information stored in the client database is small, and the time consumed for downloading is short, and the plurality of storage information can be downloaded from the client database to the local of the electronic device for performing subsequent polling detection on the plurality of storage information. As one mode, when the target storage location is a client database, the corresponding storage information may be matched and downloaded from the client database to the local of the electronic device according to the package _ name in the execution parameter script.
Step S520: and matching the plurality of pieces of storage information with the designated information to obtain a matching result, wherein the designated information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information which needs to be encrypted and stored.
Step S530: and determining whether the storage information conforms to storage regulations based on the matching result.
For the detailed description of steps S520 to S530, please refer to steps S120 to S130, which are not described herein again.
Step S540: and outputting and displaying the matching result.
In some embodiments, after a matching result of a plurality of pieces of stored information and specified information is obtained, the matching result may be output and displayed. The matching result may be directly output and displayed on the electronic device, or may be sent to other displayable devices through the electronic device to be displayed, which is not limited herein.
In another embodiment of the compliance detection method for stored information provided in this application, when the target storage location is a client database, the multiple pieces of stored information are downloaded from the client database to a local of the electronic device, and are matched with the designated information to obtain a matching result, where the designated information includes personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information that needs to be encrypted and stored, and whether the stored information meets a storage specification is determined based on the matching result, and the matching result is output and displayed. Compared with the compliance detection method for stored information shown in fig. 1, in this embodiment, when the target storage location is the client database, the stored information is downloaded to the local of the electronic device, so as to ensure normal polling verification of the stored information. In addition, the matching result is obtained and output and displayed, so that the stored information which is not in compliance can be corrected conveniently.
Referring to fig. 10, fig. 10 is a schematic flow chart illustrating a compliance detection method for stored information according to yet another embodiment of the present application. The method is applied to the electronic device, and will be described in detail with reference to the flow shown in fig. 10, and the compliance detection method for stored information may specifically include the following steps:
step S610: and when the target storage position is an external memory, entering the external memory through an adb command to acquire the plurality of storage information.
In some embodiments, each peripheral memory may store the user's personal information, for example, a usb disk, an SD card, or other peripheral memory may store the user's personal information and provide the user's personal information to other devices or applications when the other devices or applications call the user's personal information, and thus, the target storage location may include the peripheral memory.
In this embodiment, when the target storage location is an external memory, the data size of the storage information stored in the external memory is large, the time consumed for downloading is long, the storage information can enter the external memory through an adb command to acquire a plurality of pieces of storage information, and matching and verification of the storage information and the designated information are performed in the external memory, where the adb tool is Android Debug bridges (Android Debug Bridge) tools. It is a command line window for interacting with a simulator or real device through a computer side. As one mode, when the target storage location is the peripheral memory, the storage location may be determined from the peripheral memory according to a package _ name in the execution parameter script, and the storage location enters the peripheral memory through an adb command to acquire a plurality of pieces of storage information for matching verification.
Step S620: and matching the plurality of pieces of storage information with the designated information to obtain a matching result, wherein the designated information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information which needs to be encrypted and stored.
Step S630: and determining whether the storage information conforms to storage regulations based on the matching result.
For detailed description of steps S620 to S630, please refer to steps S120 to S130, which are not described herein again.
Step S640: and outputting and displaying the matching result.
For detailed description of step S640, please refer to step S540, which is not described herein again.
In another embodiment of the application, when the target storage location is an external memory, entering the external memory through an adb command to acquire a plurality of pieces of storage information, matching the plurality of pieces of storage information with the designated information to obtain a matching result, where the designated information includes personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information that needs to be encrypted and stored, determining whether the storage information meets a storage rule based on the matching result, and outputting and displaying the matching result. Compared with the compliance detection method for the storage information shown in fig. 1, in the embodiment, when the target storage location is an external memory, the storage information is directly acquired from the external memory, so as to save the acquisition time of the storage information. In addition, the matching result is obtained and output and displayed, so that the stored information which is not in compliance can be corrected conveniently.
Referring to fig. 11, fig. 11 is a block diagram illustrating a compliance detection device 200 for storing information according to an embodiment of the present application. The compliance detection device 200 for storing information is applied to the electronic device, and will be explained with reference to a block diagram shown in fig. 11, and the compliance detection device 200 for storing information includes: a storage information obtaining module 210, a matching result obtaining module 220, and a compliance detecting module 230, wherein:
the storage information obtaining module 210 is configured to obtain a plurality of storage information from the target storage location.
Further, the storage information obtaining module 210 includes: a first storage information acquisition sub-module, wherein:
and the first storage information acquisition sub-module is used for downloading the plurality of storage information from the client database to the local of the electronic equipment when the target storage position is the client database.
Further, the first storage information obtaining sub-module includes: the system comprises a service package name acquisition unit and a storage information downloading unit, wherein:
and the service package name acquisition unit is used for acquiring the detected service package name when the target storage position is a client database.
And the storage information downloading unit is used for downloading the plurality of storage information from the client database to the local of the electronic equipment according to the detected service package name.
Further, the storage information obtaining module 210 includes: a second storage information acquisition sub-module, wherein:
and the second storage information acquisition submodule is used for entering the peripheral memory through an adb command to acquire the plurality of storage information when the target storage position is the peripheral memory.
Further, the storage information obtaining module 210 includes: executing a parameter script obtaining submodule and a third storage information obtaining submodule, wherein:
and the execution parameter script acquisition submodule is used for acquiring the execution parameter script.
And the third storage information acquisition sub-module is used for acquiring the plurality of storage information from the target storage position when the execution parameter script accords with the execution condition.
A matching result obtaining module 220, configured to match the multiple pieces of storage information with specified information, so as to obtain a matching result, where the specified information includes personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information that needs to be encrypted and stored.
Further, the specific information is stored in the specific detected file in a specific encoding format, and the matching result obtaining module 220 includes: a first stored information obtaining sub-module and a first matching sub-module, wherein:
the first storage information obtaining submodule is used for converting the current format of the plurality of storage information into a specified coding format and obtaining the storage information of the plurality of specified coding formats.
Further, the first storage information obtaining sub-module includes: a storage information obtaining unit, wherein:
and the storage information obtaining unit is used for converting the current data format of the plurality of storage information into the specified coding format by an encode method in python to obtain the storage information of the plurality of specified coding formats.
And the first matching submodule is used for matching the storage information of the plurality of specified coding formats with the specified information of the specified coding format.
Further, the matching result obtaining module 220 includes: a second storage information obtaining submodule, an appointed information obtaining submodule and a second matching submodule, wherein:
and the second storage information obtaining submodule is used for converting the current format of the plurality of storage information into a specified coding format and obtaining the storage information of the plurality of specified coding formats.
And the appointed information obtaining submodule is used for converting the current format of the appointed information into the appointed coding format and obtaining the appointed information of the appointed coding format.
And the second matching submodule is used for matching the storage information of the plurality of specified coding formats with the specified information of the specified coding format.
A compliance detection module 230, configured to determine whether the storage information complies with a storage specification based on the matching result.
Further, the compliance detection module 230 includes: a first compliance determination submodule, wherein:
and the first compliance determining submodule is used for determining that the storage information is not in compliance with the storage regulation when the matching result represents that at least one piece of storage information in the plurality of pieces of storage information is matched with the specified information.
Further, the compliance detection module 230 includes: a len value obtaining sub-module and a second compliance determining sub-module, wherein:
and the len value obtaining submodule is used for processing the matching result through a len method in python to obtain a len value.
And the second compliance determining submodule is used for determining whether the storage information conforms to the storage regulation or not based on the len value.
Further, the second compliance determination submodule includes: a first compliance determination unit and a second compliance determination unit, wherein:
a first compliance determination unit configured to determine that the storage information does not comply with a storage regulation when the len value is not 0.
A second compliance determination unit configured to determine that the storage information complies with a storage regulation when the len value is 0.
Further, the compliance detection device 200 for storing information further includes: the detection result file generation module and the storage information storage module, wherein:
and the detection result file generation module is used for generating a detection result file locally in the electronic equipment when the storage information is determined not to conform to the storage regulation.
And the storage information storage module is used for storing the storage information which does not accord with the storage regulation in the plurality of storage information into the detection result file.
Further, the storage information saving module comprises: the device comprises a target storage information acquisition submodule, a file path acquisition submodule and a storage information storage submodule, wherein:
and the target storage information acquisition submodule is used for acquiring the storage information which does not accord with the storage regulation from the plurality of storage information as the target storage information.
And the file path acquisition submodule is used for acquiring a file path of the target storage information.
And the storage information storage sub-module is used for storing the target storage information and the file path of the target storage information into the detection result file.
Further, the compliance detection device 200 for storing information includes: a designation information acquisition module, wherein:
and the specified information acquisition module is used for acquiring specified information from a specified detected file stored locally in the electronic equipment.
Further, the compliance detection device 200 for storing information further includes: a matching result display module, wherein:
and the matching result display module is used for outputting and displaying the matching result.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 12, a block diagram of an electronic device 100 according to an embodiment of the present disclosure is shown. The electronic device 100 may be a smart phone, a tablet computer, an electronic book, or other electronic devices capable of running an application. The electronic device 100 in the present application may include one or more of the following components: a processor 110, a memory 120, a touch screen 130, and one or more applications, wherein the one or more applications may be stored in the memory 120 and configured to be executed by the one or more processors 110, the one or more programs configured to perform the methods as described in the aforementioned method embodiments.
Processor 110 may include one or more processing cores, among other things. The processor 110 connects various parts within the overall electronic device 100 using various interfaces and lines, and performs various functions of the electronic device 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and calling data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or a combination of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content to be displayed; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a stored program area and a stored information area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage information area may also store data (such as a phonebook, audio-video data, chatting log data) created by the mobile terminal 100 in use, and the like.
The touch screen 130 is used for displaying information input by a user, information provided to the user, and various graphical user interfaces of the electronic device 100, which may be composed of graphics, text, icons, numbers, video, and any combination thereof, and in one example, the touch screen 130 may be a Liquid Crystal Display (LCD) or an Organic Light-Emitting Diode (OLED), which is not limited herein.
Referring to fig. 13, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable medium 300 has stored therein a program code that can be called by a processor to execute the method described in the above-described method embodiments.
The computer-readable storage medium 300 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 300 includes a non-volatile computer-readable storage medium. The computer readable storage medium 300 has storage space for program code 310 for performing any of the method steps of the method described above. The program code can be read from and written to one or more computer program products. The program code 310 may be compressed, for example, in a suitable form.
In summary, according to the compliance detection method and apparatus for stored information, an electronic device, and a storage medium provided in the embodiments of the present application, a plurality of pieces of stored information are obtained from a target storage location, and the plurality of pieces of stored information are matched with designated information to obtain a matching result, where the designated information includes personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information that needs to be encrypted and stored, and it is determined whether the stored information meets a storage rule based on the matching result, so that by matching the stored information with the personal information in the plaintext format and the personal information in the non-encrypted coding format, and determining whether the stored information meets the storage rule based on the matching result, compliance of the stored information is automatically and quickly detected, and the personal information of a user is protected.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (20)

  1. A compliance detection method for stored information, applied to an electronic device, the method comprising:
    acquiring a plurality of storage information from a target storage location;
    matching the plurality of pieces of storage information with specified information to obtain a matching result, wherein the specified information comprises personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information needing to be encrypted and stored;
    and determining whether the storage information conforms to storage regulations based on the matching result.
  2. The method of claim 1, wherein the determining whether the stored information complies with storage specifications based on the matching results comprises:
    when the matching result represents that at least one piece of storage information in the plurality of pieces of storage information is matched with the specified information, determining that the storage information does not conform to the storage regulation.
  3. The method of claim 1, wherein the determining whether the stored information complies with storage specifications based on the matching results comprises:
    processing the matching result by a len method in python to obtain a len value;
    it is determined whether the storage information conforms to a storage specification based on the len value.
  4. The method according to claim 3, wherein said determining whether said stored information complies with a storage specification based on said len value comprises:
    when the len value is not 0, determining that the storage information does not conform to storage regulations;
    when the len value is 0, it is determined that the storage information conforms to storage regulations.
  5. The method according to any one of claims 1-4, wherein after determining whether the stored information complies with a storage specification based on the matching result, further comprising:
    when the storage information is determined not to conform to the storage regulation, generating a detection result file locally in the electronic equipment;
    and storing the storage information which does not accord with the storage regulation in the plurality of storage information into the detection result file.
  6. The method according to claim 5, wherein the saving of the storage information that does not comply with the storage rule in the storage information into the detection result file comprises:
    acquiring storage information which does not conform to storage regulations from the plurality of pieces of storage information as target storage information;
    acquiring a file path of the target storage information;
    and saving the target storage information and the file path of the target storage information into the detection result file.
  7. The method according to any one of claims 1-6, wherein prior to matching the plurality of stored information with the specified information, further comprising:
    and acquiring the specified information from the specified detected file stored locally in the electronic equipment.
  8. The method of claim 7, wherein the specific information is stored in the specific detected file in a specific encoding format, and wherein matching the plurality of stored information with the specific information comprises:
    converting the current formats of the plurality of storage information into specified coding formats to obtain the storage information of the plurality of specified coding formats;
    and matching the storage information of the plurality of specified coding formats with the specified information of the specified coding format.
  9. The method of claim 7, wherein matching the plurality of stored information with the specified information comprises:
    converting the current formats of the plurality of storage information into specified coding formats to obtain the storage information of the plurality of specified coding formats;
    converting the current format of the specified information into the specified coding format to obtain the specified information of the specified coding format;
    and matching the storage information of the plurality of specified coding formats with the specified information of the specified coding format.
  10. The method according to claim 8 or 9, wherein the converting the current format of the plurality of stored information into the specified encoding format to obtain the stored information in the plurality of specified encoding formats comprises:
    and converting the current data format of the plurality of storage information into the specified coding format by an encode method in python to obtain the storage information of the plurality of specified coding formats.
  11. The method of any of claims 8-10, wherein the specified encoding format comprises an utf-8 encoding format.
  12. The method according to any one of claims 1-11, wherein said retrieving a plurality of storage information from a target storage location comprises:
    and when the target storage position is a client database, downloading the plurality of storage information from the client database to the local of the electronic equipment.
  13. The method of claim 12, downloading the plurality of stored information from the client database to local to the electronic device when the target storage location is a client database, comprising:
    when the target storage position is a client database, acquiring the name of the detected service packet;
    and downloading the plurality of stored information from the client database to the local of the electronic equipment according to the detected service package name.
  14. The method according to any one of claims 1-11, wherein said retrieving a plurality of storage information from a target storage location comprises:
    and when the target storage position is an external memory, entering the external memory through an adb command to acquire the plurality of storage information.
  15. The method of any one of claims 1-14, wherein obtaining a plurality of storage information from a target storage location comprises:
    acquiring an execution parameter script;
    and when the execution parameter script accords with the execution condition, acquiring the plurality of storage information from the target storage position.
  16. The method according to any one of claims 1 to 15, wherein the matching the plurality of pieces of stored information with the specific information to obtain a matching result further comprises:
    and outputting and displaying the matching result.
  17. The method of any of claims 1-16, wherein the non-encrypted encoding format comprises a URL encoding format and a Base64 encoding format.
  18. A compliance detection device for storing information, applied to an electronic device, the device comprising:
    the storage information acquisition module is used for acquiring a plurality of pieces of storage information from the target storage position;
    a matching result obtaining module, configured to match the multiple pieces of stored information with specified information to obtain a matching result, where the specified information includes personal information in a plaintext format and personal information in a non-encrypted coding format, and the personal information is information that needs to be encrypted and stored;
    and the compliance detection module is used for determining whether the storage information conforms to the storage regulations or not based on the matching result.
  19. An electronic device comprising a memory and a processor, the memory coupled to the processor, the memory storing instructions that, when executed by the processor, the processor performs the method of any of claims 1-17.
  20. A computer-readable storage medium having program code stored therein, the program code being invoked by a processor to perform the method of any one of claims 1 to 17.
CN202080084650.2A 2020-03-10 2020-03-10 Compliance detection method and device for stored information, electronic device and storage medium Pending CN114846470A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/078553 WO2021179155A1 (en) 2020-03-10 2020-03-10 Compliance test method and apparatus for storage information, electronic device, and storage medium

Publications (1)

Publication Number Publication Date
CN114846470A true CN114846470A (en) 2022-08-02

Family

ID=77671112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080084650.2A Pending CN114846470A (en) 2020-03-10 2020-03-10 Compliance detection method and device for stored information, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN114846470A (en)
WO (1) WO2021179155A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116773840B (en) * 2023-08-25 2023-10-27 四川徕伯益自动化技术有限公司 Tracing method and medium for sample solution

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105991670B (en) * 2015-01-28 2020-02-14 中兴通讯股份有限公司 Data sharing method, data sharing device and terminal
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN106815534B (en) * 2017-01-17 2020-02-14 Oppo广东移动通信有限公司 Method and device for protecting user privacy and mobile terminal
CN109766485A (en) * 2018-12-07 2019-05-17 中国电力科学研究院有限公司 A kind of sensitive information inspection method and system

Also Published As

Publication number Publication date
WO2021179155A1 (en) 2021-09-16

Similar Documents

Publication Publication Date Title
CN104036160B (en) A kind of Web browser method, device and browser
WO2018120722A1 (en) Asynchronous interface testing method, terminal, device, system, and storage medium
US10063620B2 (en) Information sharing method and system
CN105391674B (en) Information processing method and system, server and client
KR20140042905A (en) Identity authentication and management device and method thereof
CN109547426B (en) Service response method and server
CN110399748A (en) A kind of screenshot method and device based on image recognition
CN110826068B (en) Safety detection method and safety detection system
CN111586005B (en) Scanner scanning behavior identification method and device
WO2014194827A1 (en) Method and device for mobile terminal to process visualization graphics code
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN110750750A (en) Webpage generation method and device, computer equipment and storage medium
CN103488947A (en) Method and device for identifying instant messaging client-side account number stealing Trojan horse program
CN110519405A (en) A kind of short chain address operation access method, device, equipment and storage medium
CN115795538A (en) Desensitization document anti-desensitization method, apparatus, computer device and storage medium
CN114846470A (en) Compliance detection method and device for stored information, electronic device and storage medium
CN114117498A (en) Desensitization data realization method, device, system, equipment and storage medium
CN106156642A (en) Data ciphering method and device
CN114996708B (en) Method and device for studying and judging fraud-related mobile phone application, electronic equipment and storage medium
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN111107074A (en) Method, training method and device for preventing network crawler from stealing private data
WO2022116587A1 (en) Web end data signature method and apparatus, and computer device
CN114756833A (en) Code obfuscation method, apparatus, device, medium, and program product
CN110730157A (en) Storage system intrusion detection method, system, terminal and storage medium
CN110717078A (en) Beauty shop business data monitoring method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination