CN115664864A - Information security prompting method and system - Google Patents

Information security prompting method and system Download PDF

Info

Publication number
CN115664864A
CN115664864A CN202211679407.2A CN202211679407A CN115664864A CN 115664864 A CN115664864 A CN 115664864A CN 202211679407 A CN202211679407 A CN 202211679407A CN 115664864 A CN115664864 A CN 115664864A
Authority
CN
China
Prior art keywords
information
security
browsed
exception
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211679407.2A
Other languages
Chinese (zh)
Other versions
CN115664864B (en
Inventor
张晓东
周书平
关勇
孔令武
张向华
黄建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Luoan Technology Co Ltd
Original Assignee
Beijing Luoan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Luoan Technology Co Ltd filed Critical Beijing Luoan Technology Co Ltd
Priority to CN202211679407.2A priority Critical patent/CN115664864B/en
Publication of CN115664864A publication Critical patent/CN115664864A/en
Application granted granted Critical
Publication of CN115664864B publication Critical patent/CN115664864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information security, and particularly discloses an information security prompting method and system. The invention generates an information security strategy by receiving the security setting information of a user aiming at information security; guiding a user to mark a plurality of information to be browsed; pre-browsing and identifying a plurality of information to be browsed, and marking a plurality of safety abnormal positions and corresponding safety abnormal features; carrying out statistic prompt on the safety abnormal features, and carrying out marking prompt on the safety abnormal positions; and receiving the exception handling operation of the user, and performing exception handling on the safety exception characteristic. The method can generate an information security policy matched with the user setting, pre-browse and identify the information to be browsed, mark a security abnormal position and a security abnormal characteristic, perform statistic prompt of the abnormal characteristic and mark prompt of the abnormal position in the information browsing process of the user, and avoid the user from mistakenly touching abnormal content in the information, thereby facilitating the safe use of the user for complicated information in the Internet.

Description

Information security prompting method and system
Technical Field
The invention belongs to the technical field of information security, and particularly relates to an information security prompting method and system.
Background
Information security is the technical and administrative security protection established and adopted by data processing systems in order to protect computer hardware, software, and user data from being damaged, altered, and revealed by accidental and malicious reasons. And website security detection, which is also called website security assessment, website vulnerability testing, web security detection and the like. The method is characterized in that vulnerability scanning is carried out on a website through a technical means, whether a webpage has a vulnerability or not, whether the webpage is hung with a horse or not, whether the webpage is tampered or not, whether a cheating website exists or not and the like are detected, a website administrator is reminded of repairing and reinforcing in time, and the safe operation of the Web website is guaranteed.
With the rapid development of internet technology in recent years, internet technology has existed in the aspects of people's life, so that people can acquire various information more quickly and more conveniently through the internet. However, due to the characteristics of internet technology, some security anomalies may be carried in the information acquired by people, such as: the method comprises the steps of advertising, malicious monitoring, malicious guiding, information leakage and the like, and because the information in the Internet is of various types, the safety detection of each piece of published information is difficult to realize, so that the information acquired by a user has abnormal contents which are difficult to perceive, and the normal use of the information by the user is influenced.
Disclosure of Invention
The embodiment of the invention aims to provide an information safety prompting method and system, and aims to solve the problems in the background technology.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
an information security prompting method specifically comprises the following steps:
receiving security setting information of a user for information security, and generating an information security policy according to the security setting information;
guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
according to the information security strategy, pre-browsing and identifying the information to be browsed, and marking a plurality of security abnormal positions and corresponding security abnormal features;
according to the information security strategy, carrying out statistical prompt on security exception features corresponding to a plurality of information to be browsed, and carrying out marking prompt on security exception positions;
and receiving the exception handling operation of the user, and performing exception handling on the corresponding safety exception features at a plurality of safety exception positions.
As a further limitation of the technical solution of the embodiment of the present invention, the receiving security setting information of a user for information security, and generating an information security policy according to the security setting information specifically includes the following steps:
generating and displaying a prompt setting interface;
receiving a plurality of safety settings of a user on the prompt setting interface;
arranging the plurality of security settings to generate security setting information;
and carrying out policy analysis on the security setting information to generate an information security policy.
As a further limitation of the technical solution of the embodiment of the present invention, the directing a user to mark a plurality of pieces of information to be browsed according to the information security policy specifically includes the following steps:
constructing an interface to be browsed according to the information security policy;
generating and displaying operation guide information according to the information security policy;
guiding a user to mark a plurality of information to be browsed according to the operation guiding information;
and transferring the information to be browsed to an interface to be browsed.
As a further limitation of the technical solution of the embodiment of the present invention, the pre-browsing identification of the plurality of pieces of information to be browsed according to the information security policy, and the marking of the plurality of security exception positions and the corresponding security exception features specifically include the following steps:
acquiring a plurality of abnormal feature tags according to the information security policy;
according to the plurality of abnormal feature tags, pre-browsing identification is carried out on the plurality of information to be browsed, and an abnormal identification result is generated;
and marking a plurality of safety exception positions and corresponding safety exception features according to the exception identification result.
As a further limitation of the technical solution of the embodiment of the present invention, the statistical prompting of the security anomaly characteristics corresponding to a plurality of information to be browsed according to the information security policy, and the marking and prompting of the security anomaly position specifically include the following steps:
determining a marking style according to the information security policy, and creating a security prompt window;
counting the safety abnormal features corresponding to the information to be browsed to generate a plurality of abnormal statistical data;
in the safety prompt window, carrying out statistical prompt on a plurality of abnormal statistical data;
and marking and prompting the safety abnormal position according to the marking pattern.
As a further limitation of the technical solution of the embodiment of the present invention, the receiving an exception handling operation of a user, and performing exception handling on a corresponding security exception feature at a plurality of security exception locations specifically includes the following steps:
receiving exception handling operation of a user;
generating a corresponding exception handling instruction according to the exception handling operation;
and according to the exception handling instruction, carrying out exception handling on the corresponding security exception features at a plurality of security exception positions.
An information security prompt system comprises a security policy generation unit, an information mark guide unit, a pre-browsing identification unit, an information exception prompt unit and an information exception processing unit, wherein:
the security policy generation unit is used for receiving security setting information of a user aiming at information security and generating an information security policy according to the security setting information;
the information mark guiding unit is used for guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
the pre-browsing identification unit is used for performing pre-browsing identification on the information to be browsed according to the information security policy and marking a plurality of security abnormal positions and corresponding security abnormal features;
the information abnormity prompting unit is used for carrying out statistic prompting on safety abnormity characteristics corresponding to a plurality of information to be browsed according to the information safety strategy and carrying out marking prompting on safety abnormity positions;
and the information exception handling unit is used for receiving exception handling operation of a user and carrying out exception handling on corresponding safety exception features at a plurality of safety exception positions.
As a further limitation of the technical solution of the embodiment of the present invention, the security policy generating unit specifically includes:
the interface generating module is used for generating and displaying a prompt setting interface;
the setting receiving module is used for receiving a plurality of safety settings of a user on the prompt setting interface;
the setting arrangement module is used for arranging the plurality of safety settings to generate safety setting information;
and the policy analysis module is used for performing policy analysis on the security setting information to generate an information security policy.
As a further limitation of the technical solution of the embodiment of the present invention, the information mark directing unit specifically includes:
the interface construction module is used for constructing an interface to be browsed according to the information security strategy;
the information generating module is used for generating and displaying operation guide information according to the information security policy;
the mark guiding module is used for guiding a user to mark a plurality of information to be browsed according to the operation guiding information;
and the information transfer module is used for transferring the information to be browsed to an interface to be browsed.
As a further limitation of the technical solution of the embodiment of the present invention, the pre-browsing identification unit specifically includes:
the label obtaining module is used for obtaining a plurality of abnormal characteristic labels according to the information security strategy;
the pre-browsing identification module is used for performing pre-browsing identification on the information to be browsed according to the abnormal feature tags to generate an abnormal identification result;
and the abnormity marking module is used for marking a plurality of safety abnormity positions and corresponding safety abnormity characteristics according to the abnormity identification result.
Compared with the prior art, the invention has the beneficial effects that:
the embodiment of the invention generates an information security policy by receiving security setting information of a user aiming at information security; guiding a user to mark a plurality of information to be browsed; pre-browsing and identifying a plurality of information to be browsed, and marking a plurality of safety abnormal positions and corresponding safety abnormal features; carrying out statistic prompt on the safety abnormal features, and carrying out marking prompt on the safety abnormal positions; and receiving the exception handling operation of the user, and carrying out exception handling on the security exception characteristic. The information security strategy matched with the user setting can be generated, pre-browsing identification is carried out on the information to be browsed, the safety abnormal position and the safety abnormal characteristic are marked, in the information browsing process of the user, the statistic prompt of the abnormal characteristic and the mark prompt of the abnormal position are carried out, the user is prevented from mistakenly touching the abnormal content in the information, and therefore the user can conveniently and safely use the complicated information in the internet.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
FIG. 1 shows a flow chart of a method provided by an embodiment of the invention;
FIG. 2 is a flow chart illustrating the generation of an information security policy in the method provided by the embodiment of the present invention;
FIG. 3 is a flow chart illustrating security policy marking directions in a method provided by an embodiment of the invention;
FIG. 4 is a flow chart illustrating a pre-browsing identification process in the method provided by the embodiment of the invention;
FIG. 5 is a flow chart illustrating a statistical hint flag hint in a method provided by an embodiment of the present invention;
FIG. 6 is a flow diagram illustrating exception handling for exception features in a method provided by an embodiment of the present invention;
FIG. 7 is a diagram illustrating an application architecture of a system provided by an embodiment of the present invention;
fig. 8 shows a block diagram of a security policy generation unit in the system according to the embodiment of the present invention;
FIG. 9 is a block diagram illustrating an exemplary structure of a tag information directing unit in the system according to an embodiment of the present invention;
fig. 10 shows a block diagram of a pre-browsing identification unit in the system according to the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It can be understood that, in the prior art, due to the characteristics of the internet technology, the information acquired by people may carry some contents of security exception, such as: the method comprises the following steps of advertising, malicious monitoring, malicious guidance, information leakage and the like, and because the information in the internet is various, the safety detection of each issued information is difficult to realize, so that the information acquired by a user has abnormal contents which are difficult to detect, and the normal use of the information by the user is influenced.
In order to solve the above problem, the embodiment of the present invention generates an information security policy by receiving security setting information for information security of a user; guiding a user to mark a plurality of information to be browsed; pre-browsing and identifying a plurality of information to be browsed, and marking a plurality of safety abnormal positions and corresponding safety abnormal features; carrying out statistic prompt on the safety abnormal features, and carrying out marking prompt on the safety abnormal positions; and receiving the exception handling operation of the user, and carrying out exception handling on the security exception characteristic. The method can generate an information security policy matched with the user setting, pre-browse and identify the information to be browsed, mark a security abnormal position and a security abnormal characteristic, perform statistic prompt of the abnormal characteristic and mark prompt of the abnormal position in the information browsing process of the user, and avoid the user from mistakenly touching abnormal content in the information, thereby facilitating the safe use of the user for complicated information in the Internet.
Fig. 1 shows a flow chart of a method provided by an embodiment of the invention.
Specifically, in a preferred embodiment provided by the present invention, an information security prompt method specifically includes the following steps:
step S101, receiving security setting information of a user aiming at information security, and generating an information security policy according to the security setting information.
In the embodiment of the invention, by generating and displaying the prompt setting interface, a user can perform related setting operation in the prompt setting interface, receive a plurality of security settings of the user, arrange the security settings to generate security setting information, perform security program matching according to the security setting information, and generate an information security policy.
It can be understood that, in the prompt setting interface, there are a plurality of virtual switches of security settings such as advertisement, malicious monitoring, malicious guidance, information disclosure, and the user can set up the operation by clicking the relevant virtual switch, and each security setting corresponds to the security program that has abnormal recognition, and the information security policy is obtained by integrating the security programs corresponding to a plurality of security settings.
Specifically, fig. 2 shows a flowchart of generating an information security policy in the method provided in the embodiment of the present invention.
In an embodiment of the present invention, the receiving security setting information of a user for information security, and generating an information security policy according to the security setting information specifically includes the following steps:
and step S1011, generating and displaying a prompt setting interface.
Step S1012, receiving a plurality of security settings of the user on the prompt setting interface.
Step S1013, collating the plurality of security settings to generate security setting information.
Step 1014, performing policy analysis on the security setting information, and generating an information security policy.
Further, the information security prompting method further comprises the following steps:
and S102, guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy.
In the embodiment of the invention, an independent interface to be browsed is constructed according to an information security policy, operation guide information marked by information is generated according to the information security policy, the operation guide information is displayed on the side of the interface to be browsed, a user is guided to mark information to be browsed, and the information to be browsed is transferred to the interface to be browsed by acquiring a plurality of information to be browsed marked by the user.
Specifically, fig. 3 shows a flowchart of security policy marking guidance in the method provided by the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the directing a user to mark a plurality of pieces of information to be browsed according to the information security policy specifically includes the following steps:
and S1021, constructing an interface to be browsed according to the information security policy.
Step S1022, generating and displaying operation guidance information according to the information security policy.
And step S1023, guiding the user to mark a plurality of information to be browsed according to the operation guiding information.
Step S1024, transferring the information to be browsed to an interface to be browsed.
Further, the information safety prompting method further comprises the following steps:
step S103, according to the information security policy, pre-browsing identification is carried out on the information to be browsed, and a plurality of security abnormal positions and corresponding security abnormal features are marked.
In the embodiment of the invention, a plurality of abnormal feature tags related to the safety setting of a user are obtained according to an information safety strategy, and then according to the plurality of abnormal feature tags, the safety abnormal content related to a plurality of information to be browsed is subjected to pre-browsing identification through a plurality of corresponding safety programs in the information safety strategy to generate an abnormal identification result, and then according to the abnormal identification result, a plurality of safety abnormal positions and corresponding safety abnormal features are marked.
It can be understood that the pre-browsing identification is synchronously performed in the process of marking the information to be browsed by the user, and the information to be browsed can be quickly pre-browsed and identified by means of the technical characteristics of high speed and low time delay of the 5G network before the user formally opens the information to be browsed for information browsing, so that the marking of the safety abnormal position and the corresponding safety abnormal characteristic is realized.
Specifically, fig. 4 shows a flowchart of the pre-browsing identification process in the method provided by the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the pre-browsing and identifying the plurality of pieces of information to be browsed according to the information security policy, and marking a plurality of security exception positions and corresponding security exception features specifically include the following steps:
and step S1031, obtaining a plurality of abnormal feature tags according to the information security policy.
Step S1032 is to perform pre-browsing identification on the multiple pieces of information to be browsed according to the multiple abnormal feature tags, and generate an abnormal identification result.
Step S1033, marking a plurality of security exception locations and corresponding security exception characteristics according to the exception identification result.
Further, the information safety prompting method further comprises the following steps:
and step S104, according to the information security policy, carrying out statistical prompt on security abnormal features corresponding to a plurality of information to be browsed, and carrying out marking prompt on security abnormal positions.
In the embodiment of the invention, according to an information security policy, a marking style for carrying out abnormal marking is determined, a security prompt window is created, when a user opens information to be browsed and carries out formal browsing on the information to be browsed, corresponding abnormal statistical data is generated by counting the security abnormal features in the information to be browsed, when the information to be browsed is opened, the security prompt window is popped up, the abnormal statistical data is displayed to prompt the user that the information to be browsed has abnormality, and according to the marking style, the position with security abnormal content in the information to be browsed is marked and prompted, so that the user can accurately know the position of the security abnormal content when browsing or using the information, and the user is prevented from mistakenly touching the abnormal content in the information.
Specifically, fig. 5 shows a flowchart of a statistical hint flag hint in the method provided by the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the performing statistical prompt on the security exception features corresponding to multiple pieces of information to be browsed according to the information security policy, and the performing mark prompt on the security exception location specifically includes the following steps:
and S1041, determining a marking style according to the information security policy, and creating a security prompt window.
Step S1042, counting security abnormal features corresponding to the multiple pieces of information to be browsed, and generating multiple pieces of abnormal statistical data.
Step S1043, performing a statistical prompt on the plurality of abnormal statistical data in the security prompt window.
And step S1044, marking and prompting the safety abnormal position according to the marking pattern.
Further, the information safety prompting method further comprises the following steps:
step S105, receiving the abnormal processing operation of the user, and performing abnormal processing on the corresponding safety abnormal features at a plurality of safety abnormal positions.
In the embodiment of the invention, after the information to be browsed is opened, a window for exception handling operation is displayed on the upper part of the information to be browsed, a user can select a corresponding exception handling mode in the window, and generate a corresponding exception handling instruction according to the exception handling operation by receiving the exception handling operation of the user, so that corresponding security exception features are exception-handled at a plurality of security exception positions according to the exception handling instruction. For example: and hiding the advertisement content in the information to be browsed.
Specifically, fig. 6 shows a flowchart of exception handling of the exception feature in the method according to the embodiment of the present invention.
In a preferred embodiment of the present invention, the receiving an exception handling operation of a user, and performing exception handling on corresponding security exception features at a plurality of security exception locations specifically includes the following steps:
in step S1051, an exception handling operation by the user is received.
Step S1052, generating a corresponding exception handling instruction according to the exception handling operation.
And step S1053, according to the exception handling instruction, carrying out exception handling on the corresponding safety exception features at a plurality of safety exception positions.
Further, fig. 7 is a diagram illustrating an application architecture of the system according to the embodiment of the present invention.
In another preferred embodiment, an information security prompt system includes:
the security policy generating unit 101 is configured to receive security setting information for information security of a user, and generate an information security policy according to the security setting information.
In this embodiment of the present invention, the security policy generating unit 101 generates and displays a prompt setting interface, so that a user can perform related setting operations in the prompt setting interface, receive a plurality of security settings of the user, arrange the plurality of security settings, generate security setting information, perform matching of security programs according to the security setting information, and generate an information security policy.
Specifically, fig. 8 shows a block diagram of a structure of the security policy generating unit 101 in the system according to the embodiment of the present invention.
In an embodiment of the present invention, the security policy generating unit 101 specifically includes:
and an interface generating module 1011, configured to generate and display a prompt setting interface.
A setting receiving module 1012, configured to receive, in the prompt setting interface, a plurality of security settings of the user.
And a setting sorting module 1013 configured to sort the plurality of security settings to generate security setting information.
And the policy analysis module 1014 is configured to perform policy analysis on the security setting information to generate an information security policy.
Further, the information security prompt system further includes:
and an information mark directing unit 102, configured to direct a user to mark multiple pieces of information to be browsed according to the information security policy.
In the embodiment of the present invention, the information mark guidance unit 102 constructs an individual interface to be browsed according to an information security policy, generates operation guidance information of an information mark according to the information security policy, displays the operation guidance information on a side of the interface to be browsed, guides a user to mark information to be browsed, and transfers a plurality of pieces of information to be browsed to the interface to be browsed by obtaining a plurality of pieces of information to be browsed marked by the user.
Specifically, fig. 9 shows a block diagram of a structure of the information tag directing unit 102 in the system according to the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the information mark directing unit 102 specifically includes:
and the interface construction module 1021 is used for constructing an interface to be browsed according to the information security policy.
The information generating module 1022 is configured to generate and display the operation guidance information according to the information security policy.
And the mark directing module 1023 is used for directing the user to mark a plurality of information to be browsed according to the operation directing information.
The information transferring module 1024 is configured to transfer the information to be browsed to an interface to be browsed.
Further, the information security prompt system further includes:
and the pre-browsing identification unit 103 is configured to perform pre-browsing identification on the multiple pieces of information to be browsed according to the information security policy, and mark multiple security exception positions and corresponding security exception features.
In the embodiment of the present invention, the pre-browsing identification unit 103 obtains a plurality of abnormal feature tags related to the security setting of the user according to the information security policy, and further performs pre-browsing identification on the security abnormal content related to the plurality of information to be browsed through a plurality of corresponding security programs in the information security policy according to the plurality of abnormal feature tags, so as to generate an abnormal identification result, and further marks a plurality of security abnormal positions and corresponding security abnormal features according to the abnormal identification result.
Specifically, fig. 10 shows a block diagram of a structure of the pre-browsing identification unit 103 in the system according to the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the pre-browsing identification unit 103 specifically includes:
a tag obtaining module 1031, configured to obtain a plurality of abnormal feature tags according to the information security policy.
And a pre-browsing identification module 1032, configured to perform pre-browsing identification on the multiple pieces of information to be browsed according to the multiple abnormal feature tags, so as to generate an abnormal identification result.
An exception marking module 1033 configured to mark a plurality of security exception locations and corresponding security exception characteristics according to the exception identification result.
Further, the information security prompt system further comprises:
and the information exception prompting unit 104 is configured to perform statistical prompting on security exception features corresponding to a plurality of pieces of information to be browsed according to the information security policy, and perform marking prompting on security exception positions.
In the embodiment of the present invention, the information anomaly prompting unit 104 determines a marking pattern for performing anomaly marking according to an information security policy, and creates a security prompting window, when a user opens information to be browsed, and when the information to be browsed is formally browsed, generates corresponding anomaly statistical data by counting security anomaly features in the information to be browsed, and when the information to be browsed is opened, pops up the security prompting window, displays the anomaly statistical data to prompt the user that there is an anomaly in the information to be browsed, and performs marking prompting on a position having security anomaly content in the information to be browsed according to the marking pattern, so that the user can accurately know the position of the security anomaly content when browsing or using the information, and prevent the user from mistakenly touching the anomaly content in the information.
And an information exception handling unit 105, configured to receive an exception handling operation of a user, and perform exception handling on corresponding security exception features at a plurality of security exception positions.
In the embodiment of the present invention, after the information to be browsed is opened, a window for performing exception handling operation is displayed on the upper portion of the information to be browsed, a user may select a corresponding exception handling manner in the window, the information exception handling unit 105 generates a corresponding exception handling instruction according to the exception handling operation by receiving the exception handling operation of the user, and further performs exception handling on corresponding security exception features at a plurality of security exception positions according to the exception handling instruction.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternatingly with other steps or at least a portion of sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by a computer program, which may be stored in a non-volatile computer readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent should be subject to the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. An information security prompt method is characterized by specifically comprising the following steps:
receiving security setting information of a user for information security, and generating an information security policy according to the security setting information;
guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
according to the information security strategy, pre-browsing and identifying the information to be browsed, and marking a plurality of security abnormal positions and corresponding security abnormal features;
according to the information security strategy, carrying out statistical prompt on security exception features corresponding to a plurality of information to be browsed, and carrying out marking prompt on security exception positions;
and receiving the exception handling operation of the user, and performing exception handling on the corresponding security exception features at the plurality of security exception positions.
2. The information security prompting method according to claim 1, wherein the receiving of security setting information of a user for information security, and the generating of an information security policy according to the security setting information specifically comprises the steps of:
generating and displaying a prompt setting interface;
receiving a plurality of safety settings of a user on the prompt setting interface;
arranging the plurality of security settings to generate security setting information;
and carrying out policy analysis on the security setting information to generate an information security policy.
3. The information security prompt method according to claim 1, wherein the step of directing the user to mark a plurality of pieces of information to be browsed according to the information security policy specifically comprises the steps of:
constructing an interface to be browsed according to the information security policy;
generating and displaying operation guide information according to the information security policy;
guiding a user to mark a plurality of information to be browsed according to the operation guiding information;
and transferring the information to be browsed to an interface to be browsed.
4. The information security prompt method according to claim 1, wherein the pre-browsing identification of the plurality of information to be browsed and marking of the plurality of security exception positions and the corresponding security exception features according to the information security policy specifically comprises the following steps:
acquiring a plurality of abnormal feature tags according to the information security policy;
according to the plurality of abnormal feature tags, pre-browsing identification is carried out on the plurality of information to be browsed, and an abnormal identification result is generated;
and marking a plurality of safety exception positions and corresponding safety exception features according to the exception identification result.
5. The information security prompting method according to claim 1, wherein the statistical prompting is performed on security abnormal features corresponding to a plurality of information to be browsed according to the information security policy, and the marking and prompting of security abnormal positions specifically comprises the following steps:
determining a marking style according to the information security policy, and creating a security prompt window;
counting the safety abnormal features corresponding to the information to be browsed to generate a plurality of abnormal statistical data;
in the safety prompt window, carrying out statistical prompt on a plurality of abnormal statistical data;
and marking and prompting the safety abnormal position according to the marking pattern.
6. The information security prompt method according to claim 1, wherein the receiving of the exception handling operation of the user and the exception handling of the corresponding security exception feature at the plurality of security exception locations specifically comprises the steps of:
receiving exception handling operation of a user;
generating a corresponding exception handling instruction according to the exception handling operation;
and according to the exception handling instruction, carrying out exception handling on the corresponding security exception features at a plurality of security exception positions.
7. An information security prompt system is characterized by comprising a security policy generation unit, an information mark guidance unit, a pre-browsing identification unit, an information exception prompt unit and an information exception processing unit, wherein:
the security policy generation unit is used for receiving security setting information of a user aiming at information security and generating an information security policy according to the security setting information;
the information mark guiding unit is used for guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
the pre-browsing identification unit is used for performing pre-browsing identification on the information to be browsed according to the information security policy and marking a plurality of security abnormal positions and corresponding security abnormal features;
the information abnormity prompting unit is used for carrying out statistic prompting on safety abnormity characteristics corresponding to a plurality of information to be browsed according to the information safety strategy and carrying out marking prompting on safety abnormity positions;
and the information exception handling unit is used for receiving exception handling operation of a user and carrying out exception handling on corresponding safety exception features at a plurality of safety exception positions.
8. The information security prompt system according to claim 7, wherein the security policy generation unit specifically includes:
the interface generating module is used for generating and displaying a prompt setting interface;
the setting receiving module is used for receiving a plurality of safety settings of a user on the prompt setting interface;
the setting arrangement module is used for arranging the plurality of safety settings to generate safety setting information;
and the policy analysis module is used for performing policy analysis on the security setting information to generate an information security policy.
9. The information security prompt system according to claim 7, wherein the information marking guidance unit specifically comprises:
the interface construction module is used for constructing an interface to be browsed according to the information security strategy;
the information generating module is used for generating and displaying operation guide information according to the information security policy;
the mark guiding module is used for guiding a user to mark a plurality of pieces of information to be browsed according to the operation guiding information;
and the information transfer module is used for transferring the information to be browsed to an interface to be browsed.
10. The information security prompt system according to claim 7, wherein the pre-browsing identification unit specifically includes:
the label obtaining module is used for obtaining a plurality of abnormal characteristic labels according to the information security strategy;
the pre-browsing identification module is used for performing pre-browsing identification on the information to be browsed according to the abnormal feature tags to generate an abnormal identification result;
and the abnormity marking module is used for marking a plurality of safety abnormity positions and corresponding safety abnormity characteristics according to the abnormity identification result.
CN202211679407.2A 2022-12-27 2022-12-27 Information security prompting method and system Active CN115664864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211679407.2A CN115664864B (en) 2022-12-27 2022-12-27 Information security prompting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211679407.2A CN115664864B (en) 2022-12-27 2022-12-27 Information security prompting method and system

Publications (2)

Publication Number Publication Date
CN115664864A true CN115664864A (en) 2023-01-31
CN115664864B CN115664864B (en) 2023-03-21

Family

ID=85023218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211679407.2A Active CN115664864B (en) 2022-12-27 2022-12-27 Information security prompting method and system

Country Status (1)

Country Link
CN (1) CN115664864B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116707874A (en) * 2023-05-25 2023-09-05 杭州金诚信息安全科技有限公司 Comprehensive analysis and monitoring system and method for information security on network

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693384A (en) * 2012-05-22 2012-09-26 清华大学 Method and apparatus for safe self adjustment of browsers
CN103634317A (en) * 2013-11-28 2014-03-12 北京奇虎科技有限公司 Method and system of performing safety appraisal on malicious web site information on basis of cloud safety
US20160323309A1 (en) * 2015-04-30 2016-11-03 Yahoo! Inc. Method and system for blocking malicious third party site tagging
CN107862208A (en) * 2017-06-27 2018-03-30 陆金所(上海)科技服务有限公司 Sensitive information processing method, device and computer-readable recording medium
CN110837640A (en) * 2019-11-08 2020-02-25 深信服科技股份有限公司 Malicious file searching and killing method, device, storage medium and device
US10642980B1 (en) * 2019-11-18 2020-05-05 Clean.io, Inc. Detecting cross-origin malicious code existing in internet advertisements
US20200382545A1 (en) * 2019-05-31 2020-12-03 Microsoft Technology Licensing, Llc Mitigating security risks associated with unsecured websites and networks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693384A (en) * 2012-05-22 2012-09-26 清华大学 Method and apparatus for safe self adjustment of browsers
CN103634317A (en) * 2013-11-28 2014-03-12 北京奇虎科技有限公司 Method and system of performing safety appraisal on malicious web site information on basis of cloud safety
US20160323309A1 (en) * 2015-04-30 2016-11-03 Yahoo! Inc. Method and system for blocking malicious third party site tagging
CN107862208A (en) * 2017-06-27 2018-03-30 陆金所(上海)科技服务有限公司 Sensitive information processing method, device and computer-readable recording medium
US20200382545A1 (en) * 2019-05-31 2020-12-03 Microsoft Technology Licensing, Llc Mitigating security risks associated with unsecured websites and networks
CN110837640A (en) * 2019-11-08 2020-02-25 深信服科技股份有限公司 Malicious file searching and killing method, device, storage medium and device
US10642980B1 (en) * 2019-11-18 2020-05-05 Clean.io, Inc. Detecting cross-origin malicious code existing in internet advertisements

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116707874A (en) * 2023-05-25 2023-09-05 杭州金诚信息安全科技有限公司 Comprehensive analysis and monitoring system and method for information security on network
CN116707874B (en) * 2023-05-25 2023-12-15 杭州金诚信息安全科技有限公司 Comprehensive analysis and monitoring system and method for information security on network

Also Published As

Publication number Publication date
CN115664864B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
JP6138896B2 (en) Method, apparatus and terminal for detecting maliciously vulnerable files
US8078556B2 (en) Generating complex event processing rules utilizing machine learning from multiple events
CN107070852B (en) Network attack detection method and device
US11048798B2 (en) Method for detecting libraries in program binaries
US11030312B2 (en) System and method for machine based detection of a malicious executable file
CN110866258B (en) Rapid vulnerability positioning method, electronic device and storage medium
WO2019169760A1 (en) Test case range determining method, device, and storage medium
CN115664864B (en) Information security prompting method and system
CN109766483B (en) Regular expression generation method, device, computer equipment and storage medium
CN110674479B (en) Abnormal behavior data real-time processing method, device, equipment and storage medium
CN113486350A (en) Malicious software identification method, device, equipment and storage medium
CN106874758B (en) Method and device for identifying document code
CN112748928A (en) Rich text data processing method and device, computer equipment and storage medium
CN110490079B (en) Patrol data processing method and device, computer equipment and storage medium
CN111159167A (en) Labeling quality detection device and method
CN111625835B (en) Program vulnerability path tracking method, device, computer equipment and storage medium
CN110520860B (en) Method for protecting software code
WO2019134771A1 (en) Binary image stack cookie protection
US11232202B2 (en) System and method for identifying activity in a computer system
US12001551B2 (en) Warning apparatus, control method, and program
CN109902488A (en) APP tampering detection processing method, iOS device and storage medium
CN109886119B (en) Industrial control signal-based control function classification method and system
CN112631873B (en) Log monitoring method, device, computer equipment and storage medium
CN108052405A (en) Method and device for checking spatial data
Suresh Kumar et al. Building an efficient feature selection for intrusion detection system on UNSW-NB15

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant