CN115664864B - Information security prompting method and system - Google Patents

Information security prompting method and system Download PDF

Info

Publication number
CN115664864B
CN115664864B CN202211679407.2A CN202211679407A CN115664864B CN 115664864 B CN115664864 B CN 115664864B CN 202211679407 A CN202211679407 A CN 202211679407A CN 115664864 B CN115664864 B CN 115664864B
Authority
CN
China
Prior art keywords
information
security
browsed
abnormal
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211679407.2A
Other languages
Chinese (zh)
Other versions
CN115664864A (en
Inventor
张晓东
周书平
关勇
孔令武
张向华
黄建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Luoan Technology Co Ltd
Original Assignee
Beijing Luoan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Luoan Technology Co Ltd filed Critical Beijing Luoan Technology Co Ltd
Priority to CN202211679407.2A priority Critical patent/CN115664864B/en
Publication of CN115664864A publication Critical patent/CN115664864A/en
Application granted granted Critical
Publication of CN115664864B publication Critical patent/CN115664864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information security, and particularly discloses an information security prompting method and system. The invention generates an information security policy by receiving security setting information of a user aiming at information security; guiding a user to mark a plurality of information to be browsed; pre-browsing and identifying a plurality of information to be browsed, and marking a plurality of safety abnormal positions and corresponding safety abnormal features; carrying out statistic prompt on the safety abnormal features, and carrying out marking prompt on the safety abnormal positions; and receiving the exception handling operation of the user, and carrying out exception handling on the security exception characteristic. The information security strategy matched with the user setting can be generated, pre-browsing identification is carried out on the information to be browsed, the safety abnormal position and the safety abnormal characteristic are marked, in the information browsing process of the user, the statistic prompt of the abnormal characteristic and the mark prompt of the abnormal position are carried out, the user is prevented from mistakenly touching the abnormal content in the information, and therefore the user can conveniently and safely use the complicated information in the internet.

Description

Information security prompting method and system
Technical Field
The invention belongs to the technical field of information security, and particularly relates to an information security prompting method and system.
Background
Information security is the technical and administrative security protection established and adopted by data processing systems in order to protect computer hardware, software and user data from being damaged, altered and revealed due to accidental and malicious reasons. And website security detection, which is also called website security assessment, website vulnerability testing, web security detection and the like. The method comprises the steps of scanning the website for vulnerabilities by a technical means, detecting whether the webpage has vulnerabilities, whether the webpage is hung with horses, whether the webpage is tampered or not, whether a cheating website exists or not and the like, reminding a website administrator of repairing and reinforcing in time, and guaranteeing the safe operation of the Web website.
With the rapid development of internet technology in recent years, internet technology has existed in the aspects of people's life, so that people can acquire various information more quickly and more conveniently through the internet. However, due to the characteristics of internet technology, some security anomalies may be carried in the information acquired by people, such as: the method comprises the following steps of advertising, malicious monitoring, malicious guidance, information leakage and the like, and because the information in the internet is various, the safety detection of each issued information is difficult to realize, so that the information acquired by a user has abnormal contents which are difficult to detect, and the normal use of the information by the user is influenced.
Disclosure of Invention
The embodiment of the invention aims to provide an information safety prompting method and system, and aims to solve the problems in the background technology.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
an information security prompting method specifically comprises the following steps:
receiving security setting information of a user aiming at information security, and generating an information security strategy according to the security setting information;
guiding a user to mark a plurality of information to be browsed according to the information security policy;
according to the information security strategy, pre-browsing and identifying the information to be browsed, and marking a plurality of security abnormal positions and corresponding security abnormal features;
according to the information security strategy, carrying out statistical prompt on security abnormal features corresponding to a plurality of information to be browsed, and carrying out marking prompt on security abnormal positions;
and receiving the exception handling operation of the user, and performing exception handling on the corresponding security exception features at the plurality of security exception positions.
As a further limitation of the technical solution of the embodiment of the present invention, the receiving security setting information of a user for information security, and generating an information security policy according to the security setting information specifically includes the following steps:
generating and displaying a prompt setting interface;
receiving a plurality of safety settings of a user on the prompt setting interface;
arranging the plurality of security settings to generate security setting information;
and carrying out policy analysis on the security setting information to generate an information security policy.
As a further limitation of the technical solution of the embodiment of the present invention, the directing a user to mark a plurality of pieces of information to be browsed according to the information security policy specifically includes the following steps:
constructing an interface to be browsed according to the information security policy;
generating and displaying operation guide information according to the information security policy;
guiding a user to mark a plurality of information to be browsed according to the operation guiding information;
and transferring the information to be browsed to an interface to be browsed.
As a further limitation of the technical solution of the embodiment of the present invention, the pre-browsing identification of the plurality of pieces of information to be browsed according to the information security policy, and the marking of the plurality of security exception positions and the corresponding security exception features specifically include the following steps:
acquiring a plurality of abnormal feature tags according to the information security policy;
according to the plurality of abnormal feature tags, pre-browsing identification is carried out on the plurality of information to be browsed, and an abnormal identification result is generated;
and marking a plurality of safety exception positions and corresponding safety exception features according to the exception identification result.
As a further limitation of the technical solution of the embodiment of the present invention, the statistical prompt of the security exception features corresponding to a plurality of pieces of information to be browsed according to the information security policy specifically includes the following steps:
determining a marking style according to the information security policy, and creating a security prompt window;
counting the safety abnormal features corresponding to the information to be browsed to generate a plurality of abnormal statistical data;
in the safety prompt window, carrying out statistical prompt on a plurality of abnormal statistical data;
and marking and prompting the safety abnormal position according to the marking pattern.
As a further limitation of the technical solution of the embodiment of the present invention, the receiving an exception handling operation of a user, and performing exception handling on a corresponding security exception feature at a plurality of security exception locations specifically includes the following steps:
receiving exception handling operation of a user;
generating a corresponding exception handling instruction according to the exception handling operation;
and according to the exception handling instruction, carrying out exception handling on the corresponding security exception features at a plurality of security exception positions.
An information security prompt system comprises a security policy generation unit, an information mark guidance unit, a pre-browsing identification unit, an information exception prompt unit and an information exception processing unit, wherein:
the security policy generation unit is used for receiving security setting information of a user aiming at information security and generating an information security policy according to the security setting information;
the information mark guiding unit is used for guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
the pre-browsing identification unit is used for performing pre-browsing identification on the information to be browsed according to the information security policy and marking a plurality of security abnormal positions and corresponding security abnormal features;
the information exception prompting unit is used for carrying out statistical prompt on the security exception features corresponding to the information to be browsed according to the information security strategy and marking and prompting the security exception positions;
and the information exception handling unit is used for receiving exception handling operation of a user and carrying out exception handling on corresponding safety exception features at a plurality of safety exception positions.
As a further limitation of the technical solution of the embodiment of the present invention, the security policy generating unit specifically includes:
the interface generating module is used for generating and displaying a prompt setting interface;
the setting receiving module is used for receiving a plurality of safety settings of a user on the prompt setting interface;
the setting arrangement module is used for arranging the plurality of safety settings to generate safety setting information;
and the policy analysis module is used for performing policy analysis on the security setting information to generate an information security policy.
As a further limitation of the technical solution of the embodiment of the present invention, the information mark directing unit specifically includes:
the interface construction module is used for constructing an interface to be browsed according to the information security strategy;
the information generating module is used for generating and displaying operation guide information according to the information security policy;
the mark guiding module is used for guiding a user to mark a plurality of information to be browsed according to the operation guiding information;
and the information transfer module is used for transferring the information to be browsed to an interface to be browsed.
As a further limitation of the technical solution of the embodiment of the present invention, the pre-browsing identification unit specifically includes:
the label obtaining module is used for obtaining a plurality of abnormal characteristic labels according to the information security strategy;
the pre-browsing identification module is used for performing pre-browsing identification on the information to be browsed according to the abnormal feature tags to generate an abnormal identification result;
and the abnormity marking module is used for marking a plurality of safety abnormity positions and corresponding safety abnormity characteristics according to the abnormity identification result.
Compared with the prior art, the invention has the beneficial effects that:
the embodiment of the invention generates an information security policy by receiving security setting information of a user aiming at information security; guiding a user to mark a plurality of information to be browsed; pre-browsing and identifying a plurality of information to be browsed, and marking a plurality of safety abnormal positions and corresponding safety abnormal features; carrying out statistic prompting on the safety abnormal features and carrying out marking prompting on the safety abnormal positions; and receiving the exception handling operation of the user, and carrying out exception handling on the security exception characteristic. The information security strategy matched with the user setting can be generated, pre-browsing identification is carried out on the information to be browsed, the safety abnormal position and the safety abnormal characteristic are marked, in the information browsing process of the user, the statistic prompt of the abnormal characteristic and the mark prompt of the abnormal position are carried out, the user is prevented from mistakenly touching the abnormal content in the information, and therefore the user can conveniently and safely use the complicated information in the internet.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
FIG. 1 shows a flow chart of a method provided by an embodiment of the invention;
FIG. 2 is a flow chart illustrating the generation of an information security policy in a method provided by an embodiment of the present invention;
FIG. 3 is a flow chart illustrating security policy marking directions in a method provided by an embodiment of the invention;
FIG. 4 is a flow chart illustrating a pre-browsing identification process in the method provided by the embodiment of the invention;
FIG. 5 is a flow chart illustrating a statistical hint flag hint in a method provided by an embodiment of the present invention;
FIG. 6 is a flow diagram illustrating exception handling for exception features in a method provided by an embodiment of the present invention;
FIG. 7 illustrates an application architecture diagram of a system provided by an embodiment of the present invention;
fig. 8 shows a block diagram of a security policy generation unit in the system according to the embodiment of the present invention;
FIG. 9 is a block diagram illustrating an exemplary structure of a tag information directing unit in the system according to an embodiment of the present invention;
fig. 10 shows a block diagram of a pre-browsing identification unit in the system according to the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It can be understood that, in the prior art, due to the characteristics of internet technology, some security exception contents may be carried in the information acquired by people, for example: the method comprises the following steps of advertising, malicious monitoring, malicious guidance, information leakage and the like, and because the information in the internet is various, the safety detection of each issued information is difficult to realize, so that the information acquired by a user has abnormal contents which are difficult to detect, and the normal use of the information by the user is influenced.
In order to solve the above problem, in the embodiments of the present invention, an information security policy is generated by receiving security setting information of a user for information security; guiding a user to mark a plurality of information to be browsed; pre-browsing and identifying a plurality of information to be browsed, and marking a plurality of safety abnormal positions and corresponding safety abnormal features; carrying out statistic prompt on the safety abnormal features, and carrying out marking prompt on the safety abnormal positions; and receiving the exception handling operation of the user, and carrying out exception handling on the security exception characteristic. The information security strategy matched with the user setting can be generated, pre-browsing identification is carried out on the information to be browsed, the safety abnormal position and the safety abnormal characteristic are marked, in the information browsing process of the user, the statistic prompt of the abnormal characteristic and the mark prompt of the abnormal position are carried out, the user is prevented from mistakenly touching the abnormal content in the information, and therefore the user can conveniently and safely use the complicated information in the internet.
Fig. 1 shows a flow chart of a method provided by an embodiment of the invention.
Specifically, in a preferred embodiment provided by the present invention, an information security prompt method specifically includes the following steps:
step S101, receiving security setting information of a user aiming at information security, and generating an information security policy according to the security setting information.
In the embodiment of the invention, by generating and displaying the prompt setting interface, a user can perform related setting operation in the prompt setting interface, receive a plurality of security settings of the user, arrange the security settings to generate security setting information, and perform matching of security programs according to the security setting information to generate an information security policy.
It can be understood that, in the prompt setting interface, there are a plurality of virtual switches of security settings such as advertisement, malicious monitoring, malicious guidance, information disclosure, and the user can set up the operation by clicking the relevant virtual switch, and each security setting corresponds to the security program that has abnormal recognition, and the information security policy is obtained by integrating the security programs corresponding to a plurality of security settings.
Specifically, fig. 2 shows a flowchart of generating an information security policy in the method provided by the embodiment of the present invention.
In an embodiment of the present invention, the receiving security setting information of a user for information security, and generating an information security policy according to the security setting information specifically includes the following steps:
and step S1011, generating and displaying a prompt setting interface.
Step S1012, receiving a plurality of security settings of the user on the prompt setting interface.
Step S1013, collating the plurality of security settings to generate security setting information.
Step 1014, performing policy analysis on the security setting information, and generating an information security policy.
Further, the information security prompting method further comprises the following steps:
and step S102, guiding a user to mark a plurality of information to be browsed according to the information security policy.
In the embodiment of the invention, an independent interface to be browsed is constructed according to an information security policy, operation guide information marked by information is generated according to the information security policy, the operation guide information is displayed on the side of the interface to be browsed, a user is guided to mark information to be browsed, and the information to be browsed is transferred to the interface to be browsed by acquiring a plurality of information to be browsed marked by the user.
Specifically, fig. 3 shows a flowchart of the security policy marking direction in the method provided by the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the directing a user to mark a plurality of pieces of information to be browsed according to the information security policy specifically includes the following steps:
and S1021, constructing an interface to be browsed according to the information security policy.
Step S1022, generating and displaying operation guidance information according to the information security policy.
And step S1023, guiding the user to mark a plurality of pieces of information to be browsed according to the operation guiding information.
And step S1024, transferring the information to be browsed to an interface to be browsed.
Further, the information security prompting method further comprises the following steps:
step S103, according to the information security policy, pre-browsing identification is carried out on the information to be browsed, and a plurality of security abnormal positions and corresponding security abnormal features are marked.
In the embodiment of the invention, a plurality of abnormal feature tags related to the safety setting of a user are obtained according to an information safety strategy, and then according to the plurality of abnormal feature tags, the safety abnormal content related to a plurality of information to be browsed is subjected to pre-browsing identification through a plurality of corresponding safety programs in the information safety strategy to generate an abnormal identification result, and then according to the abnormal identification result, a plurality of safety abnormal positions and corresponding safety abnormal features are marked.
It can be understood that the pre-browsing identification is synchronously performed in the process of marking the information to be browsed by the user, and the information to be browsed can be quickly pre-browsed and identified by means of the technical characteristics of high speed and low time delay of the 5G network before the user formally opens the information to be browsed for information browsing, so that the marking of the safety abnormal position and the corresponding safety abnormal characteristic is realized.
Specifically, fig. 4 shows a flowchart of the pre-browsing identification process in the method provided by the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the pre-browsing and identifying the plurality of pieces of information to be browsed according to the information security policy, and marking a plurality of security exception positions and corresponding security exception features specifically include the following steps:
and step S1031, obtaining a plurality of abnormal feature tags according to the information security policy.
Step S1032 is to perform pre-browsing identification on the multiple pieces of information to be browsed according to the multiple abnormal feature tags, and generate an abnormal identification result.
Step S1033, according to the abnormality recognition result, marking a plurality of safety abnormality positions and corresponding safety abnormality features.
Further, the information security prompting method further comprises the following steps:
and step S104, according to the information security policy, carrying out statistical prompt on security abnormal features corresponding to a plurality of information to be browsed, and carrying out marking prompt on security abnormal positions.
In the embodiment of the invention, according to an information security strategy, a marking mode for carrying out abnormal marking is determined, a security prompt window is created, when a user opens information to be browsed and carries out formal browsing on the information to be browsed, corresponding abnormal statistical data are generated by counting the security abnormal features in the information to be browsed, when the information to be browsed is opened, the security prompt window is popped up, the abnormal statistical data are displayed to prompt the user that the information to be browsed has abnormality, and according to the marking mode, the position with security abnormal content in the information to be browsed is marked and prompted, so that the user can accurately know the position of the security abnormal content when browsing or using the information, and the user is prevented from mistakenly touching the abnormal content in the information.
Specifically, fig. 5 shows a flowchart of a statistical hint flag hint in the method provided by the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the performing a statistical prompt on security anomaly characteristics corresponding to a plurality of information to be browsed according to the information security policy, and performing a mark prompt on a security anomaly location specifically includes the following steps:
and S1041, determining a marking style according to the information security policy, and creating a security prompt window.
Step S1042, counting security abnormal features corresponding to the multiple pieces of information to be browsed, and generating multiple pieces of abnormal statistical data.
And step S1043, performing statistical prompt on the abnormal statistical data in the safety prompt window.
And S1044, marking and prompting the safety abnormal position according to the marking pattern.
Further, the information safety prompting method further comprises the following steps:
step S105, receiving the abnormal processing operation of the user, and performing abnormal processing on the corresponding safety abnormal features at a plurality of safety abnormal positions.
In the embodiment of the invention, after the information to be browsed is opened, a window for exception handling operation is displayed on the upper part of the information to be browsed, a user can select a corresponding exception handling mode in the window, and generate a corresponding exception handling instruction according to the exception handling operation by receiving the exception handling operation of the user, so that corresponding security exception features are exception-handled at a plurality of security exception positions according to the exception handling instruction. For example: and hiding the advertisement content in the information to be browsed.
Specifically, fig. 6 shows a flowchart of exception handling of the exception feature in the method according to the embodiment of the present invention.
In a preferred embodiment of the present invention, the receiving an exception handling operation of a user, and performing exception handling on corresponding security exception features at a plurality of security exception locations specifically includes the following steps:
in step S1051, an exception handling operation by the user is received.
Step S1052, generating a corresponding exception handling instruction according to the exception handling operation.
And step S1053, according to the exception handling instruction, carrying out exception handling on the corresponding safety exception features at a plurality of safety exception positions.
Further, fig. 7 is a diagram illustrating an application architecture of the system according to the embodiment of the present invention.
In another preferred embodiment, an information security prompt system includes:
the security policy generating unit 101 is configured to receive security setting information of a user for information security, and generate an information security policy according to the security setting information.
In this embodiment of the present invention, the security policy generating unit 101 generates and displays a prompt setting interface, so that a user can perform related setting operations in the prompt setting interface, receive a plurality of security settings of the user, arrange the plurality of security settings, generate security setting information, perform matching of security programs according to the security setting information, and generate an information security policy.
Specifically, fig. 8 shows a block diagram of a security policy generation unit 101 in the system according to the embodiment of the present invention.
In an embodiment of the present invention, the security policy generating unit 101 specifically includes:
the interface generating module 1011 is configured to generate and display a prompt setting interface.
A setting receiving module 1012, configured to receive, in the prompt setting interface, a plurality of security settings of the user.
And a setting sorting module 1013 configured to sort the plurality of security settings to generate security setting information.
And the policy analysis module 1014 is configured to perform policy analysis on the security setting information to generate an information security policy.
Further, the information security prompt system further includes:
and an information mark directing unit 102, configured to direct a user to mark multiple pieces of information to be browsed according to the information security policy.
In the embodiment of the present invention, the information mark guidance unit 102 constructs an individual interface to be browsed according to an information security policy, generates operation guidance information of an information mark according to the information security policy, displays the operation guidance information on a side of the interface to be browsed, guides a user to mark information to be browsed, and transfers a plurality of pieces of information to be browsed to the interface to be browsed by obtaining a plurality of pieces of information to be browsed marked by the user.
Specifically, fig. 9 shows a block diagram of a structure of the information tag directing unit 102 in the system according to the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the information mark directing unit 102 specifically includes:
and the interface construction module 1021 is used for constructing an interface to be browsed according to the information security policy.
The information generating module 1022 is configured to generate and display the operation guidance information according to the information security policy.
And the mark directing module 1023 is used for directing the user to mark a plurality of information to be browsed according to the operation directing information.
The information transferring module 1024 is configured to transfer the information to be browsed to an interface to be browsed.
Further, the information security prompt system further includes:
and a pre-browsing identification unit 103, configured to perform pre-browsing identification on the multiple pieces of information to be browsed according to the information security policy, and mark multiple security exception positions and corresponding security exception features.
In the embodiment of the present invention, the pre-browsing identification unit 103 obtains a plurality of abnormal feature tags related to the security setting of the user according to the information security policy, and further performs pre-browsing identification on the security abnormal content related to the plurality of information to be browsed through a plurality of corresponding security programs in the information security policy according to the plurality of abnormal feature tags, so as to generate an abnormal identification result, and further marks a plurality of security abnormal positions and corresponding security abnormal features according to the abnormal identification result.
Specifically, fig. 10 shows a block diagram of a structure of the pre-browsing identification unit 103 in the system according to the embodiment of the present invention.
In a preferred embodiment provided by the present invention, the pre-browsing identification unit 103 specifically includes:
a tag obtaining module 1031, configured to obtain a plurality of abnormal feature tags according to the information security policy.
And a pre-browsing identification module 1032, configured to perform pre-browsing identification on the multiple pieces of information to be browsed according to the multiple abnormal feature tags, so as to generate an abnormal identification result.
An anomaly marking module 1033 configured to mark a plurality of security anomaly locations and corresponding security anomaly characteristics according to the anomaly identification result.
Further, the information security prompt system further includes:
and the information exception prompting unit 104 is configured to perform statistical prompting on security exception features corresponding to a plurality of pieces of information to be browsed according to the information security policy, and perform marking prompting on security exception positions.
In the embodiment of the present invention, the information anomaly prompting unit 104 determines a marking style for performing anomaly marking according to an information security policy, and creates a security prompting window, when a user opens information to be browsed, and when the information to be browsed is formally browsed, generates corresponding anomaly statistical data by counting security anomaly characteristics in the information to be browsed, and when the information to be browsed is opened, pops up the security prompting window to display the anomaly statistical data to prompt the user that there is an anomaly in the information to be browsed, and marks and prompts a position having security anomaly content in the information to be browsed according to the marking style, so that the user can accurately know the position of the security anomaly content when browsing or using the information, and prevent the user from mistakenly touching the anomaly content in the information.
And an information exception handling unit 105, configured to receive an exception handling operation of a user, and perform exception handling on corresponding security exception features at a plurality of security exception positions.
In the embodiment of the present invention, after the information to be browsed is opened, a window for performing exception handling operation is displayed on the upper portion of the information to be browsed, a user may select a corresponding exception handling manner in the window, the information exception handling unit 105 generates a corresponding exception handling instruction according to the exception handling operation by receiving the exception handling operation of the user, and further performs exception handling on corresponding security exception features at a plurality of security exception positions according to the exception handling instruction.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
The above description is intended to be illustrative of the preferred embodiment of the present invention and should not be taken as limiting the invention, but rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (10)

1. An information security prompt method is characterized by specifically comprising the following steps:
receiving security setting information of a user aiming at information security, and generating an information security strategy according to the security setting information;
guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
according to the information security strategy, pre-browsing identification is carried out on the information to be browsed, and a plurality of security abnormal positions and corresponding security abnormal features are marked;
according to the information security strategy, carrying out statistical prompt on security abnormal features corresponding to a plurality of information to be browsed, and carrying out marking prompt on security abnormal positions;
and receiving the exception handling operation of the user, and performing exception handling on the corresponding safety exception features at a plurality of safety exception positions.
2. The information security prompting method according to claim 1, wherein the receiving of security setting information of a user for information security, and the generating of an information security policy according to the security setting information specifically comprises the steps of:
generating and displaying a prompt setting interface;
receiving a plurality of safety settings of a user on the prompt setting interface;
arranging the plurality of security settings to generate security setting information;
and carrying out policy analysis on the security setting information to generate an information security policy.
3. The information security prompt method according to claim 1, wherein the step of directing the user to mark a plurality of pieces of information to be browsed according to the information security policy specifically comprises the steps of:
constructing an interface to be browsed according to the information security policy;
generating and displaying operation guide information according to the information security policy;
guiding a user to mark a plurality of pieces of information to be browsed according to the operation guiding information;
and transferring the information to be browsed to an interface to be browsed.
4. The information security prompt method according to claim 1, wherein the pre-browsing identification of the plurality of information to be browsed and marking of the plurality of security exception positions and the corresponding security exception features according to the information security policy specifically comprises the following steps:
acquiring a plurality of abnormal feature tags according to the information security policy;
according to the plurality of abnormal feature tags, pre-browsing identification is carried out on the plurality of information to be browsed, and an abnormal identification result is generated;
and marking a plurality of safety exception positions and corresponding safety exception features according to the exception identification result.
5. The information security prompting method according to claim 1, wherein the statistical prompting is performed on security abnormal features corresponding to a plurality of information to be browsed according to the information security policy, and the marking and prompting of security abnormal positions specifically comprises the following steps:
determining a marking style according to the information security policy, and creating a security prompt window;
counting the safety abnormal features corresponding to the information to be browsed to generate a plurality of abnormal statistical data;
in the safety prompt window, carrying out statistical prompt on a plurality of abnormal statistical data;
and marking and prompting the safety abnormal position according to the marking pattern.
6. The information security prompt method according to claim 1, wherein the receiving of the exception handling operation of the user, in the plurality of security exception positions, performing exception handling on the corresponding security exception features specifically includes the following steps:
receiving exception handling operation of a user;
generating a corresponding exception handling instruction according to the exception handling operation;
and according to the exception handling instruction, carrying out exception handling on the corresponding safety exception features at a plurality of safety exception positions.
7. An information security prompt system is characterized by comprising a security policy generation unit, an information mark guidance unit, a pre-browsing identification unit, an information exception prompt unit and an information exception processing unit, wherein:
the security policy generation unit is used for receiving security setting information of a user aiming at information security and generating an information security policy according to the security setting information;
the information mark guiding unit is used for guiding a user to mark a plurality of pieces of information to be browsed according to the information security policy;
the pre-browsing identification unit is used for performing pre-browsing identification on the information to be browsed according to the information security policy and marking a plurality of security abnormal positions and corresponding security abnormal features;
the information abnormity prompting unit is used for carrying out statistic prompting on safety abnormity characteristics corresponding to a plurality of information to be browsed according to the information safety strategy and carrying out marking prompting on safety abnormity positions;
and the information exception handling unit is used for receiving exception handling operation of a user and carrying out exception handling on corresponding safety exception features at a plurality of safety exception positions.
8. The information security prompt system according to claim 7, wherein the security policy generation unit specifically includes:
the interface generating module is used for generating and displaying a prompt setting interface;
the setting receiving module is used for receiving a plurality of safety settings of a user on the prompt setting interface;
the setting arrangement module is used for arranging the plurality of safety settings to generate safety setting information;
and the policy analysis module is used for performing policy analysis on the security setting information to generate an information security policy.
9. The information security prompt system according to claim 7, wherein the information marking guidance unit specifically comprises:
the interface construction module is used for constructing an interface to be browsed according to the information security strategy;
the information generating module is used for generating and displaying operation guide information according to the information security policy;
the mark guiding module is used for guiding a user to mark a plurality of information to be browsed according to the operation guiding information;
and the information transfer module is used for transferring the information to be browsed to an interface to be browsed.
10. The information security prompt system according to claim 7, wherein the pre-browsing identification unit specifically includes:
the label obtaining module is used for obtaining a plurality of abnormal characteristic labels according to the information security strategy;
the pre-browsing identification module is used for performing pre-browsing identification on the information to be browsed according to the abnormal feature tags to generate an abnormal identification result;
and the abnormity marking module is used for marking a plurality of safety abnormity positions and corresponding safety abnormity characteristics according to the abnormity identification result.
CN202211679407.2A 2022-12-27 2022-12-27 Information security prompting method and system Active CN115664864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211679407.2A CN115664864B (en) 2022-12-27 2022-12-27 Information security prompting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211679407.2A CN115664864B (en) 2022-12-27 2022-12-27 Information security prompting method and system

Publications (2)

Publication Number Publication Date
CN115664864A CN115664864A (en) 2023-01-31
CN115664864B true CN115664864B (en) 2023-03-21

Family

ID=85023218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211679407.2A Active CN115664864B (en) 2022-12-27 2022-12-27 Information security prompting method and system

Country Status (1)

Country Link
CN (1) CN115664864B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116707874B (en) * 2023-05-25 2023-12-15 杭州金诚信息安全科技有限公司 Comprehensive analysis and monitoring system and method for information security on network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693384A (en) * 2012-05-22 2012-09-26 清华大学 Method and apparatus for safe self adjustment of browsers
CN103634317A (en) * 2013-11-28 2014-03-12 北京奇虎科技有限公司 Method and system of performing safety appraisal on malicious web site information on basis of cloud safety
CN107862208A (en) * 2017-06-27 2018-03-30 陆金所(上海)科技服务有限公司 Sensitive information processing method, device and computer-readable recording medium
CN110837640A (en) * 2019-11-08 2020-02-25 深信服科技股份有限公司 Malicious file searching and killing method, device, storage medium and device
US10642980B1 (en) * 2019-11-18 2020-05-05 Clean.io, Inc. Detecting cross-origin malicious code existing in internet advertisements

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10432662B2 (en) * 2015-04-30 2019-10-01 Oath, Inc. Method and system for blocking malicious third party site tagging
US11637850B2 (en) * 2019-05-31 2023-04-25 Microsoft Technology Licensing, Llc Mitigating security risks associated with unsecured websites and networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693384A (en) * 2012-05-22 2012-09-26 清华大学 Method and apparatus for safe self adjustment of browsers
CN103634317A (en) * 2013-11-28 2014-03-12 北京奇虎科技有限公司 Method and system of performing safety appraisal on malicious web site information on basis of cloud safety
CN107862208A (en) * 2017-06-27 2018-03-30 陆金所(上海)科技服务有限公司 Sensitive information processing method, device and computer-readable recording medium
CN110837640A (en) * 2019-11-08 2020-02-25 深信服科技股份有限公司 Malicious file searching and killing method, device, storage medium and device
US10642980B1 (en) * 2019-11-18 2020-05-05 Clean.io, Inc. Detecting cross-origin malicious code existing in internet advertisements

Also Published As

Publication number Publication date
CN115664864A (en) 2023-01-31

Similar Documents

Publication Publication Date Title
JP6138896B2 (en) Method, apparatus and terminal for detecting maliciously vulnerable files
CN107888554B (en) Method and device for detecting server attack
US8997218B2 (en) Detecting a return-oriented programming exploit
CN107070852B (en) Network attack detection method and device
CN107918733A (en) The system and method for detecting the malicious element of webpage
CN115664864B (en) Information security prompting method and system
CN110866258B (en) Rapid vulnerability positioning method, electronic device and storage medium
US11030312B2 (en) System and method for machine based detection of a malicious executable file
WO2019169760A1 (en) Test case range determining method, device, and storage medium
CN109766483B (en) Regular expression generation method, device, computer equipment and storage medium
CN110674479B (en) Abnormal behavior data real-time processing method, device, equipment and storage medium
CN110955590A (en) Interface detection method, image processing method, device, electronic equipment and storage medium
CN113486350A (en) Malicious software identification method, device, equipment and storage medium
CN105354494A (en) Detection method and apparatus for web page data tampering
CN106874758B (en) Method and device for identifying document code
CN111737692A (en) Application program risk detection method and device, equipment and storage medium
CN110490079B (en) Patrol data processing method and device, computer equipment and storage medium
CN116346397A (en) Network request abnormality detection method and device, equipment, medium and product thereof
CN111159167A (en) Labeling quality detection device and method
CN111625835B (en) Program vulnerability path tracking method, device, computer equipment and storage medium
CN110520860B (en) Method for protecting software code
US11615338B2 (en) System and method for generating a file execution record of address tuples
US12001551B2 (en) Warning apparatus, control method, and program
CN109902488A (en) APP tampering detection processing method, iOS device and storage medium
CN112631873B (en) Log monitoring method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant