WO2017016449A1 - 防泄密的处理方法及装置 - Google Patents

防泄密的处理方法及装置 Download PDF

Info

Publication number
WO2017016449A1
WO2017016449A1 PCT/CN2016/091044 CN2016091044W WO2017016449A1 WO 2017016449 A1 WO2017016449 A1 WO 2017016449A1 CN 2016091044 W CN2016091044 W CN 2016091044W WO 2017016449 A1 WO2017016449 A1 WO 2017016449A1
Authority
WO
WIPO (PCT)
Prior art keywords
audio
code stream
terminal
video code
keyword
Prior art date
Application number
PCT/CN2016/091044
Other languages
English (en)
French (fr)
Inventor
谭嘉玉
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017016449A1 publication Critical patent/WO2017016449A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping

Definitions

  • This document relates to, but is not limited to, the field of communications, and more particularly to a method and apparatus for preventing leaks.
  • audio and video communication can only prevent other people from obtaining media information through audio and video encryption, and cannot prevent the leakage of participants during the communication process.
  • the embodiment of the invention provides a method and a device for preventing leaks, which can improve the security of audio and video communication by users.
  • An embodiment of the present invention provides a method for preventing leak prevention, comprising: acquiring an audio and video code stream sent by a terminal; and extracting a sound or an image of the audio and video code stream and matching with a preset keyword, the preset keyword Corresponding to the preset secret content; processing the audio/video code stream or the communication of the terminal according to the matching situation.
  • extracting the sound or the image of the audio and video code stream to match the preset keyword including: identifying the sound of the audio and video code stream or the text content associated with the image; and the text content and the pre- Set keywords to match.
  • the processing the audio/video code stream or the communication of the terminal according to the matching situation comprises: matching, in the sound or the image, a first type of keyword of the preset keyword And cutting off the audio and video code stream; if the sound or the image matches the second type of keyword of the preset keyword, cutting off the audio and video code stream, and interrupting the The communication of the terminal; wherein the confidentiality content of the confidential content corresponding to the first type of keywords and the second type of keywords is different.
  • processing the audio/video code stream or the communication of the terminal according to the matching situation further includes: matching, in the sound or the image, the first type of keyword of the preset keyword
  • an advisory command is sent to the terminal, where the query command includes: the first type of keyword, the consulting command is used to indicate whether the terminal continues to send the audio and video code.
  • Receiving a feedback reply corresponding to the consulting instruction in the case that the feedback reply is yes, deleting the first type of keyword, and continuing to perform the step of acquiring the terminal to continue transmitting the audio and video code stream; If the feedback reply is no, the terminal pauses to send the audio and video code stream.
  • processing the audio/video code stream or the communication of the terminal according to the matching situation further includes: after the interrupting the communication of the terminal, reaching the protection time when the terminal interrupts communication After the time of the segment, the communication of the terminal is resumed.
  • the embodiment of the invention further provides an anti-leakage processing device, comprising:
  • Obtaining a module configured to obtain an audio and video code stream sent by the terminal
  • a matching module configured to extract a sound or an image of the audio and video code stream and match a preset keyword, where the preset keyword is related to preset confidential content
  • the processing module is configured to process the audio/video code stream or the communication of the terminal according to the matching situation.
  • the matching module includes:
  • An identification unit configured to identify a sound of the audio and video code stream or a text content associated with the image
  • a text matching unit configured to match the text content with the preset keyword.
  • the processing module includes:
  • a first processing unit configured to be in the sound or the image and the preset keyword In the case of a type of keyword matching, the audio and video code stream is cut off;
  • a second processing unit configured to cut off the audio and video code stream if the sound or the image matches a second type of keyword of the preset keyword, and interrupt communication of the terminal, wherein
  • the confidentiality level of the confidential content corresponding to the first type of keywords and the second type of keywords is different.
  • the first processing unit includes:
  • the consulting subunit is configured to, after the sound or the image matches the first type of keyword of the preset keyword, disconnect the audio and video code stream, and send a consultation instruction to the terminal, where
  • the consulting instruction includes: the first type of keyword, the consulting instruction is used to indicate whether the terminal continues to send the audio and video code stream;
  • a feedback subunit configured to receive a feedback reply corresponding to the consulting instruction, and if the feedback reply is yes, deleting the first type of keyword, and continuing to perform obtaining, the terminal continues to send the audio and video code stream The step of suspending transmission of the audio and video code stream if the feedback reply is no.
  • the second processing unit includes:
  • the protection time subunit is configured to interrupt the communication of the terminal, and after the time when the terminal interrupts communication reaches the protection time period, the communication of the terminal is resumed.
  • the audio and video code stream sent by the terminal is obtained, and the sound or image of the audio and video code stream is extracted and matched with a preset keyword, and the preset keyword is related to the preset confidential content, according to the matching situation.
  • the audio/video stream or the communication of the terminal is processed, which solves the problem that the user uses the audio and video communication to easily leak, and improves the security of the user's audio and video communication.
  • FIG. 1 is a flow chart of a method for processing leak prevention according to an embodiment of the present invention
  • FIG. 2 is a structural block diagram of an anti-leakage processing apparatus according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of networking of two-party audio and video communication according to an alternative embodiment of the present invention.
  • FIG. 4 is a schematic diagram of networking of multi-party audio and video communication according to an alternative embodiment of the present invention.
  • FIG. 5 is a schematic flow chart of a general-level leakage protection according to an alternative embodiment of the present invention.
  • FIG. 6 is a flow chart showing the advanced leak protection of an alternative embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for preventing leak prevention according to an embodiment of the present invention. As shown in FIG. 1 , the flow includes the following steps:
  • Step S102 Acquire an audio and video code stream sent by the terminal.
  • how to obtain the audio and video code stream sent by the terminal can be implemented by using the well-known technology of the present invention, and is not used to limit the protection scope of the embodiment of the present invention, and details are not described herein again.
  • Step S104 extracting a sound or an image of the audio and video code stream and matching with a preset keyword, where the preset keyword is related to preset confidential content;
  • Step S106 processing the audio/video code stream or the communication of the terminal according to the matching situation.
  • the audio and video code stream sent by the terminal extracting the sound or image of the audio and video code stream and matching the preset keyword, the preset keyword is related to the preset secret content; according to the matching situation,
  • the audio and video code stream or the communication of the terminal is processed to solve the problem that the user is easy to leak using the audio and video communication, and the security of the user's audio and video communication is improved.
  • the text content can be matched with the preset keyword by identifying the sound of the audio/video stream or the text content associated with the image.
  • how to identify the sound of the audio/video stream or the text content associated with the image may be implemented by techniques well known to those skilled in the art, and is not intended to limit the scope of protection of the embodiments of the present invention, and details are not described herein.
  • the sound or the image is matched with the first keyword of the preset keyword.
  • the consulting instruction includes: the first type of keyword, the consulting instruction is used to indicate whether the terminal continues to send the audio and video code stream; Receiving a feedback reply corresponding to the consulting instruction, if the feedback reply is yes, deleting the first type keyword, and continuing to perform the step of acquiring the terminal to continue transmitting the audio and video code stream; if the feedback reply is no In the case, the terminal pauses to transmit the audio and video code stream.
  • the audio and video code stream is cut off, and the communication of the terminal is interrupted, and the communication may be interrupted at the terminal. After the time of the protection period reaches the time of the protection period, the communication of the terminal is resumed.
  • how to communicate with the terminal can be implemented by using the well-known techniques of the present invention, and is not intended to limit the scope of protection of the embodiments of the present invention, and details are not described herein again.
  • the confidentiality level of the secret content corresponding to the first type of keywords and the second type of keywords in the foregoing embodiment is different.
  • the confidentiality level of the confidential content of the first type of keyword is lower than the security level of the confidential content of the second type of keyword.
  • an anti-leakage processing device is also provided, which is configured to implement the above-mentioned embodiments and optional embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • the above method may be implemented by a terminal (which may be a terminal that transmits the audio and video code stream described above, or a terminal other than the terminal that transmits the audio and video code stream), or a network relay device (such as a router, etc.).
  • a terminal which may be a terminal that transmits the audio and video code stream described above, or a terminal other than the terminal that transmits the audio and video code stream
  • a network relay device such as a router, etc.
  • FIG. 2 is a structural block diagram of an anti-leakage processing apparatus according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes:
  • the obtaining module 22 is configured to acquire an audio and video code stream sent by the terminal;
  • the matching module 24 is configured to extract a sound or an image of the audio and video code stream and match a preset keyword, where the preset keyword is related to the preset secret content;
  • the processing module 26 is configured to process the audiovisual code stream or the communication of the terminal according to the matching situation.
  • the audio and video code stream sent by the terminal extracting the sound or image of the audio and video code stream and matching with a preset keyword, where the preset keyword is related to the preset secret content; according to the matching situation,
  • the audio and video code stream or the communication of the terminal is processed to solve the problem that the user is easy to leak using the audio and video communication, and the security of the user's audio and video communication is improved.
  • the matching module 24 includes:
  • An identification unit configured to identify a sound of the audio and video code stream or a text content associated with the image
  • a text matching unit configured to match the text content with the preset keyword.
  • the processing module 26 includes:
  • a first processing unit configured to cut off the audio and video code stream if the sound or the image matches the first type of keyword of the preset keyword
  • a second processing unit configured to cut off the audio and video code stream and interrupt communication of the terminal in the case that the sound or the image matches the second type of keyword of the preset keyword, wherein the first class The security level of the secret content corresponding to the keyword and the second type of keyword is different.
  • the first processing unit includes:
  • the consulting subunit is configured to send a consultation instruction to the terminal after the sound or the image matches the first type keyword of the preset keyword, and the consulting instruction includes: a first type of keyword, the consulting instruction is used to indicate whether the terminal continues to send the audio and video code stream;
  • a feedback subunit configured to receive a feedback reply corresponding to the consulting instruction, and if the feedback reply is yes, deleting the first type of keyword, and continuing to perform the step of acquiring the terminal to continue transmitting the audio and video code stream, If the feedback reply is no, the terminal suspends transmitting the audio and video code stream.
  • the second processing unit includes:
  • the protection time sub-unit is set to interrupt the communication of the terminal, and after the time when the terminal interrupts communication reaches the protection time period, the communication of the terminal is resumed.
  • the optional embodiment automatically reminds the user of the language, pictures, texts, etc. that may be leaked, avoids the leaking problem caused by negligence, and maximizes the protection of personal privacy and corporate governance.
  • the secret of the government is to realize the information security in audio and video communication.
  • the core is to dynamically detect the parts that may be leaked during the communication process, and to protect them dynamically to prevent leaks caused by negligence.
  • the anti-leak device (which may be in software or independent hardware) is installed on the client or server in the communication, or on the relay device, and the device can perform voice and image recognition.
  • the keyword to be protected is set in advance on the anti-leak device. At this time, the anti-leak device starts to work, and the audio and video code stream passing through itself is monitored in real time, and when it is found to have the same or match with the preset keyword (for example, similar) Voice, image,
  • the code stream is immediately cut off, and the problem is not discussed, or the image is not publicly available, the user temporarily interrupts the communication, and enters the protection time. Only when the protection time expires, the user can choose to continue communication.
  • C is an anti-leakage device (the device may be in software or in an independent hardware manner), and the device may be installed on each terminal. It can also be installed on the terminal device.
  • a and B are two-party clients or servers.
  • C is a leak prevention device (the device may be in software or independent hardware mode)
  • A, B, and D are clients or servers.
  • the device can be installed on each terminal or on the terminal device.
  • FIG. 5 is a schematic flowchart of a general-level leakage protection according to an alternative embodiment of the present invention. As shown in FIG. 5, the method includes the following steps:
  • Step S501 Presetting a keyword on the anti-leak device
  • Step S502 The anti-leak device starts detecting the audio and video code stream
  • Step S506 Prompt the user that a leak may occur, and list keywords to ask whether to continue;
  • Step S509 The communication returns to normal.
  • FIG. 6 is a schematic flowchart of an advanced leak protection according to an alternative embodiment of the present invention. As shown in FIG. 6, the method includes the following steps:
  • Step S601. Presetting a keyword on the anti-leak device
  • Step S602. The anti-leak device starts detecting the audio and video code stream
  • Step S603. analyzing the detected keyword
  • Step S606. Pause the code stream to be sent for 30 seconds
  • Step S607. Resume normal code stream transmission
  • the specific process of the above advanced leak protection is relatively simple. The difference is that the advanced leak protection absolutely does not allow the preset keyword to appear. Once it occurs, the communication is immediately interrupted.
  • the present invention provides a new method for preventing leaks in audio and video communication.
  • the core is to dynamically detect potentially leaked parts during the communication process, and dynamically protect against leaks caused by personnel negligence.
  • the networking is very flexible and can reduce the cost of users.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM or RAM, a disk,
  • a storage medium such as ROM or RAM, a disk
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • Embodiments of the present invention also provide a storage medium.
  • the above storage medium may be arranged to store program code for performing the method steps of the above-described embodiments.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a medium such as a disc or a disc that can store program code.
  • the processor performs the method steps of the foregoing embodiments according to the stored program code in the storage medium.
  • each module/unit in the foregoing embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program in a storage and a memory by a processor. / instruction to achieve its corresponding function.
  • the invention is not limited to any specific form of combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

一种防泄密的处理方法及装置,其中,该方法包括:获取终端发送的音视频码流,提取音视频码流的声音或者图像与预设关键字进行匹配,该预设关键字与预设保密内容相关,根据该匹配的情况,对该音视频码流或者该终端的通讯进行处理。

Description

防泄密的处理方法及装置 技术领域
本文涉及但不限于通信领域,尤指一种防泄密的处理方法及装置。
背景技术
在信息高速发展的今天,音视频通讯在防汛、防火、农业、海洋渔业、政府会议、企业通讯、以及个人通讯等都有了大规模的应用。给人民的生活带来了便利,也因此,用户提出了安全性需求。在上述的应用中,难免出现与陌生第三方通讯或者是信息极度敏感单位参与通讯(比如军方),在通讯的过程中,可能由于人员疏忽出现泄密,比如高度敏感的信息、个人账户、机密技术方案等。
在相关技术中,音视频通讯只能通过音视频加密防止其他人员获取媒体信息,不能防止参与通信过程中,参与人员的泄密。
针对相关技术中,用户使用音视频通讯容易泄密的问题,目前还没有有效的解决方案。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供了一种防泄密的处理方法及装置,能够提高用户使用音视频通讯的安全性。
本发明实施例提供了一种防泄密的处理方法,包括:获取终端发送的音视频码流;提取所述音视频码流的声音或者图像与预设关键字进行匹配,所述预设关键字与预设保密内容相关;根据所述匹配的情况,对所述音视频码流或者所述终端的通讯进行处理。
可选地,提取所述音视频码流的声音或者图像与预设关键字进行匹配,包括:识别所述音视频码流的声音或者图像关联的文字内容;将所述文字内容与所述预设关键字进行匹配。
可选地,所述根据所述匹配的情况,对音视频码流或者所述终端的通讯进行处理包括:在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流;在所述声音或者所述图像与所述预设关键字的第二类关键词匹配的情况下,切断所述音视频码流,并且中断所述终端的通讯;其中,所述第一类关键词和所述第二类关键词对应的所述保密内容的保密级别不同。
可选地,根据所述匹配的情况,对音视频码流或者所述终端的通讯进行处理还包括:在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流之后,发送咨询指令给所述终端,所述咨询指令包括:所述第一类关键词,所述咨询指令用于指示终端是否继续发送所述音视频码流;接收与所述咨询指令对应的反馈答复,在所述反馈答复为是的情况下,删除第一类关键词,并继续执行获取所述终端继续发送所述音视频码流的步骤;在所述反馈答复为否的情况下,所述终端暂停发送所述音视频码流。
可选地,根据所述匹配的情况,对音视频码流或者所述终端的通讯进行处理还包括:所述中断所述终端的通讯之后,在所述终端中断通讯的时间达到所述保护时间段的时间后,恢复所述终端的通讯。
本发明实施例还提供了一种防泄密的处理装置,包括:
获取模块,设置为获取终端发送的音视频码流;
匹配模块,设置为提取所述音视频码流的声音或者图像与将预设关键字进行匹配,所述预设关键字与预设保密内容相关;
处理模块,设置为根据所述匹配的情况,对所述音视频码流或者所述终端的通讯进行处理。
可选地,所述匹配模块包括:
识别单元,设置为识别所述音视频码流的声音或者图像关联的文字内容;
文字匹配单元,设置为将所述文字内容与所述预设关键字进行匹配。
可选地,所述处理模块包括:
第一处理单元,设置为在所述声音或者所述图像与所述预设关键字的第 一类关键词匹配的情况下,切断所述音视频码流;
第二处理单元,设置为在所述声音或者所述图像与所述预设关键字的第二类关键词匹配的情况下,切断所述音视频码流,并且中断所述终端的通讯,其中,所述第一类关键词和所述第二类关键词对应的所述保密内容的保密级别不同。
可选地,所述第一处理单元包括:
咨询次单元,设置为在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流后,发送咨询指令给所述终端,所述咨询指令包括:所述第一类关键词,所述咨询指令用于指示终端是否继续发送所述音视频码流;
反馈次单元,设置为接收与所述咨询指令对应的反馈答复,在所述反馈答复为是的情况下,删除第一类关键词,并继续执行获取所述终端继续发送所述音视频码流的步骤,在所述反馈答复为否的情况下,所述终端暂停发送所述音视频码流。
可选地,所述第二处理单元包括:
保护时间次单元,设置为中断所述终端的通讯之后,在所述终端中断通讯的时间达到所述保护时间段的时间后,恢复所述终端的通讯。
通过本发明实施例,获取终端发送的音视频码流,提取该音视频码流的声音或者图像与预设关键字进行匹配,该预设关键字与预设保密内容相关,根据该匹配的情况,对该音视频码流或者该终端的通讯进行处理,解决了用户使用音视频通讯容易泄密的问题,提高了用户音视频通讯的安全性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1是本发明实施例的一种防泄密的处理方法的流程图;
图2是本发明实施例的一种防泄密的处理装置的结构框图;
图3是本发明可选实施例的两方音视频通讯的组网示意图;
图4是本发明可选实施例的多方音视频通讯的组网示意图;
图5是本发明可选实施例的普通级泄密防护的流程示意图;
图6是本发明可选实施例的高级泄密防护的流程示意图。
本发明的实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
在本实施例中提供了一种防泄密的处理方法,图1是本发明实施例的一种防泄密的处理方法的流程图,如图1所示,该流程包括如下步骤:
步骤S102,获取终端发送的音视频码流;
具体如何获取终端发送的音视频码流可以采用本领域技术人员的熟知技术实现,并不用于限定本发明实施例的保护范围,这里不再赘述。
步骤S104,提取该音视频码流的声音或者图像与预设关键字进行匹配,该预设关键字与预设保密内容相关;
步骤S106,根据该匹配的情况,对该音视频码流或者该终端的通讯进行处理。
通过上述步骤,获取终端发送的音视频码流;提取该音视频码流的声音或者图像与预设关键字进行匹配,该预设关键字与预设保密内容相关;根据该匹配的情况,对该音视频码流或者该终端的通讯进行处理,解决了用户使用音视频通讯容易泄密的问题,提高了用户音视频通讯的安全性。
在本实施例中,可以通过识别该音视频码流的声音或者图像关联的文字内容,将该文字内容与该预设关键字进行匹配。
具体如何识别该音视频码流的声音或图像关联的文字内容可以采用本领域技术人员熟知的技术实现,并不用于限定本发明实施例的保护范围,这里不再赘述。
在本实施例中,在该声音或者该图像与该预设关键字的第一类关键词匹 配的情况下,切断该音视频码流,并且还可以发送咨询指令给该终端,该咨询指令包括:该第一类关键词,该咨询指令用于指示终端是否继续发送该音视频码流;接收与该咨询指令对应的反馈答复,在该反馈答复为是的情况下,删除第一类关键词,并继续执行获取该终端继续发送该音视频码流的步骤;在该反馈答复为否的情况下,该终端暂停发送该音视频码流。
在本实施例中,在该声音或者该图像与该预设关键字的第二类关键词匹配的情况下,切断该音视频码流,并且中断该终端的通讯,还可以在该终端中断通讯的时间达到该保护时间段的时间后,恢复该终端的通讯。
具体如何终端该终端的通讯可以采用本领域技术人员的熟知技术实现,并不用于限定本发明实施例的保护范围,这里不再赘述。
其中,上述实施例的该第一类关键词和该第二类关键词对应的该保密内容的保密级别不同。可选的,第一类关键词对于的保密内容的保密级别低于第二类关键词对于的保密内容的保密级别。
在本实施例中还提供了一种防泄密的处理装置,该装置设置为实现上述实施例及可选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
上述方法可以通过终端(该终端可以是上述发送音视频码流的终端,或独立于上述发送音视频码流的终端之外的其他终端)、或网络中转设备(如路由器等)实现。
图2是本发明实施例的一种防泄密的处理装置的结构框图,如图2所示,该装置包括:
获取模块22,设置为获取终端发送的音视频码流;
匹配模块24,设置为提取该音视频码流的声音或者图像与将预设关键字进行匹配,该预设关键字与预设保密内容相关;
处理模块26,设置为根据该匹配的情况,对该音视频码流或者该终端的通讯进行处理。
通过上述装置,获取终端发送的音视频码流;提取该音视频码流的声音或者图像与预设关键字进行匹配,该预设关键字与预设保密内容相关;根据该匹配的情况,对该音视频码流或者该终端的通讯进行处理,解决了用户使用音视频通讯容易泄密的问题,提高了用户音视频通讯的安全性。
在本实施例中,该匹配模块24包括:
识别单元,设置为识别该音视频码流的声音或者图像关联的文字内容;
文字匹配单元,设置为将该文字内容与该预设关键字进行匹配。
在本实施例中,该处理模块26包括:
第一处理单元,设置为在该声音或者该图像与该预设关键字的第一类关键词匹配的情况下,切断该音视频码流;
第二处理单元,设置为在该声音或者该图像与该预设关键字的第二类关键词匹配的情况下,切断该音视频码流,并且中断该终端的通讯,其中,该第一类关键词和该第二类关键词对应的该保密内容的保密级别不同。
在本实施例中,该第一处理单元包括:
咨询次单元,设置为在该声音或者该图像与该预设关键字的第一类关键词匹配的情况下,切断该音视频码流后,发送咨询指令给该终端,该咨询指令包括:该第一类关键词,该咨询指令用于指示终端是否继续发送该音视频码流;
反馈次单元,设置为接收与该咨询指令对应的反馈答复,在该反馈答复为是的情况下,删除第一类关键词,并继续执行获取该终端继续发送该音视频码流的步骤,在该反馈答复为否的情况下,该终端暂停发送该音视频码流。
该第二处理单元包括:
保护时间次单元,设置为中断该终端的通讯之后,在该终端中断通讯的时间达到该保护时间段的时间后,恢复该终端的通讯。
下面结合可选实施例和实施方式对本发明进行详细说明。
本可选实施例在音视频通讯中,自动的提醒用户可能泄密的语言、图片、文字等,避免由于疏忽产生的泄密问题,最大限度的保护个人隐私、公司政 府机密,实现音视频通讯中的信息安全。核心是在通讯的过程中动态检测可能泄密的部分,动态的进行保护,防止人员疏忽造成的泄密。
在通讯中的客户端或者服务端,或者中转设备上安装防泄密装置(该装置可以为软件、或者独立硬件方式存在),该装置可进行语音与图像识别。预先在防泄密装置上设置需要保护的关键字,此时防泄密装置开始工作,对经过自身的音视频码流实时监测,当发现有与预设关键字相同或相匹配(例如相近似)的语音、图像时,
如果是普通密级,立即切断该路码流,并且向用户发出预警,提示该关键字可能泄密,并询问是否继续讨论可能泄密的话题,如果用户选择继续,则不再对该用户进行该关键字检测,用户可以自由发送语音以及图像。如果选择否,则提示效果已经达到,用户可以继续进行通讯。
如果是高级密级,则立即切断码流,并且提示该问题不可讨论,或者该图像不可公示,用户暂时中断通讯,进入保护时间,只有当保护时间到期时,用户才可以选择继续通讯。
图3是本发明可选实施例的两方音视频通讯的组网示意图,其中C为防泄密装置(该装置可以为软件、或者独立硬件方式存在),该装置可以安装在每个终端上,也可以安装在终端设备上。A和B为两方的客户端或者服务端。
图4是本发明可选实施例的多方音视频通讯的组网示意图,其中C为防泄密装置(该装置可以为软件、或者独立硬件方式存在),A、B以及D为客户端或者服务端,该装置可以安装在每个终端上,也可以安装在终端设备上。
图5是本发明可选实施例的普通级泄密防护的流程示意图,如图5所示,包括如下步骤:
步骤S501.在防泄密装置上预设关键字;
步骤S502.防泄密装置开始检测音视频码流;
步骤S503.分析检测到的关键字;
步骤S504.如果是音频,则暂停对外发送音频;
步骤S505.如果是是视频,则暂停对外发送视频;
步骤S506.提示用户可能出现泄密,并列出关键字,询问是否继续;
步骤S507.用户选择是,则删除该关键字,不再进行屏蔽;
步骤S508.用户选择否,则暂停通讯30秒;
步骤S509.通讯恢复正常。
图6是本发明可选实施例的高级泄密防护的流程示意图,如图6所示,包括如下步骤:
步骤S601.在防泄密装置上预设关键字;
步骤S602.防泄密装置开始检测音视频码流;
步骤S603.分析检测到的关键字;
步骤S604.如果是音频,则暂停对外发送音频;
步骤S605.如果是是视频,则暂停对外发送视频;
步骤S606.暂停码流发送30秒;
步骤S607.恢复正常的码流发送;
步骤S608.重新开始通讯。
上述高级泄密防护的具体流程,处理比较简单,区别在于高级泄密防护绝对不允许预设关键字出现,一旦出现,通讯立即中断。
本可选实施例提出一种新的音视频通讯中的防泄密方法,核心是在通讯的过程中动态检测可能泄密的部分,动态的进行保护,防止人员疏忽造成的泄密,本可选实施例还有以下可选的的技术手段:
a、可根据需要实时的添加删除关键字,根据场合不同,参与人员不同实时进行调整,非常灵活。
b、可以是软件也可以是独立硬件,可以安置在客户端、服务端、以及网络中转装置中,组网十分灵活,也可以减少用户的成本。
c、可以对音频、视频同时进行检测,在高敏感信息环境,可以有效的防止由于人员疏忽造成的泄密事件发生。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM或RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行上述实施例的方法步骤的程序代码。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等每一种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行上述实施例的方法步骤。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件(例如处理器)完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,例如通过集成电路来实现其相应功能,也可以采用软件功能模块的形式实现,例如通过处理器执行存储与存储器中的程序/指令来实现其相应功能。本发明不限于任何特定形式的硬件和软件的结合。
以上所述仅为本发明的可选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有多种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
上述技术问题提高了用户音视频通讯的安全性。

Claims (10)

  1. 一种防泄密的处理方法,包括:
    获取终端发送的音视频码流;
    提取所述音视频码流的声音或者图像与预设关键字进行匹配,所述预设关键字与预设保密内容相关;
    根据所述匹配的情况,对所述音视频码流或者所述终端的通讯进行处理。
  2. 根据权利要求1所述的方法,其中,提取所述音视频码流的声音或者图像与预设关键字进行匹配,包括:
    识别所述音视频码流的声音或者图像关联的文字内容;
    将所述文字内容与所述预设关键字进行匹配。
  3. 根据权利要求1所述的方法,其中,所述根据所述匹配的情况,对音视频码流或者所述终端的通讯进行处理包括:
    在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流;
    在所述声音或者所述图像与所述预设关键字的第二类关键词匹配的情况下,切断所述音视频码流,并且中断所述终端的通讯;其中,所述第一类关键词和所述第二类关键词对应的所述保密内容的保密级别不同。
  4. 根据权利要求3所述的方法,所述根据所述匹配的情况,对音视频码流或者所述终端的通讯进行处理还包括:
    在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流之后,
    发送咨询指令给所述终端,所述咨询指令包括:所述第一类关键词,所述咨询指令用于指示终端是否继续发送所述音视频码流;
    接收与所述咨询指令对应的反馈答复,在所述反馈答复为是的情况下,删除所述第一类关键词,并继续执行获取所述终端继续发送所述音视频码流的步骤;
    在所述反馈答复为否的情况下,所述终端暂停发送所述音视频码流。
  5. 根据权利要求3所述的方法,所述根据所述匹配的情况,对音视频码流或者所述终端的通讯进行处理还包括:
    所述中断所述终端的通讯之后,在所述终端中断通讯的时间达到所述保护时间段的时间后,恢复所述终端的通讯。
  6. 一种防泄密的处理装置,包括:
    获取模块,设置为获取终端发送的音视频码流;
    匹配模块,设置为提取所述音视频码流的声音或者图像与将预设关键字进行匹配,所述预设关键字与预设保密内容相关;
    处理模块,设置为根据所述匹配的情况,对所述音视频码流或者所述终端的通讯进行处理。
  7. 根据权利要求6所述的装置,其中,所述匹配模块包括:
    识别单元,设置为识别所述音视频码流的声音或者图像关联的文字内容;
    文字匹配单元,设置为将所述文字内容与所述预设关键字进行匹配。
  8. 根据权利要求6所述的装置,其中,所述处理模块包括:
    第一处理单元,设置为在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流;
    第二处理单元,设置为在所述声音或者所述图像与所述预设关键字的第二类关键词匹配的情况下,切断所述音视频码流,并且中断所述终端的通讯,其中,所述第一类关键词和所述第二类关键词对应的所述保密内容的保密级别不同。
  9. 根据权利要求8所述的装置,其中,所述第一处理单元包括:
    咨询次单元,设置为在所述声音或者所述图像与所述预设关键字的第一类关键词匹配的情况下,切断所述音视频码流后,发送咨询指令给所述终端,所述咨询指令包括:所述第一类关键词,所述咨询指令用于指示终端是否继续发送所述音视频码流;
    反馈次单元,设置为接收与所述咨询指令对应的反馈答复,在所述反馈答复为是的情况下,删除第一类关键词,并继续执行获取所述终端继续发送 所述音视频码流的步骤,在所述反馈答复为否的情况下,所述终端暂停发送所述音视频码流。
  10. 根据权利要求8所述的装置,其中,所述第二处理单元包括:
    保护时间次单元,设置为中断所述终端的通讯之后,在所述终端中断通讯的时间达到所述保护时间段的时间后,恢复所述终端的通讯。
PCT/CN2016/091044 2015-07-24 2016-07-22 防泄密的处理方法及装置 WO2017016449A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510439663.8 2015-07-24
CN201510439663.8A CN106375078A (zh) 2015-07-24 2015-07-24 防泄密的处理方法及装置

Publications (1)

Publication Number Publication Date
WO2017016449A1 true WO2017016449A1 (zh) 2017-02-02

Family

ID=57880956

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/091044 WO2017016449A1 (zh) 2015-07-24 2016-07-22 防泄密的处理方法及装置

Country Status (2)

Country Link
CN (1) CN106375078A (zh)
WO (1) WO2017016449A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801546A (zh) * 2011-05-26 2012-11-28 北京天亿电联科技有限公司 网络数据安全管理方法和设备
CN103247318A (zh) * 2012-02-02 2013-08-14 联想(北京)有限公司 一种获得视频的方法、装置及播放视频的方法、装置
CN103258050A (zh) * 2013-05-27 2013-08-21 公安部第三研究所 实现基于语义内容进行视频信息过滤控制的系统及其方法
CN103686244A (zh) * 2013-12-26 2014-03-26 乐视网信息技术(北京)股份有限公司 视频数据的管理方法及其系统
CN104732974A (zh) * 2013-12-19 2015-06-24 国家电网公司 智能录音识别系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801546A (zh) * 2011-05-26 2012-11-28 北京天亿电联科技有限公司 网络数据安全管理方法和设备
CN103247318A (zh) * 2012-02-02 2013-08-14 联想(北京)有限公司 一种获得视频的方法、装置及播放视频的方法、装置
CN103258050A (zh) * 2013-05-27 2013-08-21 公安部第三研究所 实现基于语义内容进行视频信息过滤控制的系统及其方法
CN104732974A (zh) * 2013-12-19 2015-06-24 国家电网公司 智能录音识别系统
CN103686244A (zh) * 2013-12-26 2014-03-26 乐视网信息技术(北京)股份有限公司 视频数据的管理方法及其系统

Also Published As

Publication number Publication date
CN106375078A (zh) 2017-02-01

Similar Documents

Publication Publication Date Title
US9100373B2 (en) System and method for temporary obfuscation during collaborative communications
US20170193236A1 (en) Data security processing method and apparatus based on switch in dual system
WO2016074551A1 (zh) 移动终端及其通知消息显示方法、装置及计算机存储介质
US20210006608A1 (en) Switch controller for separating multiple portions of call
WO2015074517A1 (en) Information viewing method, device, system and storage medium
EP3338401B1 (en) Systems and methods for data loss prevention while preserving privacy
WO2016045469A1 (zh) 信息加密方法和移动终端
CN113206737A (zh) 语音通信加密方法、解密方法及其装置
CN108200093B (zh) 传输文件的加密和解密方法及加密和解密装置
CN109450777B (zh) 会话信息提取方法、装置、设备和介质
US20230252123A1 (en) Method of Displaying Content On A Screen Of An Electronic Processing Device
CN104270353B (zh) 一种信息安全传递方法及系统、接收终端、发送终端
WO2016045464A1 (zh) 解密方法和移动终端
US11811827B2 (en) Securing endpoints for virtual meetings
WO2017128545A1 (zh) 一种消息提醒方法及装置
US20160043979A1 (en) Automatic biographical summary compilation and speaker recognition based messaging system
CN110380856A (zh) 终端设备及其语音信息处理方法、装置以及存储介质
WO2017016449A1 (zh) 防泄密的处理方法及装置
US20210406806A1 (en) Systems and methods for intelligent monitoring
CN105320892B (zh) 社交通信应用的通信记录存储方法及相关系统
CN106685791B (zh) 保密信息发送方法及其装置
CN115277670A (zh) 目标应用的网络连接控制方法、装置和电子设备
CN112149177B (zh) 一种网络信息安全的双向保护方法和系统
KR101883397B1 (ko) 신뢰 기반 콘텐츠 공유 장치 및 방법
US9940393B2 (en) Electronic personal assistant privacy

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16829815

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16829815

Country of ref document: EP

Kind code of ref document: A1