WO2017166616A1 - 一种信息处理方法、装置和电子设备 - Google Patents

一种信息处理方法、装置和电子设备 Download PDF

Info

Publication number
WO2017166616A1
WO2017166616A1 PCT/CN2016/096545 CN2016096545W WO2017166616A1 WO 2017166616 A1 WO2017166616 A1 WO 2017166616A1 CN 2016096545 W CN2016096545 W CN 2016096545W WO 2017166616 A1 WO2017166616 A1 WO 2017166616A1
Authority
WO
WIPO (PCT)
Prior art keywords
target information
information
user
password
deleting
Prior art date
Application number
PCT/CN2016/096545
Other languages
English (en)
French (fr)
Inventor
张帆
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Publication of WO2017166616A1 publication Critical patent/WO2017166616A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present application relates to the field of information security, and in particular, to an information processing method, apparatus, and electronic device.
  • the recipient of the information saves the received information by default, so that it can be viewed at any time.
  • the technical problem to be solved by the present application is that the private information sent by the information sender in the prior art is easily leaked.
  • the embodiment of the present application provides an information processing method, including the steps of: receiving and displaying target information; determining whether the target information carries a feature tag or determining whether an attribute setting of the target information is abnormal; If the information carries the feature tag or the attribute setting abnormality of the target information, the target information is closed and deleted after receiving the instruction to close the target information.
  • the feature tag comprises a preset character string.
  • the method further includes: reminding the user whether to save the target information.
  • the method further includes: prompting the user to input a password, the password is used to verify the permission to save the information; and determining the user input Whether the password is consistent with the predetermined password, the predetermined password is pre-agreed by the sender and the receiver of the information, and if the password input by the user does not match the predetermined password, the target information is closed and deleted.
  • the method further includes: reminding the user that the information has been deleted.
  • the embodiment of the present application further provides an information processing apparatus, including: a receiving unit, configured to receive and display target information; and a determining unit, configured to determine whether the target information carries a feature tag or determine the target information. Whether the attribute setting is abnormal; the deleting unit is configured to: when the determining unit determines that the target information carries the feature tag or determines that the attribute setting of the target information is abnormal, after receiving the instruction to close the target information, And delete the target information.
  • the feature tag comprises a preset character string.
  • the device further includes: a first reminding unit, configured to: after receiving the instruction to close the target information, remind the user whether to save the target information before the deleting unit closes and deletes the target information .
  • a first reminding unit configured to: after receiving the instruction to close the target information, remind the user whether to save the target information before the deleting unit closes and deletes the target information .
  • the device further includes: a second reminding unit, configured to remind the user to input a password between the first reminding unit to remind the user whether to save the target information and the deleting unit to close and delete the target information
  • the password is used to verify the permission to save the information
  • the password confirmation unit is configured to determine whether the password input by the user is consistent with the predetermined password, and the predetermined password is pre-agreed by the sender and the receiver of the information, and the user input is determined.
  • the deletion unit is notified to close and delete the target information.
  • the device further comprises: a third reminding unit, configured to close in the deleting unit After deleting the target information, the user is reminded that the information has been deleted.
  • a third reminding unit configured to close in the deleting unit After deleting the target information, the user is reminded that the information has been deleted.
  • Embodiments of the present application further disclose an electronic device including at least one processor; and a memory communicably coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor The instruction is executed by the at least one processor to enable the at least one processor to receive and display target information; determine whether the target information carries a feature tag or determine whether an attribute setting of the target information is abnormal; If the target information carries the feature tag or the attribute setting abnormality of the target information, the target information is closed and deleted after receiving the instruction to close the target information.
  • the feature tag comprises a preset character string.
  • the method further includes: reminding the user whether to save the target information.
  • the method further includes: prompting the user to input a password, the password is used to verify the permission to save the information; and determining the user input Whether the password is consistent with the predetermined password, the predetermined password is pre-agreed by the sender and the receiver of the information, and if the password input by the user does not match the predetermined password, the target information is closed and deleted.
  • the method further includes: reminding the user that the information has been deleted.
  • Embodiments of the present application also disclose a non-volatile computer storage medium storing computer-executable instructions that, when executed by an electronic device, enable an electronic device to receive and display target information; Determining whether the target information carries a feature tag or determining whether an attribute setting of the target information is abnormal; if the target information carries a feature tag or an attribute setting abnormality of the target information, receiving the target information is closed After the instruction, the target information is closed and deleted.
  • the feature tag comprises a preset character string.
  • the method further includes: reminding the user whether to save the target information.
  • the method further includes prompting the user to input a password, the password is used to verify the permission to save the information, and determining whether the password input by the user is consistent with the predetermined password, where the predetermined password is a pre-agreed by the sender and the receiver of the information. If the password input by the user does not match the predetermined password, the target information is closed and deleted.
  • the method further includes: reminding the user that the information has been deleted.
  • the application also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer, Having the computer perform the method of any of the above.
  • the information processing method provided by the embodiment of the present application receives and displays the target information, determines whether the target information carries the feature tag or determines whether the attribute setting of the target information is abnormal, and if yes, closes after receiving the instruction to close the target information.
  • the target information is deleted, so that the information receiver can only view the information, cannot save and copy the forwarding information, prevent the leakage of the private information, and enhance the security of information exchange.
  • the information processing method provided by the embodiment of the present application, after receiving the instruction to close the target information, and reminding the user to save the target information before closing and deleting the target information, providing information storage and copying to the person with special permission.
  • the way of forwarding enables different information receivers to have different operational rights to the target information, which enhances the flexibility of processing information.
  • the information processing method provided by the embodiment of the present application reminds the user whether to save the target information and close and delete the target information, and prompts the user to input a password to verify the permission to save the information, and determines whether the password input by the user is consistent with the predetermined password. If the information is inconsistent, the target information is closed and deleted, which can prevent the target information from being saved and copied and forwarded at will, which not only ensures the flexibility of the information receiving mode of the information receiving party with different rights, but also enhances the security of the information in this case.
  • the information processing method provided by the embodiment of the present application after the target information is closed and deleted, prompts the user that the information has been deleted, to help the user confirm that the private information is actually received; and does not remind the user of the specific content of the information.
  • Information such as the sender of the information to ensure information security.
  • FIG. 1A is a flowchart of an information processing method in Embodiment 1 of the present application.
  • FIG. 1B is a flowchart of a specific example of an information processing method in Embodiment 1 of the present application.
  • FIG. 2A is a schematic block diagram of an information processing apparatus in Embodiment 2 of the present application.
  • FIG. 2B is a schematic block diagram of a specific example of an information processing apparatus in Embodiment 2 of the present application.
  • FIG. 3 is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present application.
  • connection In the description of the present application, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be fixed or detachable, for example, unless otherwise specifically defined and defined. Connected, or connected in one piece; can be mechanical or electrical; It is directly connected, and can also be indirectly connected through an intermediate medium. It can also be internal communication between two components, either a wireless connection or a wired connection.
  • the specific meanings of the above terms in the present application can be understood in the specific circumstances for those skilled in the art.
  • This embodiment provides an information processing method, which is applied to a terminal that can receive information, or can be a computer terminal.
  • the received information may be SMS/MMS information received through the telecommunication network, or may be information received through an application, such as WeChat information.
  • an application such as WeChat information.
  • S10 Receive and display target information.
  • the terminal when receiving private information, the terminal does not immediately save the information, only prompts the user to receive a message, and does not directly display the information content, such as "You have received a private message, please click to view.” Only when the user clicks to open the information can the specific content of the information be viewed, and the terminal will receive and display the target information.
  • step S20 Determine whether the target information carries the feature tag or determines whether the attribute setting of the target information is abnormal. If the attribute information does not carry the feature tag or the attribute setting of the target information is not abnormal, the same steps as the existing solution are performed; if the attribute information of the target information carrying the feature tag or the target information is abnormal, step S30 is performed.
  • a sender sends a private message, it will send a feature tag to the message when it is sent.
  • the feature tag includes a preset string, such as "%*%*%*", or the attribute of the information is set to an abnormal value, such as setting the size of the information to infinity, or a preset string and information attribute. The combination of settings.
  • the target information carries the feature tag
  • the information is proved to be the private information sent by the sender of the message, and does not want to be leaked, and the information needs to be deleted.
  • the terminal deletes the private information at the same time as the private information is closed.
  • the information processing method provided by the embodiment of the present application receives and displays the target information, determines whether the target information carries the feature tag or determines whether the attribute setting of the target information is abnormal, and if yes, closes and deletes after receiving the instruction to close the target information.
  • the target information enables the recipient of the information to view only the information, saves and copies the forwarding information, prevents the leakage of the private information, and enhances the security of information exchange.
  • step S30 after receiving the instruction to close the target information, and before closing and deleting the target information, the following steps are further included:
  • the sender of the message sends a piece of private information, and hopes that only some people can save the private information for copying, forwarding, etc., the user is reminded whether to save the private information before deleting the private information.
  • S32 Remind the user to enter a password, which is used to verify the permission to save the information.
  • the recipient of the message wants to save the private information, he/she must enter the password. If there is no password, there is no permission to save the private information.
  • step S33 Determine whether the password input by the user is consistent with the predetermined password, and the predetermined password is pre-agreed by the sender and the receiver of the information. If the password input by the user does not match the predetermined password, step S34 is performed; if the password input by the user is consistent with the predetermined password, step S35 is performed.
  • both B and C receive the private information sent by A, and only B has the password for storing the private information, C does not. If both B and C receive the private information, they can click to view the information, but C cannot save and copy and forward the information; B can save the private information after inputting the correct saved password, so that it can be copied, Forward this information.
  • the user is reminded that the information has been deleted to help the user. Confirm that the actual receipt of a private message; does not remind the user of the specific content of the information and information sender and other information to ensure information security.
  • the present embodiment provides an information processing apparatus, as shown in FIG. 2A, including a receiving unit 10, a determining unit 20, and a deleting unit 30.
  • the receiving unit 10 is configured to receive and display target information.
  • the determining unit 20 is configured to determine whether the target information carries the feature tag or determines whether the attribute setting of the target information is abnormal.
  • Feature tags include preset strings.
  • the deleting unit 30 is configured to: when the determining unit determines that the target information carries the feature tag or determines the attribute setting abnormality of the target information, after receiving the instruction to close the target information, the target information is closed and deleted.
  • the received target information needs to be viewed by the user, and if the target information carries the feature mark, the target information is deleted after the user closes the target information, so that the information receiver can only view the information.
  • the forwarding information cannot be saved and copied, the leakage of private information is prevented, and the security of information exchange is enhanced.
  • the information processing apparatus further includes a first reminding unit 31, a second reminding unit 32, and a password confirming unit 33.
  • the first reminding unit 31 is configured to remind the user whether to save the target information.
  • the second reminding unit 32 is configured to remind the user to input a password, and the password is used to verify the permission to save the information.
  • the password confirming unit 33 is configured to determine whether the password input by the user is consistent with the predetermined password, where the predetermined password is pre-agreed by the sender and the receiver of the information, and when it is determined that the password input by the user is inconsistent with the predetermined password, the notification is notified.
  • the delete unit closes and deletes the target information.
  • the information reminding device further includes a third reminding unit, configured to remind the user that the information has been deleted after the deleting unit closes and deletes the target information.
  • a third reminding unit configured to remind the user that the information has been deleted after the deleting unit closes and deletes the target information.
  • the embodiment of the present application further discloses an electronic device, including at least one processor 810; a memory 800 communicatively coupled to the at least one processor 810; wherein the memory 800 stores instructions executable by the at least one processor 810, the instructions being executed by the at least one processor 810 such that The at least one processor 810 is capable of receiving and displaying target information; determining whether the target information carries a feature tag or determining whether an attribute setting of the target information is abnormal; if the target information carries a feature tag or the target information If the attribute setting is abnormal, the target information is closed and deleted after receiving the instruction to close the target information.
  • the electronic device also includes an input device 830 and an output device 840 that are electrically coupled to the memory 800 and the processor, the electrical connections preferably being connected by a bus.
  • the feature tag includes a preset character string.
  • the electronic device of the embodiment after receiving the instruction to close the target information, and before the closing and deleting the target information, further includes: reminding the user whether to save the target information.
  • the reminding the user whether to save the target information and the closing and deleting the target information further includes: prompting the user to input a password, where the password is used for verification The permission to save the information; determining whether the password input by the user is consistent with the predetermined password, the predetermined password is pre-agreed by the sender and the receiver of the information, and if the password input by the user is inconsistent with the predetermined password, then the user is closed and deleted.
  • the reminding the user whether to save the target information and the closing and deleting the target information further includes: prompting the user to input a password, where the password is used for verification The permission to save the information; determining whether the password input by the user is consistent with the predetermined password, the predetermined password is pre-agreed by the sender and the receiver of the information, and if the password input by the user is inconsistent with the predetermined password, then the user is closed and deleted.
  • Target information preferably, the reminding the user whether to save the target information and the closing and deleting the target information further includes:
  • the electronic device of the embodiment after the closing and deleting the target information, further includes: reminding the user that the information has been deleted.
  • Embodiments of the present application also disclose a non-volatile computer storage medium storing computer-executable instructions that, when executed by an electronic device, enable an electronic device to receive and display target information; Determining whether the target information carries a feature tag or determining whether an attribute setting of the target information is abnormal; if the target information carries a feature tag or an attribute setting abnormality of the target information, receiving the target information is closed After the instruction, the target information is closed and deleted.
  • the feature tag includes a preset character string.
  • the storage medium of this embodiment preferably receives a finger that closes the target information. After the command, and before the closing and deleting the target information, the method further includes: reminding the user whether to save the target information.
  • the reminding the user whether to save the target information and the closing and deleting the target information further includes prompting the user to input a password, where the password is used for verification and saving.
  • the authority of the information determining whether the password input by the user is consistent with the predetermined password, the predetermined password is pre-agreed by the sender and the receiver of the information, and if the password input by the user is inconsistent with the predetermined password, the target is closed and deleted. information.
  • the storage medium of the embodiment after the closing and deleting the target information, further includes: reminding the user that the information has been deleted.
  • the application also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer, The computer is caused to perform the method described in the above embodiments.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)

Abstract

一种信息处理方法、装置和电子设备,涉及信息安全领域,其中所述方法包括:接收并展示目标信息(S10);判断目标信息是否携带有特征标记或判断目标信息的属性设置是否异常(S20);若目标信息携带有特征标记或目标信息的属性设置异常,则在接收到关闭目标信息的指令后,关闭并删除目标信息(S30)。由此,该方法使得信息接收方仅能查看信息,不能保存及复制转发信息,防止了私密信息的泄露,增强了通过信息交流的安全性。

Description

一种信息处理方法、装置和电子设备
交叉引用
本申请要求在2016年03月29日提交中国专利局、申请号为201610187508.6、发明名称为“一种信息处理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息安全领域,具体涉及一种信息处理方法、装置和电子设备。
背景技术
信息通讯方式的普及,人们越来越多地通过发送信息的方式进行交流,如发送短信、彩信,在微信、QQ上发送文本信息、语音信息等。
目前人们通过信息交流的过程中,信息的接收方默认将接收到的信息保存,以便随时查看。
然而,若A向B发送私密信息,仅希望B查看,并不希望其保存供日后查看,则默认保存信息的方式往往使得A所发送的私密信息容易泄露,安全性差。
发明内容
本申请要解决的技术问题在于现有技术中信息发信人所发的私密信息容易泄露。
为此,本申请实施例提供一种信息处理方法,包括如下步骤:接收并展示目标信息;判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
优选地,所述特征标记包括预设字符串。
优选地,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:提醒用户是否保存所述目标信息。
优选地,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括:提醒用户输入密码,所述密码用于验证保存信息的权限;判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
优选地,在所述关闭并删除所述目标信息之后,还包括:提醒用户有信息已被删除。
相应地,本申请实施例还提供了一种信息处理装置,包括:接收单元,用于接收并展示目标信息;判断单元,用于判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;删除单元,用于在所述判断单元判断所述目标信息携带有特征标记或判断所述目标信息的属性设置异常时,在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
优选地,所述特征标记包括预设字符串。
优选地,所述装置还包括:第一提醒单元,用于在接收到关闭所述目标信息的指令后,在所述删除单元关闭并删除所述目标信息之前,提醒用户是否保存所述目标信息。
优选地,所述装置还包括:第二提醒单元,用于在所述第一提醒单元提醒用户是否保存所述目标信息与所述删除单元关闭并删除所述目标信息之间,提醒用户输入密码,所述密码用于验证保存信息的权限;密码确认单元,用于判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,并在判断用户输入的密码与所述预定密码不一致时,通知所述删除单元关闭并删除所述目标信息。
优选地,所述装置还包括:第三提醒单元,用于在所述删除单元关闭 并删除所述目标信息之后,提醒用户有信息已被删除。
本申请实施例又公开了一种电子设备,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够接收并展示目标信息;判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
优选地,所述特征标记包括预设字符串。
优选地,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:提醒用户是否保存所述目标信息。
优选地,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括:提醒用户输入密码,所述密码用于验证保存信息的权限;判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
优选地,在所述关闭并删除所述目标信息之后,还包括:提醒用户有信息已被删除。
本申请实施例还公开了一种非易失性计算机存储介质,所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够接收并展示目标信息;判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
优选地,所述特征标记包括预设字符串。
优选地,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:提醒用户是否保存所述目标信息。
优选地,在所述提醒用户是否保存所述目标信息与所述关闭并删除所 述目标信息之间,还包括提醒用户输入密码,所述密码用于验证保存信息的权限;判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
优选地,在所述关闭并删除所述目标信息之后,还包括:提醒用户有信息已被删除。
本申请还提供了一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任一所述的方法。
本申请实施例技术方案,具有如下优点:
1、本申请实施例提供的信息处理方法,接收并展示目标信息,判断目标信息是否携带有特征标记或判断目标信息的属性设置是否异常,若是,则在接收到关闭目标信息的指令后,关闭并删除目标信息,使得信息接收方仅能查看信息,不能保存及复制转发信息,防止了私密信息的泄露,增强了通过信息交流的安全性。
2、本申请实施例提供的信息处理方法,在接收到关闭目标信息的指令之后,且在关闭并删除目标信息之前,提醒用户是否保存目标信息,给具有特殊权限的人提供了信息保存及复制转发的途径,使得不同的信息接收方对目标信息具有不同的操作权限,增强了对信息的处理方式的灵活性。
3、本申请实施例提供的信息处理方法,在提醒用户是否保存目标信息与关闭并删除目标信息之间,提醒用户输入密码以验证保存信息的权限,判断用户输入的密码与预定密码是否一致,若不一致,则关闭并删除目标信息,能够防止目标信息被随意保存及复制转发,既保证了具有不同权限的信息接收方对信息处理方式的灵活性,又增强了该情况下信息的安全性。
4、本申请实施例提供的信息处理方法,在关闭并删除目标信息之后,提醒用户有信息已被删除,以帮助用户确认实际确有收到一条私密信息;而并不提醒用户信息的具体内容以及信息发送方等信息,确保信息安全性。
附图说明
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1A为本申请实施例1中信息处理方法的流程图;
图1B为本申请实施例1中信息处理方法的一个具体示例的流程图;
图2A为本申请实施例2中信息处理装置的原理框图;
图2B为本申请实施例2中信息处理装置的一个具体示例的原理框图。
图3为本申请实施例中电子设备的硬件结构示意图。
具体实施方式
下面将结合附图对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在本申请的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。
在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以 是直接相连,也可以通过中间媒介间接相连,还可以是两个元件内部的连通,可以是无线连接,也可以是有线连接。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。
本申请此外,下面所描述的本申请不同实施方式中所涉及的技术特征只要彼此之间未构成冲突就可以相互结合。
实施例1
本实施例提供一种信息处理方法,应用于可以接收信息的终端,也可以是计算机终端。所接收的信息可以是通过电信网络接收的短信/彩信信息,也可以是通过应用程序所接收的信息,如微信信息。如图1A所示,包括如下步骤:
S10:接收并展示目标信息。
例如,当收到私密信息时,终端并不立即保存该信息,只向用户提示有收到一条信息,并不直接显示信息内容,如“您已收到一条私密信息,请点击查看”。只有在用户点击打开该信息时,方能查看到信息的具体内容,此时终端才会接收并展示目标信息。
S20:判断目标信息是否携带有特征标记或判断目标信息的属性设置是否异常。若目标信息未携带有特征标记或目标信息的属性设置没有异常,则执行与现有的方案相同的步骤;若目标信息携带有特征标记或目标信息的属性设置有异常,则执行步骤S30。
例如,若信息发信方发送一条私密信息,则会在发送该信息时,同时为该信息发送一个特征标记。该特征标记包括预设字符串,如“%*%*%*”,或者,将该信息的属性设置为异常值,如将该信息的大小设置为无穷大,或者是预设字符串与信息属性设置的组合。
如果目标信息携带有特征标记,则证明该信息为信息发送方所发送的私密信息,不希望被泄露,需要将此信息删除。
S30:在接收到关闭目标信息的指令后,关闭并删除目标信息。
例如,在私密信息查看完毕后,用户点击关闭该信息的按钮或图标, 则发送了一条关闭该私密信息的指令。终端在接收到该指令之后,在关闭该私密信息的同时,会同时删除该私密信息。
本申请实施例提供的信息处理方法,接收并展示目标信息,判断目标信息是否携带有特征标记或判断目标信息的属性设置是否异常,若是,则在接收到关闭目标信息的指令后,关闭并删除目标信息,使得信息接收方仅能查看信息,不能保存及复制转发信息,防止了私密信息的泄露,增强了通过信息交流的安全性。
作为本实施例的一种优选实施方式,如图1B所示,上述步骤S30中,在接收到关闭目标信息的指令之后,且在关闭并删除目标信息之前,还包括如下步骤:
S31:提醒用户是否保存目标信息。
若信息发送方群发一条私密信息,希望仅部分人可以保存该私密信息用于复制、转发等,则在删除该私密信息前,提醒用户是否保存该私密信息。
S32:提醒用户输入密码,密码用于验证保存信息的权限。
信息接收方若要保存该私密信息,必须输入密码,若没有密码,则没有保存该私密信息的权限。
S33:判断用户输入的密码与预定密码是否一致,预定密码是信息的发送方与接收方预先约定的。若用户输入的密码与预定密码不一致,则执行步骤S34;若用户输入的密码与预定密码一致,则执行步骤S35。
S34:关闭并删除目标信息。
S35:关闭并保存目标信息。
例如,若信息发送方为A,其发送的私密信息保存密码为“qazwsxedc”,B和C均收到了A发送的该私密信息,而只有B有该私密信息的保存密码,C没有。则B和C虽然都收到了该私密信息,都能点击查看该信息,但是C不能够保存并复制、转发该信息;B可以在输入了正确的保存密码后保存该私密信息,从而可以复制、转发该信息。
优选地,目标信息被删除后,提醒用户有信息已被删除,以帮助用户 确认实际确有收到一条私密信息;而并不提醒用户信息的具体内容以及信息发送方等信息,确保信息安全性。
实施例2
本实施例提供一种信息处理装置,如图2A所示,包括接收单元10、判断单元20和删除单元30。
接收单元10,用于接收并展示目标信息。
判断单元20,用于判断目标信息是否携带有特征标记或判断目标信息的属性设置是否异常。特征标记包括预设字符串。
删除单元30,用于在判断单元判断目标信息携带有特征标记或判断目标信息的属性设置异常时,在接收到关闭目标信息的指令后,关闭并删除目标信息。
本申请实施例提供的信息处理装置,接收到的目标信息需要用户点击方能查看,若目标信息携带有特征标记,则在用户关闭目标信息后删除该目标信息,使得信息接收方仅能查看信息,不能保存及复制转发信息,防止了私密信息的泄露,增强了通过信息交流的安全性。
作为本实施例的一种优选实施方式,该信息处理装置还包括第一提醒单元31、第二提醒单元32和密码确认单元33。
第一提醒单元31,用于提醒用户是否保存目标信息。
第二提醒单元32,用于提醒用户输入密码,密码用于验证保存信息的权限。
密码确认单元33,用于判断用户输入的密码与预定密码是否一致,预定密码是信息的发送方与接收方预先约定的,并在判断用户输入的密码与所述预定密码不一致时,通知所述删除单元关闭并删除所述目标信息。
优选地,该信息提醒装置还包括第三提醒单元,用于在所述删除单元关闭并删除所述目标信息之后,提醒用户有信息已被删除。
实施例3
本申请实施例又公开了一种电子设备,包括至少一个处理器810;以及, 与所述至少一个处理器810通信连接的存储器800;其中,所述存储器800存储有可被所述至少一个处理器810执行的指令,所述指令被所述至少一个处理器810执行,以使所述至少一个处理器810能够接收并展示目标信息;判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。所述电子设备还包括与所述存储器800和所述处理器电连接的输入装置830和输出装置840,所述电连接优选为通过总线连接。
本实施例所述的电子设备,优选地,所述特征标记包括预设字符串。
本实施例所述的电子设备,优选地,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:提醒用户是否保存所述目标信息。
本实施例所述的电子设备,优选地,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括:提醒用户输入密码,所述密码用于验证保存信息的权限;判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
本实施例所述的电子设备,优选地,在所述关闭并删除所述目标信息之后,还包括:提醒用户有信息已被删除。
实施例4
本申请实施例还公开了一种非易失性计算机存储介质,所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够接收并展示目标信息;判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
本实施例所述的存储介质,优选地,所述特征标记包括预设字符串。
本实施例所述的存储介质,优选地,在接收到关闭所述目标信息的指 令之后,且在所述关闭并删除所述目标信息之前,还包括:提醒用户是否保存所述目标信息。
本实施例所述的存储介质,优选地,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括提醒用户输入密码,所述密码用于验证保存信息的权限;判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
本实施例所述的存储介质,优选地,在所述关闭并删除所述目标信息之后,还包括:提醒用户有信息已被删除。
实施例5
本申请还提供了一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述实施例所述的方法。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方 框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,上述实施例仅仅是为清楚地说明所作的举例,而并非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里无需也无法对所有的实施方式予以穷举。而由此所引伸出的显而易见的变化或变动仍处于本申请创造的保护范围之中。

Claims (21)

  1. 一种信息处理方法,其特征在于,包括如下步骤:
    接收并展示目标信息;
    判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;
    若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
  2. 根据权利要求1所述的信息处理方法,其特征在于,所述特征标记包括预设字符串。
  3. 根据权利要求1所述的信息处理方法,其特征在于,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:
    提醒用户是否保存所述目标信息。
  4. 根据权利要求3所述的信息处理方法,其特征在于,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括:
    提醒用户输入密码,所述密码用于验证保存信息的权限;
    判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
  5. 根据权利要求1-4中任一项所述的信息处理方法,其特征在于,在所述关闭并删除所述目标信息之后,还包括:
    提醒用户有信息已被删除。
  6. 一种信息处理装置,其特征在于,包括:
    接收单元,用于接收并展示目标信息;
    判断单元,用于判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;
    删除单元,用于在所述判断单元判断所述目标信息携带有特征标记或判断所述目标信息的属性设置异常时,在接收到关闭所述目标信息的指令 后,关闭并删除所述目标信息。
  7. 根据权利要求6所述的信息处理装置,其特征在于,所述特征标记包括预设字符串。
  8. 根据权利要求6所述的信息处理装置,其特征在于,还包括:
    第一提醒单元,用于在接收到关闭所述目标信息的指令后,在所述删除单元关闭并删除所述目标信息之前,提醒用户是否保存所述目标信息。
  9. 根据权利要求8所述的信息处理装置,其特征在于,还包括:
    第二提醒单元,用于在所述第一提醒单元提醒用户是否保存所述目标信息与所述删除单元关闭并删除所述目标信息之间,提醒用户输入密码,所述密码用于验证保存信息的权限;
    密码确认单元,用于判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,并在判断用户输入的密码与所述预定密码不一致时,通知所述删除单元关闭并删除所述目标信息。
  10. 根据权利要求6-9中任一项所述的信息处理装置,其特征在于,还包括:
    第三提醒单元,用于在所述删除单元关闭并删除所述目标信息之后,提醒用户有信息已被删除。
  11. 一种电子设备,其特征在于包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够
    接收并展示目标信息;
    判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;
    若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
  12. 根据权利要求11所述的电子设备,其特征在于,所述特征标记包括预设字符串。
  13. 根据权利要求11所述的电子设备,其特征在于,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:
    提醒用户是否保存所述目标信息。
  14. 根据权利要求13所述的电子设备,其特征在于,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括:
    提醒用户输入密码,所述密码用于验证保存信息的权限;
    判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
  15. 根据权利要求11-14中任一项所述的电子设备,其特征在于,在所述关闭并删除所述目标信息之后,还包括:
    提醒用户有信息已被删除。
  16. 一种非易失性计算机存储介质,其特征在于:所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够:
    接收并展示目标信息;
    判断所述目标信息是否携带有特征标记或判断所述目标信息的属性设置是否异常;
    若所述目标信息携带有特征标记或所述目标信息的属性设置异常,则在接收到关闭所述目标信息的指令后,关闭并删除所述目标信息。
  17. 根据权利要求16所述的存储介质,其特征在于,所述特征标记包括预设字符串。
  18. 根据权利要求16所述的存储介质,其特征在于,在接收到关闭所述目标信息的指令之后,且在所述关闭并删除所述目标信息之前,还包括:
    提醒用户是否保存所述目标信息。
  19. 根据权利要求18所述的存储介质,其特征在于,在所述提醒用户是否保存所述目标信息与所述关闭并删除所述目标信息之间,还包括:
    提醒用户输入密码,所述密码用于验证保存信息的权限;
    判断用户输入的密码与预定密码是否一致,所述预定密码是信息的发送方与接收方预先约定的,若用户输入的密码与所述预定密码不一致,则关闭并删除所述目标信息。
  20. 根据权利要求1-4中任一项所述的存储介质,其特征在于,在所述关闭并删除所述目标信息之后,还包括:提醒用户有信息已被删除。
  21. 一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,其特征在于,当所述程序指令被计算机执行时,使所述计算机执行上述任一权利要求所述的方法。
PCT/CN2016/096545 2016-03-29 2016-08-24 一种信息处理方法、装置和电子设备 WO2017166616A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610187508.6A CN105893870A (zh) 2016-03-29 2016-03-29 一种信息处理方法及装置
CN201610187508.6 2016-03-29

Publications (1)

Publication Number Publication Date
WO2017166616A1 true WO2017166616A1 (zh) 2017-10-05

Family

ID=57014590

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/096545 WO2017166616A1 (zh) 2016-03-29 2016-08-24 一种信息处理方法、装置和电子设备

Country Status (2)

Country Link
CN (1) CN105893870A (zh)
WO (1) WO2017166616A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117468A (zh) * 2018-08-01 2019-01-01 北京数字雷暴信息科技有限公司 一种数据处理方法和装置
CN110945508A (zh) * 2019-10-09 2020-03-31 中新智擎科技有限公司 一种信息保密处理方法、装置及门禁机器人、门禁系统
CN111191747A (zh) * 2018-11-15 2020-05-22 西安中兴新软件有限责任公司 信息管理方法、处理方法、设备及存储介质
CN111917592A (zh) * 2020-08-12 2020-11-10 中国工商银行股份有限公司 一种异构品牌网络设备的集中操作方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446717A (zh) * 2016-10-14 2017-02-22 深圳天珑无线科技有限公司 一种信息处理方法、装置及终端
CN107508799B (zh) * 2017-07-31 2018-12-04 珠海格力电器股份有限公司 一种基于即时通讯的信息呈现方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856919A (zh) * 2014-03-27 2014-06-11 宇龙计算机通信科技(深圳)有限公司 信息发送方法及装置和信息接收方法及装置
CN104066060A (zh) * 2014-06-26 2014-09-24 福州大学 移动终端即时通信的消息阅时保护与阅后即焚实现方法
WO2015143680A1 (zh) * 2014-03-27 2015-10-01 宇龙计算机通信科技(深圳)有限公司 信息发送方法及装置和信息接收方法及装置
WO2015143676A1 (zh) * 2014-03-27 2015-10-01 宇龙计算机通信科技(深圳)有限公司 信息发送方法及装置和信息接收方法及装置
CN105306443A (zh) * 2015-09-18 2016-02-03 四川效率源信息安全技术股份有限公司 基于完全离线的阅后即焚方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856919A (zh) * 2014-03-27 2014-06-11 宇龙计算机通信科技(深圳)有限公司 信息发送方法及装置和信息接收方法及装置
WO2015143680A1 (zh) * 2014-03-27 2015-10-01 宇龙计算机通信科技(深圳)有限公司 信息发送方法及装置和信息接收方法及装置
WO2015143676A1 (zh) * 2014-03-27 2015-10-01 宇龙计算机通信科技(深圳)有限公司 信息发送方法及装置和信息接收方法及装置
CN104066060A (zh) * 2014-06-26 2014-09-24 福州大学 移动终端即时通信的消息阅时保护与阅后即焚实现方法
CN105306443A (zh) * 2015-09-18 2016-02-03 四川效率源信息安全技术股份有限公司 基于完全离线的阅后即焚方法

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117468A (zh) * 2018-08-01 2019-01-01 北京数字雷暴信息科技有限公司 一种数据处理方法和装置
CN111191747A (zh) * 2018-11-15 2020-05-22 西安中兴新软件有限责任公司 信息管理方法、处理方法、设备及存储介质
CN111191747B (zh) * 2018-11-15 2023-09-01 西安中兴新软件有限责任公司 信息管理方法、处理方法、设备及存储介质
CN110945508A (zh) * 2019-10-09 2020-03-31 中新智擎科技有限公司 一种信息保密处理方法、装置及门禁机器人、门禁系统
CN111917592A (zh) * 2020-08-12 2020-11-10 中国工商银行股份有限公司 一种异构品牌网络设备的集中操作方法及装置

Also Published As

Publication number Publication date
CN105893870A (zh) 2016-08-24

Similar Documents

Publication Publication Date Title
WO2017166616A1 (zh) 一种信息处理方法、装置和电子设备
US20210264050A1 (en) Method and system for collaborative editing of a remotely stored document
US11307910B2 (en) Notification tagging for a workspace or application
US9462432B2 (en) Instant message transmitting and receiving system, terminal device and controlling method thereof
US10511601B2 (en) Security control method for social network user, social application device and terminal
US9712512B2 (en) Secure content messaging
WO2017166667A1 (zh) 一种移动终端锁屏消息推送方法、装置和电子设备
WO2017166707A1 (zh) 一种撤销发出的短信的方法、装置和电子设备
US12010515B2 (en) Security management on a mobile device
KR20150116228A (ko) 연락처를 관리하는 방법 및 이를 구현하는 전자장치
WO2015085906A1 (zh) 企业数据的保护方法和装置
TW201512855A (zh) 雲端儲存伺服器及其管理方法
WO2016019793A1 (zh) 信息的监控方法、装置和移动终端
WO2022205906A1 (zh) 数据加密方法、装置、电子设备及存储介质
JP2012168616A (ja) メール誤配信防止装置、メール誤配信防止方法及びメール誤配信防止プログラム
KR20160031281A (ko) 인증을 처리하는 방법 및 이를 제공하는 전자 장치와 서버
WO2017166611A1 (zh) 一种媒体文件删除方法、装置和电子设备
WO2015184883A1 (zh) 一种短信处理方法及装置
WO2015143676A1 (zh) 信息发送方法及装置和信息接收方法及装置
WO2016177246A1 (zh) 一种消息处理方法及装置
KR101547995B1 (ko) 개인정보보안이 강화된 메시지 서비스 시스템
WO2013010187A1 (en) Method and system for private electronic messaging
WO2017166730A1 (zh) 移动终端联系人数据管理方法、装置和电子设备
JP5735189B1 (ja) サーバ装置
WO2015143680A1 (zh) 信息发送方法及装置和信息接收方法及装置

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896388

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896388

Country of ref document: EP

Kind code of ref document: A1