CN109492430A - A kind of internet Keywork method for secret protection and device based on obfuscated manner - Google Patents

A kind of internet Keywork method for secret protection and device based on obfuscated manner Download PDF

Info

Publication number
CN109492430A
CN109492430A CN201811277941.4A CN201811277941A CN109492430A CN 109492430 A CN109492430 A CN 109492430A CN 201811277941 A CN201811277941 A CN 201811277941A CN 109492430 A CN109492430 A CN 109492430A
Authority
CN
China
Prior art keywords
keyword
search
module
obscure
initialization module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811277941.4A
Other languages
Chinese (zh)
Inventor
姚正
朱万春
徐斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu East Wisdom Data Technology Ltd By Share Ltd
Original Assignee
Jiangsu East Wisdom Data Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu East Wisdom Data Technology Ltd By Share Ltd filed Critical Jiangsu East Wisdom Data Technology Ltd By Share Ltd
Priority to CN201811277941.4A priority Critical patent/CN109492430A/en
Publication of CN109492430A publication Critical patent/CN109492430A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a kind of internet Keywork method for secret protection and device based on obfuscated manner, belongs to computer information processing field.Search initialization module will be sent to using keyword obscures keyword generation module, and N number of additional keyword is obscured according to using the format of keyword to generate, search service provider obtains desired search result from confusion result receiving module according to using keyword and obscuring keyword generation search result.Usefulness of the present invention is: being received by search initialization module and uses keyword, by obscuring, keyword generation module generation is multiple to obscure keyword, and keyword will be used and obscure keyword and be sent collectively to search service provider, and multiple search results are generated by search service provider, the search result of needs is then found out by search initialization module, the principle of the invention is clear, easy to operate, can effectively reduce the probability that privacy of user is leaked.

Description

A kind of internet Keywork method for secret protection and device based on obfuscated manner
Technical field
The present invention relates to a kind of internet Keywork method for secret protection and device based on obfuscated manner, belongs to computer Field of information processing.
Background technique
In current web universe, there are the situations of a large amount of privacy abuse.For example it is searched by what main stream website platform inputted Rope keyword, once completing hunting action, used keyword will soon be by the advertisement as other related web site platforms It launches keyword to be used, be often the case that, you search for " sport footwear " in search engine, can be in the corresponding push of other websites In advertisement occur be directed to " sport footwear " advertisement pushing, form directed entirely to privacy utilize.For keyword presenter's For privacy, it may be said that problem is quite serious, in view of the above-mentioned problems, occurring a variety of guard methods in industry, also to solve face The problem of facing.
Such as application No. is 201310308414.6, a kind of patent name are as follows: efficient secret protection ciphertext under cloud environment The patent of invention of querying method, this patent need data set provider and cloud using one to achieve the purpose that secret protection The interaction design of cause completes secret protection, cannot achieve unilateral secret protection.
For another example application No. is 201310275303.X, patent names are as follows: one kind protects internet by third-party platform The method of privacy of user, this patent complete secret protection using third-party mode, belong to it is a kind of be actively engaged in many ways and The Privacy Preservation Mechanism of mutual trust equally cannot achieve unilateral secret protection.
In order to achieve the purpose that protect privacy of user in industry, Obfuscating Algorithms are developed, Obfuscating Algorithms are exactly to issuing out The program gone is reorganized and is handled, so that treated code and code completes identical function before handling, and obscure Code afterwards is difficult to be difficult to obtain the real semanteme of program decompiling success by decompiling.The program generation being confused Code, still in accordance with original File Format and instruction set, implementing result also with obscure before, only obfuscator will be in code All variables, function, class title become brief English alphabet code name, in the condition for lacking corresponding function name and program annotation Under, even if will be also difficult to read by decompiling.It is irreversible for obscuring simultaneously, some during obscuring not influence normally The information of operation will permanently lose, and the loss of these information becomes more difficult to understand program.
This patent uses internet Keywork method for secret protection and device based on obfuscated manner, is mentioned with solving keyword The problem of privacy out is leaked.
Summary of the invention
The technical problems to be solved by the present invention are: providing a kind of internet Keywork secret protection based on obfuscated manner Method and apparatus, to solve the problems, such as that the privacy of keyword presenter is leaked.
In order to solve the above-mentioned technical problem, the present invention is achieved by the following technical solutions: one kind being based on obfuscated manner Internet Keywork method for secret protection, method includes the following steps:
The parameter N for obscuring keyword generation module is arranged in S1, searchers according to actual needs, and parameter N is used to describe degree of aliasing, mix Keyword generation module of confusing, which is also connected to, to be obscured on wordbook.
S2, searchers access search initialization module, and searchers uses keyword, search to the input of search initialization module Initialization module loads searched page, and search initialization module will be sent to using keyword obscures keyword generation module;
S3, obscure keyword generation module reading and obscure wordbook, and is multiple additional according to using the format of keyword to generate Obscure keyword, and keyword radom insertion will be used to obscure in keyword to multiple, the insertion position using keyword is to sit Coordinate is returned to search initialization module by mark, then will be used keyword and be obscured keyword and send jointly to confusion result and connect Receive module;
S4, confusion result receiving module access search service provider, obtain search service provider according to use keyword and All all search results for obscuring keyword generation.
S5, search initialization module obtain desired inspection from confusion result receiving module according to keyword and coordinate is used Rope is as a result, remaining search result is then abandoned by confusion result receiving module.
A kind of internet Keywork privacy protection device based on obfuscated manner, including obscure keyword generation module, mix Confuse wordbook, search initialization module, confusion result receiving module.
The keyword generation module of confusing is connected together with wordbook is obscured.
Compared with prior art, usefulness of the present invention is: being received by search initialization module and uses keyword, led to Cross obscure keyword generation module generate it is multiple obscure keyword, and keyword will be used and obscure keyword and be sent collectively to search Rope service provider, and multiple search results are generated by search service provider, then found out by search initialization module The search result needed, the principle of the invention is clear, easy to operate, can effectively reduce the probability that privacy of user is leaked.
Detailed description of the invention:
The following further describes the present invention with reference to the drawings.
Fig. 1 is structural schematic diagram of the invention.
Specific embodiment:
With reference to the accompanying drawing and specific embodiment the present invention will be described in detail: one kind as shown in Figure 1 be based on the side of obscuring The internet Keywork method for secret protection of formula, method includes the following steps:
The parameter N for obscuring keyword generation module 2 is arranged in S1, searchers 1 according to actual needs, and parameter N is used to describe degree of aliasing, Obscure keyword generation module 2 and be also connected to and obscures on wordbook 3.
S2, searchers 1 access search initialization module 4, and searchers 1 uses keyword to the input of search initialization module 4 5, search initialization module 4 loads searched page, and search initialization module 4 will be sent to using keyword 5 obscures keyword life At module 2;
S3, obscure the reading of keyword generation module 2 and obscure wordbook 3, and is multiple additional according to using the format of keyword 5 to generate Obscure keyword 6, and 5 radom insertion of keyword will be used to obscure in keyword 6 to multiple, and use the insertion position of keyword 5 It is set to coordinate 7, coordinate 7 is returned into search initialization module 4, then keyword 5 will be used and obscure keyword 6 and sent jointly to Confusion result receiving module 8;
S4, confusion result receiving module 8 access search service provider 9, obtain search service provider 9 according to using keyword 5 and it is all obscure keyword 6 generation all search results 10.
S5, search initialization module 4 obtain from confusion result receiving module 8 and want according to keyword 5 and coordinate 7 is used Search result 10 neutralize it is relevant using keyword 5 as a result, in search result 10 remaining search result 10 then by obscure knot Fruit receiving module 8 abandons.
In use, searchers 1 sets using keyword 5 first, then keyword life is obscured in setting according to actual needs At the parameter N of module 2.
Then keyword 5 will be used to be input in search initialization module 4, search initialization module 4 is received using pass After keyword 5, search initialization module 4 will be then conveyed to using keyword 5 obscures keyword generation module 2.
Obscure keyword generation module 2 and receive and obscure wordbook 3 using after keyword 5, then recalling reading, passes through Obscure wordbook 3 according to use the format of keyword 5 generate it is N number of it is additional obscure keyword 6, and keyword 5 will be used to be inserted into To obscuring in keyword 6, and calculates and obscuring the coordinate 7 in keyword 6 using keyword 5.
Then obscuring keyword generation module 2 is sent to search initialization module 4 for coordinate 7, will also use 5 He of keyword It is multiple to obscure keyword 6 and be sent to confusion result receiving module 8.
Confusion result receiving module 8 will then use keyword 5 and multiple obscure keyword 6 and send jointly to search service Provider 9, and generate multiple search results 10 by search service provider 9, and search service provider 9 is by multiple inspections of generation Hitch fruit 10 is sent back to confusion result receiving module 8.
Simultaneously scan for the search result that initialization module 4 reads needs according to coordinate 7 from confusion result receiving module 8 10, remaining search result 10 is abandoned.
Thus by one using keyword 5 generate it is multiple obscure keyword 6, and it is more that keyword 5 will be used to be inserted in It is a to obscure in keyword 6, and remember the coordinate 7 using keyword 5, keyword 5 will be used and multiple obscure 6 one starting of keyword Give search service provider 9, while generating multiple search results 10, it would be desirable to search result 10 can be mixed in all inspections In hitch fruit 10, such search initialization module 4 will read the inspection of needs according to coordinate 7 from confusion result receiving module 8 Hitch fruit 10, remaining search result 10 are abandoned, so that the use that search initialization module 4 will cannot find out client is closed Keyword 5, to effectively raise the safety of user's search.
It is emphasized that: the above is only presently preferred embodiments of the present invention, not make in any form to the present invention Limitation, any simple modification, equivalent change and modification to the above embodiments according to the technical essence of the invention, All of which are still within the scope of the technical scheme of the invention.

Claims (3)

1. a kind of internet Keywork method for secret protection based on obfuscated manner, which is characterized in that this method includes following step It is rapid:
The parameter N for obscuring keyword generation module (2) is arranged in S1, searchers (1) according to actual needs, and parameter N is used to describe to mix Degree of confusing is obscured keyword generation module (2) and is also connected to and obscures on wordbook (3);
S2, searchers (1) access search initialization module (4), and searchers (1) inputs to search initialization module (4) using pass Keyword (5), search initialization module (4) load searched page, and search initialization module (4) will use keyword (5) to be sent to Obscure keyword generation module (2);
S3, obscure keyword generation module (2) read obscure wordbook (3), and according to use keyword (5) format generate it is more A additional obscures keyword (6), and keyword (5) radom insertion will be used to obscure in keyword (6) to multiple, uses key The insertion position of word (5) be coordinate (7), coordinate (7) is returned to search initialization module (4), then will use keyword (5) and Obscure keyword (6) and sends jointly to confusion result receiving module (8);
S4, confusion result receiving module (8) access search service provider (9) obtain search service provider (9) according to using Keyword (5) and all search results (10) for obscuring keyword (6) generation;
S5, search initialization module (4) are obtained according to keyword (5) and coordinate (7) is used from confusion result receiving module (8) Desired search result (10) neutralizes related using keyword (5) as a result, remaining search result in search result (10) (10) it is then abandoned by confusion result receiving module (8).
2. a kind of internet Keywork privacy protection device based on obfuscated manner, it is characterised in that: raw including obscuring keyword At module (2), obscure wordbook (3), search initialization module (4), confusion result receiving module (8).
3. the internet Keywork privacy protection device according to claim 2 based on obfuscated manner, it is characterised in that: institute It states keyword generation module of confusing (2) and is connected together with wordbook (3) is obscured.
CN201811277941.4A 2018-10-30 2018-10-30 A kind of internet Keywork method for secret protection and device based on obfuscated manner Pending CN109492430A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811277941.4A CN109492430A (en) 2018-10-30 2018-10-30 A kind of internet Keywork method for secret protection and device based on obfuscated manner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811277941.4A CN109492430A (en) 2018-10-30 2018-10-30 A kind of internet Keywork method for secret protection and device based on obfuscated manner

Publications (1)

Publication Number Publication Date
CN109492430A true CN109492430A (en) 2019-03-19

Family

ID=65691660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811277941.4A Pending CN109492430A (en) 2018-10-30 2018-10-30 A kind of internet Keywork method for secret protection and device based on obfuscated manner

Country Status (1)

Country Link
CN (1) CN109492430A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733196A (en) * 2021-04-02 2021-04-30 之江实验室 Privacy protection method and system for resisting member reasoning attack based on vector confusion

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462285A (en) * 2014-11-28 2015-03-25 广东工业大学 Privacy protection method for mobile service inquiry system
CN106096439A (en) * 2016-06-03 2016-11-09 武汉大学 A kind of intimacy protection system obscured based on mobile user profile and method
CN107358115A (en) * 2017-06-26 2017-11-17 浙江大学 A kind of multiattribute data for considering practicality goes privacy methods
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
EP3358875A1 (en) * 2017-02-03 2018-08-08 Alcatel Lucent Method for protecting privacy in data queries

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462285A (en) * 2014-11-28 2015-03-25 广东工业大学 Privacy protection method for mobile service inquiry system
CN106096439A (en) * 2016-06-03 2016-11-09 武汉大学 A kind of intimacy protection system obscured based on mobile user profile and method
EP3358875A1 (en) * 2017-02-03 2018-08-08 Alcatel Lucent Method for protecting privacy in data queries
CN107358115A (en) * 2017-06-26 2017-11-17 浙江大学 A kind of multiattribute data for considering practicality goes privacy methods
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733196A (en) * 2021-04-02 2021-04-30 之江实验室 Privacy protection method and system for resisting member reasoning attack based on vector confusion

Similar Documents

Publication Publication Date Title
Bhasin et al. Hardware Trojan horses in cryptographic IP cores
Craigen et al. Defining cybersecurity
EP3000068B1 (en) Protecting data
Kaur et al. Empirical analysis of web attacks
Pedreira et al. A review of attacks, vulnerabilities, and defenses in industry 4.0 with new challenges on data sovereignty ahead
Gao et al. Android malware detection via graphlet sampling
US20190362102A1 (en) Techniques for masking electronic data
Altulaihan et al. A survey on web application penetration testing
US20200074105A1 (en) Remote file storage with multiple access levels
CN108881230B (en) Secure transmission method and device for government affair big data
US8490861B1 (en) Systems and methods for providing security information about quick response codes
US20160210339A1 (en) Similarity determination apparatus, similarity determination method, and computer-readable recording medium
Mauri et al. Stride-ai: An approach to identifying vulnerabilities of machine learning assets
Jiang et al. Strongly separable codes
DeSombre et al. Countering cyber proliferation: Zeroing in on Access-as-a-Service
CN109492430A (en) A kind of internet Keywork method for secret protection and device based on obfuscated manner
MacGregor Pelikánová et al. The misleading perception of the purpose of the protection against misleading advertising by the EU law and its impact on the Czech Republic
Fehling-Kaschek et al. A systematic tabular approach for risk and resilience assessment and Improvement in the telecommunication industry
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
CN116992052A (en) Long text abstracting method and device for threat information field and electronic equipment
US20200033839A1 (en) Rule-based communicating of equipment data from an industrial system to an analysis system using uni-directional interfaces
CN106817216A (en) A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm
CN110990848A (en) Sensitive word encryption method and device based on hive data warehouse and storage medium
CN108134799B (en) Novel coding and decoding method and device thereof
Amjadian et al. Attended-over distributed specificity for information extraction in cybersecurity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190319