WO2018209897A1 - 敏感信息展示方法、装置、存储介质和计算机设备 - Google Patents

敏感信息展示方法、装置、存储介质和计算机设备 Download PDF

Info

Publication number
WO2018209897A1
WO2018209897A1 PCT/CN2017/108284 CN2017108284W WO2018209897A1 WO 2018209897 A1 WO2018209897 A1 WO 2018209897A1 CN 2017108284 W CN2017108284 W CN 2017108284W WO 2018209897 A1 WO2018209897 A1 WO 2018209897A1
Authority
WO
WIPO (PCT)
Prior art keywords
location data
sensitive information
current location
terminal
security
Prior art date
Application number
PCT/CN2017/108284
Other languages
English (en)
French (fr)
Inventor
陈秋红
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2018209897A1 publication Critical patent/WO2018209897A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the present application relates to the field of information security technologies, and in particular, to a method, device, storage medium, and computer device for displaying sensitive information.
  • smart terminals With the development and popularization of smart terminals, people's lives have become convenient. More and more users are accustomed to storing sensitive information in smart terminals, such as diaries, privacy photos, bank card information, and so on. Therefore, it is very important for smart terminals to perform security verification on users before displaying sensitive information. At present, smart terminals can set security authentication such as passwords, fingerprints, and faces at some sensitive information entrances to ensure the security of sensitive information of users.
  • a method, apparatus, storage medium, and computer device for displaying sensitive information are provided.
  • a method for displaying sensitive information includes: receiving a display instruction for sensitive information; acquiring current location data of the terminal according to the display instruction of the sensitive information; comparing the current location data with the pre- Whether the set security location data matches; and when the current location data matches the preset secure location data, the sensitive information is displayed on the terminal.
  • a sensitive information display device comprising: a display instruction receiving module, configured to receive a display instruction for sensitive information; and a current location data obtaining module, configured to acquire current location data of the terminal according to the display instruction for the sensitive information; a current location data matching module, configured to compare whether the current location data and the preset security location data match; and a sensitive information display module, configured to: when the current location data and the preset security location data match, in the terminal The sensitive information is shown on the display.
  • a computer device comprising a memory and one or more processors, the memory storing computer readable instructions, the computer readable instructions being executed by the processor, causing the one or more processors to execute The following steps: receiving a display instruction for sensitive information; acquiring current location data of the terminal according to the display instruction of the sensitive information; comparing whether the current location data and the preset security location data match; and when the current location data and When the preset security location data matches, the sensitive information is displayed on the terminal.
  • One or more non-transitory readable storage mediums storing computer readable instructions, when executed by one or more processors, cause the one or more processors to perform the steps of: receiving And displaying the current location data of the terminal according to the display instruction of the sensitive information; comparing whether the current location data and the preset security location data match; and when the current location data and the preset security When the location data matches, the sensitive information is displayed on the terminal.
  • 1 is an application environment diagram of a method for displaying sensitive information in an embodiment
  • FIG. 2 is a flow chart of a method for displaying sensitive information in an embodiment
  • FIG. 3 is a flow chart of a method for displaying sensitive information in another embodiment
  • FIG. 4 is a structural block diagram of a sensitive information display device in an embodiment
  • FIG. 5 is a structural block diagram of a sensitive information display apparatus in another embodiment
  • Figure 6 is a diagram showing the internal structure of a terminal in an embodiment.
  • terminal 110 can be located by signaling with positioning background 120.
  • the terminal 110 includes, but is not limited to, a device having a positioning function such as a mobile phone, a tablet computer, a portable notebook, or a smart wearable device.
  • the positioning background 120 is configured to provide the current location data of the terminal 110 to the terminal 110.
  • the positioning background 110 may include, but is not limited to, a positioning background by means of GPS (Global Positioning System) positioning, Beidou positioning, Wi-Fi positioning, and the like.
  • the terminal 110 stores sensitive information, wherein the sensitive information may be data including sensitive information, including but not limited to short messages, diaries, privacy photos, and bank card information.
  • the terminal 110 Before displaying the sensitive information, the terminal 110 can connect to the positioning background 120 through signal transmission, and receive the geographical location data of the terminal 110 that is located in the positioning background 120. Comparing whether the current location data and the preset security location data match; when the current location data matches the preset security location data, the sensitive information is displayed on the terminal.
  • a method for displaying sensitive information comprising:
  • Step S202 receiving a display instruction for sensitive information.
  • Sensitive information means that when it is consulted by a non-target audience, it will be the owner or phase of the information. Information about the loss caused by the object. Sensitive information includes, but is not limited to, a combination of one or more of text, images, videos, and web links, such as text messages, diaries, privacy photos, and bank card information.
  • the sensitive information may be part or all of the data stored in the terminal, or the data obtained from the server may be used as sensitive information, such as the balance of the bank account queried after the terminal is connected to the network.
  • the method before triggering the display instruction for the sensitive information, the method further includes receiving an operation instruction of the user, and determining whether the information related to the operation instruction belongs to the preset sensitive information, and if yes, triggering the display instruction for the sensitive information.
  • the operation instruction includes an operation instruction for performing a password change, a payment request, a view of media information such as a picture or a short message, and the like. For example, after receiving the operation instruction of the user's password change, it can be determined that the operation of changing the password involves sensitive information, that is, password information, and thus triggers the display instruction of the sensitive information.
  • the terminal includes a touch screen, such as a capacitive screen or an electronic screen, and a corresponding command can be generated by receiving a click operation on a control displayed on the touch screen.
  • the terminal may provide a corresponding interface for the sensitive information to be displayed, and the interface includes a corresponding control for receiving the display instruction for the sensitive information, and triggering the display instruction for the sensitive information when detecting the click operation acting on the control .
  • the corresponding display instruction for sensitive information is triggered without providing corresponding controls to simplify the operation of displaying sensitive information.
  • the terminal may detect the display operation performed by the user, and determine whether the display object affected by the display operation includes a preset sensitive information to be displayed, and if so, the instruction corresponding to the display operation is Display instructions for sensitive information.
  • Step S204 Acquire current location data of the terminal according to the display instruction of the sensitive information.
  • a positioning system is preset in the terminal. After the terminal receives the display instruction for the sensitive information, the terminal may trigger the positioning system, and may transmit the signal to the positioning background to obtain the current location data corresponding to the geographical location where the terminal is located.
  • the current location data includes, but is not limited to, two-dimensional position data composed of longitude and latitude, or three-dimensional position data composed of longitude, latitude, and altitude.
  • the terminal can be built with a SIM (Subscriber Identification Module) card, and the GPS signal is transmitted to the GPS satellite positioning background to achieve positioning.
  • SIM Subscriber Identification Module
  • the terminal can be built with the Beidou satellite navigation receiver chip, by receiving signals transmitted by the satellite, and passing through According to the distance formula in the three-dimensional coordinates, the latitude and longitude and elevation of the terminal can be obtained.
  • the terminal may also acquire data corresponding to the location of the terminal in real time or at a preset time interval when the display operation of the sensitive information is not received, and use the data acquired each time as the current location data. Therefore, the time for the terminal to acquire the current location data after the request is reduced, and the efficiency of displaying the sensitive information by the terminal is improved.
  • Step S206 comparing whether the current location data and the preset security location data match. If yes, go to step S208; otherwise, go to step S210.
  • the preset security location data also includes but is not limited to two-dimensional location data composed of longitude and latitude, or three-dimensional position data composed of longitude, latitude and altitude, and the like. combination.
  • the security location data is pre-configured in the terminal, and can be compared with the current location data fed back to the terminal by the received positioning background.
  • the preset security location data may be data corresponding to one or more security locations located by specific latitude and longitude. When the current location of the terminal coincides with the security location located by the specific latitude and longitude, the current location data and the pre-determination are determined. Set the security location data to match.
  • the preset security location data may also be data corresponding to one or more security zones, wherein the security zone may be a security zone centered on a specific latitude and longitude corresponding to the location and radiused by a preset safety distance, such as The location of the office seat is set to a specific safe location. When the distance between the location corresponding to the current location data and the office seat is less than or equal to the security distance, it is determined that the current location data matches the preset security location data.
  • the security area may be a range of irregular areas, such as a certain building, a certain cell, etc., and when the location corresponding to the current location data is within the range, it is determined that the current location data matches the preset security location data.
  • Step S208 displaying sensitive information on the terminal.
  • the manner of displaying sensitive information includes, but is not limited to, displaying a combination of one or more data types of text, pictures, videos, and webpage link data stored in the terminal on the display screen of the terminal, or acquiring text from the server through terminal networking, A combination of one or more data types, such as pictures, videos, and web page link data, wherein the server includes, but is not limited to, an application server or a web server. For example, when the current location data matches the preset secure location data, the user can log in to the online bank through the browser on the terminal to view the account balance.
  • step S210 no sensitive information is displayed.
  • the terminal may provide a corresponding interface for the sensitive information to be displayed, where the interface includes a corresponding control for receiving the display instruction for the sensitive information, where the current location data and the preset security location data do not match.
  • the click operation on the control cannot trigger the display of sensitive information.
  • the terminal may display the prompt information that the terminal is not in the secure location, for example, when the current location data and the preset secure location data do not match, the click operation of the control for receiving the display instruction for the sensitive information is received. After that, the information box that is not in the safe location is popped up, and after a preset time, for example, after 2 seconds, the interface for displaying sensitive information is returned.
  • a shielding layer may be disposed on the display location corresponding to the sensitive information, and the shielding layer is used to block the display of the sensitive information.
  • the moving position of the sensitive information on the display screen can be obtained in real time, and the shielding layer is correspondingly moved to block the sensitive information in real time;
  • the entire interface is shielded, such as blurring the interface containing sensitive information, so that the user cannot clearly view the sensitive information. Or encrypting the sensitive information and displaying it in the form of cipher text, so that the user cannot directly view the sensitive information.
  • the terminal is preset with a corresponding password verification device, and the method for displaying the sensitive information further includes the step of password verification.
  • the terminal may provide a corresponding password verification interface for the step of password verification, and the interface may include a corresponding control for receiving the password verification instruction, and when receiving the password verification instruction, such as receiving a click operation on the corresponding control, Perform the password verification step.
  • the method of password verification includes, but is not limited to, verification by a password, a fingerprint, a face, and the like.
  • the password may be a combination of one or more of numbers, letters or other characters having a preset length.
  • the fingerprint can be collected through the fingerprint collection device built in the terminal. Faces can be built into the face recognition device built into the terminal
  • the order of the password verification step is not limited.
  • the terminal enters the password verification interface, prompts the user to perform password verification, and obtains the current location data of the terminal after the password verification is passed. If not, the user is prompted to verify the password and cannot view the sensitive information.
  • the terminal can display a password verification interface for password verification.
  • the current location data and secure location data matching steps and password verification steps can be performed simultaneously.
  • the preset location data is used to verify the current location data of the terminal when the display instruction for the sensitive information is received, and the corresponding sensitive information can be displayed only when the current location data matches the security location data. Because the geographical location data is too rich, it is difficult for the cracker to perform the traversal operation to obtain the secure location data, which improves the difficulty of cracking sensitive information. Moreover, the geographical location data is determined by positioning, and the user does not need to manually input for verification, thereby improving the convenience of displaying sensitive information.
  • the current location data fed back to the terminal by the received location background is compared with all preset security locations, and any one of the current location data and the secure location data is secure.
  • the location data is matched to display sensitive information corresponding to the display instructions.
  • a list of secure location data can be presented and a set operation that acts on more than one secure location data in the list can be received.
  • the setting operations include, but are not limited to, adding secure location data, deleting secure location data, or changing secure location data.
  • the terminal may perform a secure location recommendation on the user according to the duration and/or frequency at which the terminal stays at different geographic locations.
  • the location may be recommended to the user as a secure location when the terminal is in a certain geographic location for a longer period of time than the preset duration. For example, when the user averages more than three hours per day in a restaurant for five consecutive days, the location of the hotel is recommended to the user as a secure location.
  • the secure location corresponding to the secure location data includes a secure point location, which may be a specific point location consisting of longitude and latitude, or a specific point location of the three-dimensional location data combination consisting of longitude, latitude, and altitude.
  • the sensitive information can be displayed on the terminal when the current location corresponding to the current location data of the terminal is at the location.
  • the security location corresponding to the security location data includes a security zone location, wherein the security zone location may be a security zone bit centered on a specific latitude and longitude corresponding location
  • the current position data corresponding to the current position data is determined to match the preset safety distance data when the distance from the center of the circle is less than the preset safety distance.
  • the location of the security zone may be an area of an irregular area, such as a certain building, a certain cell, etc., when the location corresponding to the current location data is within the range, determining that the current location data matches the preset security location data .
  • the location sequence corresponding to the geographical location may also be used as the location of the security zone, including but not limited to the zip code.
  • the zip code corresponding to the security location is 518000, and when the location of the terminal is detected in the Luohu zone of Shenzhen, the current The location data matches the preset security location data.
  • the sensitive information may be classified according to its sensitivity or sensitive type.
  • the method for displaying sensitive information further includes:
  • Step S205 reading the security location data corresponding to the security level of the sensitive information.
  • Each sensitive information has a corresponding security level, and each security level has corresponding security location data.
  • the terminal may read the security level of the corresponding sensitive information according to the display instruction of the sensitive information, and read the corresponding security location data according to the security level.
  • Step S206 includes comparing whether the current location data and the security location data corresponding to the security level of the sensitive information match, and if so, displaying the corresponding sensitive information.
  • the security location data corresponding to the security level may include the same security location data as the security level, or may also be the security location data that is the same as the security level and higher than the security level.
  • the terminal Show privacy photos, bank card information and text messages.
  • the terminal can display the bank card information and the short message but not Can display privacy photos.
  • the sensitive information that the terminal can display is a short message, and the privacy photo and the bank card information cannot be displayed.
  • step S206 includes reading the security location data corresponding to the security level of the sensitive information.
  • the terminal can read the security level of the corresponding sensitive information according to the display instruction of the sensitive information, and read the corresponding security location data according to the security level, and match the current location data with the corresponding security location data, if matched, Then perform the corresponding password verification.
  • the terminal Before displaying sensitive information, the terminal may have corresponding password verification methods in different geographical locations. For example, a complex password authentication method is adopted in a public place, and the sensitive information is displayed when the password verification is passed. For example, when the current location is in your home, the user can view the privacy photo by sliding to unlock. When the current location is in the office, the user can check the privacy photo by entering a password for password verification. The current location is in the frequent coffee shop, the user You can view your privacy photos with fingerprint password verification.
  • a complex password authentication method is adopted in a public place, and the sensitive information is displayed when the password verification is passed.
  • the user can view the privacy photo by sliding to unlock.
  • the user can check the privacy photo by entering a password for password verification.
  • the current location is in the frequent coffee shop, the user You can view your privacy photos with fingerprint password verification.
  • the sensitive information is divided into security levels, and the corresponding security location data with security level is set, or the corresponding password verification mode is set according to the security level of the security location data, so that the sensitive information is better hierarchically managed and improved.
  • Protect sensitive information is not limited to any security level.
  • the location data of the connection terminal connected by the terminal in short-range wireless communication mode is acquired, and the location data of the connection terminal is used as the current location data of the terminal.
  • short-range wireless communication methods include, but are not limited to, wireless communication methods such as Bluetooth, Wi-Fi, NFC (Near Field Communication).
  • the terminal may obtain the current location data of the terminal by using a Wi-Fi positioning manner, where the current location data may be the number of locations corresponding to the location where the Wi-Fi identifier of the Wi-Fi connected to the terminal is located.
  • the Wi-Fi logo is an identification of a Wi-Fi-enabled signal source, including but not limited to a cell phone, a router, a notebook, and the like.
  • the terminal itself When the terminal itself is not in a secure location, it is still determined that the current location data of the terminal matches the security location data, and the corresponding information can be displayed. Sensitive information.
  • the area covered by the Wi-Fi sent by the Wi-Fi identifier may be used as a secure location, and when the terminal is connected to the Wi-Fi, it may be determined that the current location data of the terminal matches the secure location data.
  • the sensitive information includes payment information; the presentation instructions include display instructions for the payment information generated in accordance with the payment request.
  • the payment request is a request for performing a payment operation, and the payment information is sensitive information involved in performing a payment operation, such as an account balance, a payment amount, a bank card account number, and the like.
  • the corresponding display instruction for the payment information may be generated according to the payment request, and the current location data and the preset security location data are compared according to the display instruction, for example, the current location data corresponding to the current location data of the terminal may be calculated.
  • the distance between the location and the specific security location corresponding to each preset specific security location data detecting whether each calculated distance is within a preset safety distance of the corresponding security location, and if so, displaying the payment information. And make a payment operation.
  • the password verification may be performed before calculating the distance between the current location information and each preset specific security location, or before performing the payment operation, where the password verification manner includes but is not limited to by password, fingerprint, The face is verified, and after the password verification is passed, the next step is performed.
  • a sensitive information display device comprising:
  • the instruction receiving module 402 is configured to receive a display instruction for sensitive information.
  • the current location data obtaining module 404 is configured to obtain current location data of the terminal according to the display instruction for the sensitive information.
  • the current location data matching module 406 is configured to compare whether the current location data and the preset security location data match.
  • the sensitive information display module 408 is configured to match the current location data and the preset secure location data. Display sensitive information on the terminal.
  • the preset security location data includes more than one security location data
  • the current location data matching module 406 is further configured to compare whether any one of the current location data and the preset security location data matches.
  • the security location corresponding to the security location data includes a security zone location
  • the current location data matching module 406 is further configured to compare whether the current location corresponding to the current location data is within the secure zone location.
  • the sensitive information includes more than one sensitive information.
  • the sensitive information display device further includes:
  • the secure location data reading module 405 is configured to read secure location data corresponding to the security level of the sensitive information.
  • the current location data matching module 406 is also used to compare the current location data with the secure location data corresponding to the security level of the sensitive information.
  • the current location data acquisition module 404 is further configured to acquire location data of the connection terminal that the terminal connects in short-range wireless communication manner, and use location data of the connection terminal as current location data of the terminal.
  • the sensitive information includes payment information
  • the display instruction receiving module 402 is further configured to receive a display instruction for the payment information generated according to the payment request.
  • the above sensitive information presentation apparatus can be implemented in the form of a computer readable instruction that can be run on a computer device as shown in FIG.
  • Each of the above-described sensitive information display devices may be implemented in whole or in part by software, hardware, and combinations thereof.
  • the above modules may be embedded in the hardware of the terminal or may be stored in the memory of the terminal in a software form, so that the processor calls the execution of the operations corresponding to the above modules.
  • the processor can be a central processing unit (CPU), a microprocessor, a microcontroller, or the like.
  • one or more non-transitory readable storage media having computer readable instructions that, when executed by one or more processors, cause one or more processors to execute The following steps: receiving display instructions for sensitive information; based on the exhibition of sensitive information The instruction acquires the current location data of the terminal; compares whether the current location data and the preset security location data match; when the current location data matches the preset security location data, the sensitive information is displayed on the terminal.
  • the preset security location data includes more than one secure location data
  • the step of comparing the current location data performed by the processor with the preset security location data includes: comparing the current location data with the preset Whether any of the secure location data in the secure location data matches.
  • the security location corresponding to the security location data includes a security zone location
  • the step of comparing the current location data performed by the processor with the preset security location data includes: comparing whether the current location corresponding to the current location data is In the safe area location.
  • the sensitive information includes more than one sensitive information
  • comparing whether the current location data and the preset security location data performed by the processor match comprises: comparing whether the current location data and the corresponding security location data match.
  • the step of acquiring, by the processor, the current location data of the terminal according to the display instruction for the sensitive information comprises: acquiring location data of the connection terminal connected by the terminal in short-range wireless communication manner, and connecting the location data of the terminal As the current location data of the terminal.
  • the sensitive information includes payment information
  • the step of receiving the display instruction for the sensitive information by the one or more processors includes receiving a display instruction for the payment information generated according to the payment request.
  • a computer apparatus comprising a memory and one or more processors having stored therein computer readable instructions that, when executed by a processor, cause one or more processors to execute The following steps: receiving a display instruction for the sensitive information; obtaining the current location data of the terminal according to the display instruction of the sensitive information; comparing whether the current location data and the preset security location data match; and matching the current location data with the preset security location data Display sensitive information on the terminal.
  • the preset security location data includes more than one secure location data
  • the step of comparing the current location data and the preset security location data performed by the processor is performed, The method includes: comparing whether any one of the current location data and the preset security location data matches.
  • the security location corresponding to the security location data includes a security zone location
  • the step of comparing the current location data performed by the processor with the preset security location data includes: comparing whether the current location corresponding to the current location data is In the safe area location.
  • the sensitive information includes more than one sensitive information
  • comparing whether the current location data and the preset security location data performed by the processor match comprises: comparing whether the current location data and the corresponding security location data match.
  • the step of acquiring, by the processor, the current location data of the terminal according to the display instruction for the sensitive information comprises: acquiring location data of the connection terminal connected by the terminal in short-range wireless communication manner, and connecting the location data of the terminal As the current location data of the terminal.
  • the sensitive information includes payment information
  • the step of the processor executing the receiving the display of the sensitive information comprises receiving a display instruction for the payment information generated in accordance with the payment request.
  • the computer device described above may include, but is not limited to, a mobile phone, a tablet, a portable notebook, or a smart wearable device.
  • FIG. 6 it is a schematic diagram of the internal structure of the terminal in one embodiment.
  • the terminal includes a processor, a memory and a network interface, and a display screen connected through a system bus.
  • the processor of the terminal is used to provide calculation and control capabilities to support the operation of the entire terminal.
  • the memory is used to store data, instruction codes, etc., and the network interface is used for network communication with the positioning background 120.
  • At least one computer readable instruction is stored on the memory, the computer readable instructions being executable by the processor to implement the server-enabled sensitive information presentation method provided in the embodiments of the present application.
  • the memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, or a read-only memory (ROM).
  • the memory includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium of the terminal stores an operating system, a database, and computer readable instructions.
  • the database stores data related to implementing a sensitive information presentation method provided by the above various embodiments, such as storing secure location data.
  • the computer readable instructions can be The processor is configured to implement a sensitive information presentation method provided by the above various embodiments.
  • the internal memory in the terminal provides a cached operating environment for operating systems, databases, and computer readable instructions in a non-volatile storage medium.
  • the network interface may be an Ethernet card or a wireless network card or the like for communicating with an external terminal or server.
  • the display screen of the terminal may be a touch screen, such as a capacitive screen or an electronic screen, and a corresponding instruction may be generated by receiving a click operation of a control applied to the touch screen.
  • the structure of the terminal shown in FIG. 6 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the terminal to which the solution of the present application is applied. It includes more or fewer components than those shown in the figures, or some components are combined, or have different component arrangements.
  • the terminal in the figure may also include a camera or the like.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种敏感信息展示方法、装置、存储介质和计算机设备。该方法包括:接收对敏感信息的展示指令;根据对敏感信息的展示指令获取终端当前位置数据;比较当前位置数据和预设的安全位置数据是否匹配;当当前位置数据和预设的安全位置数据匹配时,在终端上展示敏感信息。

Description

敏感信息展示方法、装置、存储介质和计算机设备
本申请要求于2017年05月19日提交中国专利局、申请号为201710359426X、发明名称为“敏感信息展示方法、装置、存储介质和计算机设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息安全技术领域,特别是涉及一种敏感信息展示方法、装置、存储介质和计算机设备。
背景技术
随着智能终端的发展和普及,人们生活变得便利。越来越多的用户习惯将敏感信息存储在智能终端,比如日记、隐私照片、银行卡信息等。因此智能终端在展示敏感信息前对用户进行安全验证变得十分重要。目前的智能终端可以在一些敏感信息入口处设置密码、指纹、人脸等安全验证,用于保障用户敏感信息的安全。
然而,通过密码、指纹、人脸等这种固定的安全验证方法,仍然存在终端被盗用、密码被破解的风险,若不能及时发现可疑操作,可能会导致敏感信息泄露,给用户带来不必要的麻烦和损失。因此,传统的敏感信息展示方法安全性较低。
发明内容
根据本申请的各种实施例,提供一种敏感信息展示方法、装置、存储介质和计算机设备。
一种敏感信息展示方法,包括:接收对敏感信息的展示指令;根据所述对敏感信息的展示指令获取终端当前位置数据;比较所述当前位置数据和预 设的安全位置数据是否匹配;及当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
一种敏感信息展示装置,所述装置包括:展示指令接收模块,用于接收对敏感信息的展示指令;当前位置数据获取模块,用于根据所述对敏感信息的展示指令获取终端当前位置数据;当前位置数据匹配模块,用于比较所述当前位置数据和预设的安全位置数据是否匹配;及敏感信息展示模块,用于当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤:接收对敏感信息的展示指令;根据所述对敏感信息的展示指令获取终端当前位置数据;比较所述当前位置数据和预设的安全位置数据是否匹配;及当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:接收对敏感信息的展示指令;根据所述对敏感信息的展示指令获取终端当前位置数据;比较所述当前位置数据和预设的安全位置数据是否匹配;及当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征、目的和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提 下,还可以根据这些附图获得其它的附图。
图1为一个实施例中敏感信息展示方法的应用环境图;
图2为一个实施例中敏感信息展示方法的流程图;
图3为另一个实施例中敏感信息展示方法的流程图;
图4为一个实施例中敏感信息展示装置的结构框图;
图5为另一个实施例中敏感信息展示装置的结构框图;
图6为一个实施例中终端的内部结构图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请实施例所提供的敏感信息展示方法可应用于图1所示的应用环境中。如图1所示,终端110可通过与定位后台120进行信号传输来定位。终端110包括但不限于手机、平板电脑、便携式笔记本或智能穿戴设备等具备定位功能的设备。定位后台120用于向终端110提供终端110的当前位置数据,该定位后台110可包括但不限于通过GPS(Global positioning system,全球定位***)定位、北斗定位、Wi-Fi定位等方式的定位后台。终端110上存储有敏感信息,其中,敏感信息可为包含敏感信息的数据,包括但不限于短信、日记、隐私照片和银行卡信息等。终端110在展示敏感信息前,可通过信号传输与定位后台120进行连接,并接收定位后台120反馈的终端110所在的地理位置数据。比较当前位置数据和预设的安全位置数据是否匹配;当当前位置数据和预设的安全位置数据匹配时,在终端上展示敏感信息。
在一个实施例中,如图2所示,提供了一种敏感信息展示方法,该方法包括:
步骤S202,接收对敏感信息的展示指令。
敏感信息是指其被非目标查阅对象所查阅时,会对该信息的拥有者或相 关对象造成损失的信息。敏感信息包括但不限于文本、图片、视频和网页链接等其中的一种或多种信息的组合,比如短信、日记、隐私照片和银行卡信息等。敏感信息可为存储在终端中的部分或全部数据,或者将从服务器获取的数据作为敏感信息,比如通过终端联网后查询的银行账户余额等。
在一个实施例中,触发对敏感信息的展示指令之前还包括接收用户的操作指令,并判断该操作指令所涉及的信息是否属于预设的敏感信息,若是,则触发对敏感信息的展示指令。其中,操作指令包括进行密码更改、支付请求、图片或短信等媒体信息的查看等类型的操作指令。举例来说,接收到用户的密码更改的操作指令之后,可判断得知密码更改的操作会涉及敏感信息,即密码信息,因此会触发对敏感信息的展示指令。
在一个实施例中,终端包括触摸屏,比如电容屏或者电子屏,可通过接收作用于该触摸屏上显示的控件的点击操作,生成相应的指令。终端可针对所要展示的敏感信息提供相应的界面,该界面上包括相应的用于接收对敏感信息的展示指令的控件,在检测到作用于该控件的点击操作时,触发对敏感信息的展示指令。或者在展示相应的请求展示界面时,即触发了相应的对敏感信息的展示指令,而无需提供对应的控件,以简化敏感信息展示的操作。
在一个实施例中,终端可侦测用户作用于其上展示操作,并判断该展示操作所作用的展示对象是否包含预设的待展示的敏感信息,若是,则该展示操作对应的指令即为对敏感信息的展示指令。
步骤S204,根据对敏感信息的展示指令获取终端当前位置数据。
终端中预置有定位***,当终端接收到对敏感信息的展示指令之后,可触发该定位***,并可通过信号传输给定位后台,获取终端所在的地理位置对应的当前位置数据。其中,当前位置数据包括但不限于由经度和纬度组成的二维位置数据,或者由经度、纬度和海拔组成的三维位置数据。
举例来说,终端可内置SIM(Subscriber Identification Module,客户识别模块)卡,通过移动GPS信号传输到GPS卫星定位后台来实现定位。再比如说,终端可内置北斗卫星导航接收芯片,通过接收卫星发射的信号,并经过 根据三维坐标中的距离公式进行计算,可获取终端的经纬度和高程。
在一个实施例中,终端也可以在未接收到对敏感信息的展示操作时,实时或者以预设的时间间隔获取终端所在位置对应的数据,并以每次获取的数据作为当前位置数据。因此能够减少终端在请求后再获取当前位置数据的时间,提高终端展示敏感信息的效率。
步骤S206,比较当前位置数据和预设的安全位置数据是否匹配。若是,则执行步骤S208;否则,则执行步骤S210。
与当前位置数据相对应的,预设的安全位置数据也包括但不限于由经度和纬度组成的二维位置数据,或者由经度、纬度和海拔组成的三维位置数据等其中一种或多种的组合。终端中预设有安全位置数据,可与所接收的定位后台反馈到终端的当前位置数据进行比较。预设的安全位置数据可为一个或多个由具体的经纬度定位的安全位置所对应的数据,当终端所在的当前位置与由具体的经纬度定位的安全位置重合时,判定该当前位置数据和预设的安全位置数据匹配。预设的安全位置数据还可为一个或多个安全区域所对应的数据,其中,安全区域可为以一个具体的经纬度对应的位置为圆心且以预设安全距离为半径的安全范围,比如将办公室座位的位置设置为具体的安全位置,在当前位置数据对应的位置与该办公室座位的距离小于等于安全距离时,判定该当前位置数据和预设的安全位置数据匹配。或者,安全区域可为一个不规则区域范围,比如某一栋楼、某个小区等,在当前位置数据对应的位置在该范围以内时,判定该当前位置数据和预设的安全位置数据匹配。
步骤S208,在终端上展示敏感信息。
展示敏感信息的方式包括但不限于在终端的显示屏上显示终端存储的文本、图片、视频和网页链接数据等其中的一种或多种数据类型的组合,或者通过终端联网从服务器获取文本、图片、视频和网页链接数据等其中的一种或多种数据类型的组合,其中,服务器包括但不限于应用服务器或网站服务器。举例来说,在当前位置数据和预设的安全位置数据匹配时,用户才能通过终端上的浏览器登陆网上银行,查看账户余额。
步骤S210,不展示敏感信息。
在一个实施例中,终端可针对所要展示的敏感信息提供相应的界面,该界面上包括相应的用于接收对敏感信息的展示指令的控件,在当前位置数据和预设的安全位置数据不匹配时,则作用于该控件的点击操作无法触发对敏感信息的展示。进一步地,在终端上可展示终端不在安全位置的提示信息,比如,在当前位置数据和预设的安全位置数据不匹配时,接收到对用于接收对敏感信息的展示指令的控件的点击操作后,弹出不在安全位置的信息框,经过预设的时间后,如2秒后,返回该用于展示敏感信息的界面。
在一个实施例中,可在敏感信息对应的展示位置上设置一个屏蔽层,通过该屏蔽层来遮挡对该敏感信息的展示。可在检测到该敏感信息根据的用户操作而移动时,可实时获取该敏感信息在显示屏所处的移动位置,并对该屏蔽层进行相应地移动,以实时遮挡该敏感信息;还可以将整个界面进行屏蔽,比如对含有敏感信息的界面进行模糊化处理,使得用户无法清楚地查看到该敏感信息。或者对该敏感信息进行加密,以密文的形式进行展示,使得用户无法直接查看到该敏感信息。
在一个实施例中,终端中预置有相应的密码验证装置,上述敏感信息展示方法还包括密码验证的步骤。终端可针对密码验证的步骤提供一个相应的密码验证的界面,该界面上可包括相应的用于接收密码验证指令的控件,在接收到密码验证指令,如接收到对相应控件的点击操作时,进行密码验证步骤。其中,密码验证的方式包括但不限于通过密码、指纹、人脸等进行验证。密码可为具有预设长度的数字、字母或其它字符等其中的一种或多种的组合。指纹可通过终端内置的指纹采集设备进行采集。人脸可通过终端内置的人脸识别设备
本实施例中,对密码验证步骤进行的顺序不作限定。比如,可以当检测到对敏感信息的展示指令时,终端将进入密码验证界面,提示用户进行密码验证,在密码验证通过后获取终端当前位置数据。若否,则提示用户密码验证失败,无法查看该敏感信息。再比如,可以当检测到当前位置数据与安全 位置数据匹配后,终端可以展示密码验证界面,进行密码验证。或者,可以同时执行当前位置数据与安全位置数据匹配步骤和密码验证步骤。
上述实施例通过预设安全位置数据,在接收对敏感信息的展示指令时,对终端当前位置数据进行验证,只有在当前位置数据与安全位置数据匹配时,才可展示相应的敏感信息。由于地理位置数据太过丰富,破解者难以进行遍历操作获得安全位置数据,提高了破解敏感信息的难度。而且地理位置数据是通过定位确定的,无需用户手动输入进行验证,提高了敏感信息展示的便利性。
在一个实施例中,存在多个安全位置数据时,将所接收的定位后台反馈到终端的当前位置数据与预设的全部安全位置作比较,当该当前位置数据与安全位置数据中任意一个安全位置数据匹配,展示与展示指令对应的敏感信息。
在一个实施例中,在设置安全位置数据时,可展示安全位置数据的列表,并接收作用于对列表中的一个以上安全位置数据的设置操作。其中,设置操作包括但不限于添加安全位置数据、删除安全位置数据或更改安全位置数据等。
在一个实施例中,终端可以根据终端停留在不同地理位置所在的时长和/或频率对用户进行安全位置推荐。可以在当终端处于某地理位置时长大于预设时长时,将该地理位置推荐给用户作为安全位置。比如,当用户连续五天平均每天在某一饭店的时间大于三小时时,将该饭店的地理位置推荐给用户作为安全位置。
在一个实施例中,安全位置数据对应的安全位置包括安全点位置,可为由经度和纬度组成的具体点位置,或者由经度、纬度和海拔组成的三维位置数据组合定位的具体点位置。在终端的当前位置数据对应的当前位置处于该位置时,才可在终端上展示敏感信息。
在一个实施例中,安全位置数据对应的安全位置包括安全区域位置,其中,安全区域位置可为以一个具体的经纬度对应的位置为圆心的安全区域位 置,在当前位置数据对应的当前位置在与该圆心的距离小于预设安全距离时,判定该当前位置数据和预设的安全位置数据匹配。或者,安全区域位置可为一个不规则区域范围,比如某一栋楼、某个小区等,在当前位置数据对应的位置在该范围以内时,判定该当前位置数据和预设的安全位置数据匹配。还可以通过地理位置对应的定位序列作为安全区域位置,包括但不限于邮政编码,比如说,设置安全位置对应的邮政编码为518000,当检测到终端所在位置在深圳市罗湖区内,则判定当前位置数据和预设的安全位置数据匹配。
在一个实施例中,存在一个以上的敏感信息,敏感信息可根据其敏感程度或敏感类型等进行等级划分,如图3所示,展示敏感信息的方法还包括:
步骤S205,读取与敏感信息的安全等级相对应的安全位置数据。
每个敏感信息有具有相应的安全等级,且每个安全等级有相应的安全位置数据。在所接收的定位后台反馈到终端的当前位置数据之后,终端可根据对敏感信息的展示指令读取相应的敏感信息的安全等级,并根据该安全等级读取相应的安全位置数据。步骤S206包括比较当前位置数据和敏感信息的安全等级相对应的安全位置数据是否匹配,若是,则展示相应的敏感信息。其中,与安全等级相应的安全位置数据可包括与该安全等级相同的安全位置数据,或者也可为与该安全等级相同和比该安全等级更高级的安全位置数据。
举例来说,可以设置隐私照片的安全等级为一级敏感信息,设置银行卡信息的安全等级为二级敏感信息,将短信设置为三级敏感信息,并且将自己家的地理位置设置为一级安全位置,将办公室的地理位置设置为二级安全位置,将常去的咖啡厅的地理位置设置为三级安全位置。若读取的安全位置数据为与敏感信息安全等级相同安全等级的安全位置数据,则在自己家展示隐私照片,在办公室展示银行卡信息,在常去的咖啡厅展示短信。若读取的安全位置数据为与敏感信息安全等级相同安全等级的和比敏感信息安全等级更高级的安全位置数据,则当终端的当前位置数据对应的位置在安全位置中的自己家时,终端可展示隐私照片、银行卡信息和短信。当终端的当前位置数据对应的位置在安全位置中的办公室时,终端可展示银行卡信息和短信但不 能展示隐私照片。当终端的当前位置数据对应的位置在安全位置中的常去的咖啡厅,终端可展示的敏感信息为短信,不能展示隐私照片和银行卡信息。
在一个实施例中,存在一个以上的敏感信息,敏感信息可根据其敏感程度或敏感类型等进行等级划分。每个敏感信息有具有相应的安全等级,每个安全等级有相应的安全位置数据,每个安全位置数据可有相应的解锁方式。在所接收的定位后台反馈到终端的当前位置数据之后,步骤S206包括,读取与敏感信息的安全等级相对应的安全位置数据。终端可根据对敏感信息的展示指令读取相应的敏感信息的安全等级,并根据该安全等级读取相对应的安全位置数据,将当前位置数据与相对应的安全位置数据进行匹配,若匹配,则进行相应的密码验证。
终端在展示敏感信息前,在不同的地理位置可有相应的密码验证方式,比如在公共场所时采取复杂的密码验证方式,当密码验证通过后展示该敏感信息。举例来说,当前位置在自己家时,用户可以通过滑动解锁查看隐私照片,当前位置在办公室时,用户可以通过输入密码进行密码验证来查看隐私照片,当前位置在常去的咖啡厅时,用户可以通过指纹密码验证来查看隐私照片。
上述实施例通过将敏感信息进行安全等级的划分,并设置相应的具有安全等级的安全位置数据,或者根据安全位置数据的安全等级设置相应的密码验证方式,从而更好地分级管理敏感信息,提高对敏感信息保护。
在一个实施例中,获取终端以短距离无线通信方式连接的连接终端的位置数据,将连接终端的位置数据作为终端的当前位置数据。其中,短距离无线通信方式包括但不限于蓝牙、Wi-Fi、NFC(Near Field Communication,近距离无线通讯技术)等无线通信方式。当终端通过信号传输与连接终端连接时,则可比较该连接终端的位置数据与安全位置数据是否匹配,若是,则判定终端当前位置数据也与安全位置数据匹配。
举例来说,终端可采取Wi-Fi定位方式获取终端当前位置数据,其中,当前位置数据可为终端所连接Wi-Fi的Wi-Fi标识所处的位置对应的位置数 据。Wi-Fi标识为发射Wi-Fi的信号源的标识,该信号源包括但不限于手机、路由器、笔记本等。当检测到Wi-Fi标识所处的位置数据与预设的安全位置数据匹配时,则判定终端处于安全位置内。举例来说,将办公室设置为安全位置,且终端连接了办公室里的路由器发出的Wi-Fi,当终端本身不处于安全位置时,仍判定终端的当前位置数据与安全位置数据匹配,可以展示相应的敏感信息。或者,可以将Wi-Fi标识发出的Wi-Fi所覆盖的区域作为安全位置,当终端连接到该Wi-Fi时,可判定终端的当前位置数据与安全位置数据匹配。
在一个实施例中,敏感信息包括支付信息;展示指令包括根据支付请求而生成的对支付信息的展示指令。其中,支付请求为用于进行支付操作的请求,支付信息为进行支付操作所涉及的敏感信息,比如,账户余额、支付金额、银行卡账号等。接收到支付请求后,可根据支付请求生成相应的对支付信息的展示指令,根据该展示指令比较当前位置数据和预设的安全位置数据是否匹配,比如,可以计算该终端当前位置数据对应的当前位置与每个预设的具体安全位置数据对应的具体安全位置之间的距离,检测每个所计算出的距离是否处于对应安全位置所预设安全距离之内,若是,则展示展示支付信息,并进行支付操作。进一步地,还可以在计算该当前位置信息与每个预设的具体安全位置之间的距离之前,或者在进行支付操作之前进行密码验证,其中密码验证的方式包括但不限于通过密码、指纹、人脸等进行验证,在密码验证通过后,执行下一个步骤。
在一个实施例中,如图4所示,提供了一种敏感信息展示装置,该装置包括:
展示指令接收模块402,用于接收对敏感信息的展示指令。
当前位置数据获取模块404,用于根据对敏感信息的展示指令获取终端当前位置数据。
当前位置数据匹配模块406,用于比较当前位置数据和预设的安全位置数据是否匹配。
敏感信息展示模块408,用于当前位置数据和预设的安全位置数据匹配 时,在终端上展示敏感信息。
在一个实施例中,预设的安全位置数据包括一个以上的安全位置数据,当前位置数据匹配模块406还用于比较当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
在一个实施例中,安全位置数据对应的安全位置包括安全区域位置,当前位置数据匹配模块406还用于比较当前位置数据对应的当前位置是否在安全区域位置内。
在一个实施例中,敏感信息包括一个以上的敏感信息,如图5所示,敏感信息展示装置还包括:
安全位置数据读取模块405,用于读取与敏感信息的安全等级相对应的安全位置数据。
当前位置数据匹配模块406还用于比较当前位置数据和与敏感信息的安全等级相对应的安全位置数据。
在一个实施例中,当前位置数据获取模块404还用于获取终端以短距离无线通信方式连接的连接终端的位置数据,将连接终端的位置数据作为终端的当前位置数据。
在一个实施例中,敏感信息包括支付信息,展示指令接收模块402还用于接收根据支付请求而生成的对支付信息的展示指令。
上述敏感信息展示装置可以实现为一种计算机可读指令的形式,计算机可读指令可以在如图6所示的计算机设备上运行。
上述敏感信息展示装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于终端的存储器中,也可以以软件形式存储于终端的存储器中,以便于处理器调用执行以上各个模块对应的操作。该处理器可以为中央处理单元(CPU)、微处理器、单片机等。
在一个实施例中,提供了一个或多个存储有计算机可读指令的非易失性可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:接收对敏感信息的展示指令;根据对敏感信息的展 示指令获取终端当前位置数据;比较当前位置数据和预设的安全位置数据是否匹配;当当前位置数据和预设的安全位置数据匹配时,在终端上展示敏感信息。
在一个实施例中,预设的安全位置数据包括一个以上的安全位置数据,处理器所执行的比较当前位置数据和预设的安全位置数据是否匹配的步骤,包括:比较当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
在一个实施例中,安全位置数据对应的安全位置包括安全区域位置,处理器所执行的比较当前位置数据和预设的安全位置数据是否匹配的步骤,包括:比较当前位置数据对应的当前位置是否在安全区域位置内。
在一个实施例中,敏感信息包括一个以上的敏感信息,处理器所执行的比较当前位置数据和预设的安全位置数据是否匹配,包括:比较当前位置数据和相对应的安全位置数据是否匹配。
在一个实施例中,处理器所执行的根据对敏感信息的展示指令获取终端当前位置数据的步骤,包括:获取终端以短距离无线通信方式连接的连接终端的位置数据,将连接终端的位置数据作为终端的当前位置数据。
在一个实施例中,敏感信息包括支付信息,该一个或多个处理器执行的接收对敏感信息的展示指令的步骤包括:接收根据支付请求而生成的对支付信息的展示指令。
在一个实施例中,提供了一种计算机设备,包括存储器和一个或多个处理器,存储器中存储有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:接收对敏感信息的展示指令;根据对敏感信息的展示指令获取终端当前位置数据;比较当前位置数据和预设的安全位置数据是否匹配;当当前位置数据和预设的安全位置数据匹配时,在终端上展示敏感信息。
在一个实施例中,预设的安全位置数据包括一个以上的安全位置数据,处理器所执行的比较当前位置数据和预设的安全位置数据是否匹配的步骤, 包括:比较当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
在一个实施例中,安全位置数据对应的安全位置包括安全区域位置,处理器所执行的比较当前位置数据和预设的安全位置数据是否匹配的步骤,包括:比较当前位置数据对应的当前位置是否在安全区域位置内。
在一个实施例中,敏感信息包括一个以上的敏感信息,处理器所执行的比较当前位置数据和预设的安全位置数据是否匹配,包括:比较当前位置数据和相对应的安全位置数据是否匹配。
在一个实施例中,处理器所执行的根据对敏感信息的展示指令获取终端当前位置数据的步骤,包括:获取终端以短距离无线通信方式连接的连接终端的位置数据,将连接终端的位置数据作为终端的当前位置数据。
在一个实施例中,敏感信息包括支付信息,处理器所执行的接收对敏感信息的展示指令的步骤包括接收根据支付请求而生成的对支付信息的展示指令。
在一个实施例中,上述的计算机设备可包括但不限于手机、平板电脑、便携式笔记本或智能穿戴设备等终端。如图6所示,为一个实施例中终端的内部结构示意图。该终端包括通过***总线连接的处理器、存储器和网络接口、显示屏。
其中,该终端的处理器用于提供计算和控制能力,支撑整个终端的运行。存储器用于存储数据、指令代码等,网络接口用于与定位后台120进行网络通信。存储器上存储至少一个计算机可读指令,该计算机可读指令可被处理器执行,以实现本申请实施例中提供的适用于服务器的敏感信息展示方法。存储器可包括磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质。例如,在一个实施例中,存储器包括非易失性存储介质及内存储器。终端的非易失性存储介质存储有操作***、数据库和计算机可读指令。该数据库中存储有用于实现以上各个实施例所提供的一种敏感信息展示方法相关的数据,比如可存储有安全位置数据。该计算机可读指令可被 处理器所执行,以用于实现以上各个实施例所提供的一种敏感信息展示方法。终端中的内存储器为非易失性存储介质中的操作***、数据库和计算机可读指令提供高速缓存的运行环境。网络接口可以是以太网卡或无线网卡等,用于与外部的终端或服务器进行通信。终端的显示屏可以是触摸屏,比如为电容屏或电子屏,可通过接收作用于该触摸屏上显示的控件的点击操作,生成相应的指令。
本领域技术人员可以理解,图6中示出的终端的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的终端的限定,具体的终端可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。比如,该图中的终端还可包括摄像头等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等。
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种敏感信息展示方法,所述方法包括:
    接收对敏感信息的展示指令;
    根据所述对敏感信息的展示指令获取终端当前位置数据;
    比较所述当前位置数据和预设的安全位置数据是否匹配;及
    当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
  2. 根据权利要求1所述的敏感信息展示方法,其特征在于,所述预设的安全位置数据包括一个以上的安全位置数据;
    所述比较所述当前位置数据和预设的安全位置数据是否匹配,包括:
    比较所述当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
  3. 根据权利要求1所述的敏感信息展示方法,其特征在于,所述安全位置数据对应的安全位置包括安全区域位置;
    所述比较所述当前位置数据和预设的安全位置数据是否匹配,包括:
    比较所述当前位置数据对应的当前位置是否在所述安全区域位置内。
  4. 根据权利要求1所述的敏感信息展示方法,其特征在于,所述敏感信息包括一个以上的敏感信息;
    所述比较所述当前位置数据和预设的安全位置数据是否匹配,包括:
    比较所述当前位置数据和与所述敏感信息的安全等级相对应的安全位置数据是否匹配。
  5. 根据权利要求1所述的敏感信息展示方法,其特征在于,所述获取终端当前位置数据,包括:
    获取终端以短距离无线通信方式连接的连接终端的位置数据,将所述连接终端的位置数据作为所述终端的当前位置数据。
  6. 根据权利要求1所述的敏感信息展示方法,其特征在于,所述敏感信息包括支付信息;所述展示指令包括根据支付请求而生成的对所述支付信息 的展示指令。
  7. 一种敏感信息展示装置,所述装置包括:
    展示指令接收模块,用于接收对敏感信息的展示指令;
    当前位置数据获取模块,用于根据所述对敏感信息的展示指令获取终端当前位置数据;
    当前位置数据匹配模块,用于比较所述当前位置数据和预设的安全位置数据是否匹配;及
    敏感信息展示模块,用于当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
  8. 根据权利要求7所述的敏感信息展示装置,其特征在于,所述预设的安全位置数据包括一个以上的安全位置数据;
    所述当前位置数据匹配模块还用于比较所述当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
  9. 根据权利要求7所述的敏感信息展示装置,其特征在于,所述安全位置数据对应的安全位置包括安全区域位置;
    所述当前位置数据匹配模块还用于比较所述当前位置数据对应的当前位置是否在所述安全区域位置内。
  10. 根据权利要求7所述的敏感信息展示装置,其特征在于,所述敏感信息包括一个以上的敏感信息,所述当前位置数据匹配模块还用于比较所述当前位置数据和与所述敏感信息的安全等级相对应的安全位置数据是否匹配。
  11. 一种计算机设备,包括存储器和一个或多个处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收对敏感信息的展示指令;
    根据所述对敏感信息的展示指令获取终端当前位置数据;
    比较所述当前位置数据和预设的安全位置数据是否匹配;及
    当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
  12. 根据权利要求11所述的计算机设备,其特征在于,所述预设的安全位置数据包括一个以上的安全位置数据;
    所述处理器所执行的比较所述当前位置数据和预设的安全位置数据是否匹配的步骤,包括:
    比较所述当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
  13. 根据权利要求11所述的计算机设备,其特征在于,所述安全位置数据对应的安全位置包括安全区域位置;
    所述处理器所执行的比较所述当前位置数据和预设的安全位置数据是否匹配的步骤,包括:
    比较所述当前位置数据对应的当前位置是否在所述安全区域位置内。
  14. 根据权利要求11所述的计算机设备,其特征在于,所述敏感信息包括一个以上的敏感信息;
    所述处理器所执行的比较所述当前位置数据和预设的安全位置数据是否匹配,包括:
    比较所述当前位置数据和与所述敏感信息的安全等级相对应的安全位置数据是否匹配。
  15. 根据权利要求11所述的计算机设备,其特征在于,所述处理器所执行的获取终端当前位置数据的步骤,包括:
    获取终端以短距离无线通信方式连接的连接终端的位置数据,将所述连接终端的位置数据作为所述终端的当前位置数据。
  16. 一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收对敏感信息的展示指令;
    根据所述对敏感信息的展示指令获取终端当前位置数据;
    比较所述当前位置数据和预设的安全位置数据是否匹配;及
    当所述当前位置数据和预设的安全位置数据匹配时,在终端上展示所述敏感信息。
  17. 根据权利要求16所述的存储介质,其特征在于,所述预设的安全位置数据包括一个以上的安全位置数据;
    所述处理器所执行的比较所述当前位置数据和预设的安全位置数据是否匹配的步骤,包括:
    比较所述当前位置数据和预设的安全位置数据中任意一个安全位置数据是否匹配。
  18. 根据权利要求16所述的存储介质,其特征在于,所述安全位置数据对应的安全位置包括安全区域位置;
    所述处理器所执行的比较所述当前位置数据和预设的安全位置数据是否匹配的步骤,包括:
    比较所述当前位置数据对应的当前位置是否在所述安全区域位置内。
  19. 根据权利要求16所述的存储介质,其特征在于,所述敏感信息包括一个以上的敏感信息;
    所述处理器所执行的比较所述当前位置数据和预设的安全位置数据是否匹配,包括:
    比较所述当前位置数据和与所述敏感信息的安全等级相对应的安全位置数据是否匹配。
  20. 根据权利要求16所述的存储介质,其特征在于,所述处理器所执行的获取终端当前位置数据的步骤,包括:
    获取终端以短距离无线通信方式连接的连接终端的位置数据,将所述连接终端的位置数据作为所述终端的当前位置数据。
PCT/CN2017/108284 2017-05-19 2017-10-30 敏感信息展示方法、装置、存储介质和计算机设备 WO2018209897A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710359426.X 2017-05-19
CN201710359426.XA CN107665313B (zh) 2017-05-19 2017-05-19 敏感信息展示方法、装置、存储介质和计算机设备

Publications (1)

Publication Number Publication Date
WO2018209897A1 true WO2018209897A1 (zh) 2018-11-22

Family

ID=61121785

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/108284 WO2018209897A1 (zh) 2017-05-19 2017-10-30 敏感信息展示方法、装置、存储介质和计算机设备

Country Status (2)

Country Link
CN (1) CN107665313B (zh)
WO (1) WO2018209897A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399252A (zh) * 2018-03-05 2018-08-14 广东欧珀移动通信有限公司 信息处理方法、移动终端及计算机可读存储介质
CN110401621A (zh) * 2018-04-25 2019-11-01 ***通信集团有限公司 一种敏感指令的防护方法、设备及存储介质
CN109753265A (zh) * 2019-01-08 2019-05-14 合肥联宝信息技术有限公司 一种控制方法及电子设备
CN113836173B (zh) * 2021-10-11 2024-05-31 百度在线网络技术(北京)有限公司 数据的处理方法、装置、电子设备及存储介质
CN116401651B (zh) * 2023-06-08 2023-09-19 深圳市晨歌电子有限公司 一种信息存储安全防护方法、***及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615940A (zh) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 敏感信息显示方法及装置
CN104700266A (zh) * 2015-03-16 2015-06-10 深圳酷派技术有限公司 一种安全支付方法及装置
US20160014148A1 (en) * 2014-07-10 2016-01-14 Soteria Systems Llc Web anomaly detection apparatus and method
CN105471823A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 一种敏感信息处理方法、装置、服务器及安全判定***

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289752A (zh) * 2011-07-18 2011-12-21 北京融易通信息技术有限公司 一种基于暗号的移动支付方法及***
CN105306204B (zh) * 2014-07-04 2020-07-10 腾讯科技(深圳)有限公司 安全验证方法、装置及***
US9779271B2 (en) * 2015-06-08 2017-10-03 Juniper Networks, Inc. Apparatus, system, and method for detecting theft of network devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160014148A1 (en) * 2014-07-10 2016-01-14 Soteria Systems Llc Web anomaly detection apparatus and method
CN105471823A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 一种敏感信息处理方法、装置、服务器及安全判定***
CN104615940A (zh) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 敏感信息显示方法及装置
CN104700266A (zh) * 2015-03-16 2015-06-10 深圳酷派技术有限公司 一种安全支付方法及装置

Also Published As

Publication number Publication date
CN107665313B (zh) 2019-08-09
CN107665313A (zh) 2018-02-06

Similar Documents

Publication Publication Date Title
WO2018209897A1 (zh) 敏感信息展示方法、装置、存储介质和计算机设备
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US10645069B2 (en) Location service for user authentication
CN105306204B (zh) 安全验证方法、装置及***
US10243944B2 (en) Systems and methods for location-based device security
US10783275B1 (en) Electronic alerts for confidential content disclosures
US10623959B1 (en) Augmented reality security access
US10776464B2 (en) System and method for adaptive application of authentication policies
US10362042B2 (en) Method for transmitting verification information and terminal
EP3200417B1 (en) Method and device for information interaction and association between human biological feature data and account
US20160173501A1 (en) Managing electronic account access control
KR102118294B1 (ko) 무선 네트워크 유형 검출 방법과 장치, 및 전자 디바이스
KR102436509B1 (ko) 임시 계정 정보를 제공하는 방법, 장치 및 시스템
US10318722B2 (en) Power charger authorization for a user equipment via a cryptographic handshake
US20170171177A1 (en) Authentication via item recognition
WO2017201874A1 (zh) 终端丢失提示方法及装置
US20180034750A1 (en) Instant messaging method, server, and storage medium
US11134079B2 (en) Cognitive behavioral and environmental access
CN107231338B (zh) 网络连接方法、装置以及用于网络连接的装置
US10169619B2 (en) Physical token based secured charge management of a user equipment
US10127407B2 (en) Location defined power charger management authorization for a user equipment
US9686285B2 (en) Securely transmitting authentication information
JP2017058749A (ja) 認証装置、認証方法及び認証プログラム
WO2019090584A1 (zh) 一种用于智能终端的帐户注册方法及帐户注册***
CN113515318A (zh) 一种应用程序的登录方法、装置及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17910118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09.03.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17910118

Country of ref document: EP

Kind code of ref document: A1