WO2018228050A1 - 防止敏感信息泄露的方法、装置及存储介质 - Google Patents

防止敏感信息泄露的方法、装置及存储介质 Download PDF

Info

Publication number
WO2018228050A1
WO2018228050A1 PCT/CN2018/083843 CN2018083843W WO2018228050A1 WO 2018228050 A1 WO2018228050 A1 WO 2018228050A1 CN 2018083843 W CN2018083843 W CN 2018083843W WO 2018228050 A1 WO2018228050 A1 WO 2018228050A1
Authority
WO
WIPO (PCT)
Prior art keywords
field
sensitive
file content
user
keyword
Prior art date
Application number
PCT/CN2018/083843
Other languages
English (en)
French (fr)
Inventor
洪文智
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2018228050A1 publication Critical patent/WO2018228050A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present application relates to the field of information security technologies, and in particular, to a method, device, and storage medium for preventing leakage of sensitive information.
  • the main purpose of the present application is to provide a method, an apparatus, and a storage medium for preventing leakage of sensitive information, and to solve the technical problem that the sensitive information that is not locally detected and deleted by the mobile terminal can be effectively detected and easily leaked in the prior art.
  • the present application provides a method for preventing leakage of sensitive information, and the method for preventing leakage of sensitive information includes:
  • the field is determined as a sensitive field
  • the present application further provides an apparatus for preventing leakage of sensitive information, the apparatus for preventing leakage of sensitive information, including: a memory, a processor, and being stored on the memory and operable on the processor
  • the anti-sensitive information leakage program which is implemented when the anti-sensitive information leakage program is executed by the processor, implements the following steps:
  • the field is determined as a sensitive field
  • the present application further provides a storage medium on which a sensitive information leakage preventing program is stored, and when the sensitive information leakage preventing program is executed by the processor, the sensitive information leakage prevention as described above is implemented.
  • the method corresponds to each step.
  • the present application further provides an apparatus for preventing leakage of sensitive information, and the apparatus for preventing leakage of sensitive information includes:
  • a judging module configured to call a preset detection keyword, perform feature matching on a file content stored locally by each application APP, and determine whether a field matching the detection keyword exists in the file content;
  • a determining module configured to determine the field as a sensitive field if a field matching the detected keyword exists in the file content
  • a generating module configured to generate, according to the sensitive field, a reminder message for reminding the user to delete the sensitive field.
  • the method, the device and the storage medium for preventing the leakage of the sensitive information provided by the present application can realize the feature matching of the locally stored file content corresponding to each APP installed in the mobile terminal by calling the preset detection keyword. If there is a field matching the detection keyword in the file content, the field is determined as a sensitive field, and a reminder message for prompting the user to delete the sensitive field is generated according to the sensitive field, so that the user can discover and delete the mobile in time.
  • the sensitive information stored in each APP of the terminal effectively protects personal privacy, and solves the technical problem that the prior art cannot effectively detect and delete the sensitive information stored locally by the mobile terminal, and easily leak sensitive information.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for preventing leakage of sensitive information according to the present application
  • FIG. 2 is a schematic flowchart of a fifth embodiment of a method for preventing leakage of sensitive information according to the present application
  • FIG. 3 is a schematic diagram of a network protocol stack corresponding to a mobile terminal in a fifth embodiment of the present application.
  • FIG. 4 is a schematic diagram of a scenario for generating a reminder message for reminding a user whether to send a data packet in the fifth embodiment of the method for preventing leakage of sensitive information;
  • FIG. 5 is a schematic structural diagram of a software running environment involved in a device for preventing leakage of sensitive information according to the present application.
  • the following embodiments provide a method for preventing leakage of sensitive information.
  • the method performs feature matching on a file content stored locally in each APP installed in a mobile terminal by calling a preset detection keyword, if the file content exists in the file content.
  • the field matching the detection keyword is determined as a sensitive field, and a reminder message for prompting the user to delete the sensitive field is generated according to the sensitive field, so that the user can discover and delete each APP in the mobile terminal in time.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for preventing leakage of sensitive information in the present application.
  • a method for preventing leakage of sensitive information in the present application includes:
  • step S10 the preset detection keyword is invoked, and the file content locally stored in each application APP is feature-matched, and it is determined whether there is a field matching the detection keyword in the file content.
  • the method further includes: receiving, in advance, a detection keyword for performing feature matching, where the detection keyword includes one of an ID card number, a phone number, a bank card number, a mailbox, an address, a name, an account name, and an account password. Or multiple.
  • the mobile terminal may perform feature matching on the file content locally stored in each APP installed in the mobile terminal according to a user's customized operation, and determine whether there is a field matching the detected keyword in the file content. For example, the user can customize the time interval (such as every other day or every other week), and the mobile terminal automatically invokes the above detection keyword to characterize the file content stored locally in each APP installed in the mobile terminal.
  • the mobile terminal may also invoke the foregoing detection keyword according to the detected sensitive information detection instruction triggered by the user, and perform feature matching on the file content locally stored in each APP installed in the mobile terminal.
  • the user can customize the above detection keywords, such as ID number, phone number, bank card number, email address, home/work address, name, account name, account password, and the like.
  • an identity card number it belongs to a group of feature combination codes, and is verified by a 17-digit body code and a 1-digit number.
  • the code composition is arranged from left to right in order: 6 digit address code, 8 digit birth date code, 3 digit sequence code and 1 digit verification code; for telephone number, the fixed landline number is generally 7 to 8 digits, the mobile phone number is composed of 11 digits; for the bank card number, there is a uniform regulation for the business number between commercial banks, generally consisting of 16 to 19 digits, the first 6 digits of the card number
  • the numbers represent the issuer identification code.
  • Different issuer identification codes represent different bank card organization and card levels; for mailboxes, they are generally composed of “username@mailbox domain name”; for home/work address, It usually consists of a string of characters, including the name of the country, province, city or country, street, house number, building, etc., or the number of floors, room number, etc.
  • the mobile terminal After the mobile terminal invokes the detection keyword, the mobile terminal automatically performs feature matching on the file content stored locally by each application APP, and searches for a field matching the detection keyword. It also includes automatically identifying the sensitive information contained in the file content stored locally by each application APP according to the characteristics of the detection keyword pair described above. For example, when a file stored locally in an APP contains a set of 17-digit fields, and the first 6 digits belong to the address code in the ID number, the field can be determined as the ID number; The content contains a set of 11 digits of fields, and the first 3 digits belong to the number segment (such as 138, 135, etc.) input by the operator, then the field can be determined to be a telephone number.
  • Step S20 If there is a field in the file content that matches the detected keyword, the field is determined as a sensitive field.
  • the field when there is a field matching the detection keyword in the file content stored locally by any APP of the mobile terminal, the field is determined as a sensitive field.
  • Step S30 Generate, according to the sensitive field, a reminder message for reminding the user to delete the sensitive field.
  • a reminder message for reminding the user to delete the sensitive field is generated, and outputting to the display interface of the mobile terminal for display, or sending to the mobile A list of terminal messages.
  • the user may delete the sensitive field according to the reminder message.
  • the method for preventing leakage of sensitive information in the embodiment by calling a preset detection keyword, performs feature matching on the content of the locally stored file corresponding to each APP installed in the mobile terminal, if the file content exists and the above detection If the keyword matches the field, the field is determined as a sensitive field, and a reminder message for prompting the user to delete the sensitive field is generated according to the sensitive field, so that the user can timely discover and delete the sensitivity stored in each APP of the mobile terminal.
  • the information effectively protects the privacy of the individual and solves the technical problem that the prior art cannot effectively detect and delete the sensitive information stored locally by the mobile terminal, and easily leak sensitive information.
  • the determination center described in step S10 shown in FIG. 1 is proposed.
  • the step of whether there is a field matching the detected keyword in the content of the file includes:
  • the user can set a specific detection keyword according to the requirements of the user to perform feature matching on the file content locally stored in each APP installed in the mobile terminal. For example, the user can set the detection keyword to “000111”, and then Feature matching is performed on each field of the content of the file, and when the matching similarity between the arbitrary field of the file content and the detection keyword "000111" is greater than a preset threshold (such as 80%), it is determined that the file content exists and detected.
  • a preset threshold such as 80%
  • This embodiment can establish a matching model according to different types of resource service description information, such as text ontology concepts, sentences, numerical values (including numerical intervals and fuzzy numbers), and similarity matching algorithms between entity classes (data structures) concepts.
  • the similarity matching algorithm includes: a text concept similarity algorithm, a sentence similarity algorithm, a numerical interval similarity algorithm, and the like.
  • the text concept similarity algorithm mainly converts the text into word vector space, and then decomposes the matching keywords into concept sets. By calculating the inner product space between concepts, the matching similarity between matching keywords is obtained. The matching similarity between the keywords is matched, and the matching similarity between the texts is calculated.
  • the sentence similarity algorithm mainly selects a small number of candidate instances from the data resource library based on the word surface features and information entropy of the sentence, and then performs a fan-to-huas matching for these candidate instances to calculate the matching similarity between the sentences.
  • the numerical interval similarity algorithm mainly uses the learning samples to obtain the unit similarity vector, and obtains the optimal partition between the data of each dimension. The unit similarity vector between the predicted sample and the learning sample is obtained by using the optimal partition, so as to obtain the matching of the predicted samples. Similarity.
  • the matching similarity between the detected keyword and any field of the file content stored in any APP is greater than a preset threshold, it is determined that the content of the file exists and the detected keyword
  • the matching field can not only find the sensitive information in the content of the above file, but also find a field with similar sensitive information, which is convenient for the user to process in time, and can effectively improve the security of the private information in the mobile terminal.
  • the third embodiment of the method for preventing leakage of sensitive information is proposed in the foregoing step, and determining whether the content of the file exists in step S10 shown in FIG.
  • the step of matching the detected keyword includes:
  • the personal information input by the user related to the detection keyword is acquired, and the personal information is searched for in the file content stored locally by each APP;
  • the personal information can be found in the file content, it is determined that there is a field in the file content that matches the detected keyword.
  • the user may also input the personal information that is to be detected on the operation interface of the mobile terminal, and after obtaining the personal information input by the user, the mobile terminal automatically searches for the personal information in the file content stored locally in each APP; If it can be found, it is determined that there is a field matching the detected keyword in the content of the above file.
  • the basic principle of information retrieval can be used to perform feature matching.
  • the principle of information retrieval is to compare and match the search questions expressing the information requirements with the information identifiers stored in the search system, and select the matching or part of the two. The corresponding information is output.
  • the mobile terminal automatically localizes in each APP.
  • the keyword "Zhang San” is searched, and if it can be found, it is determined that an APP of the mobile terminal stores a field matching the detection keyword "Zhang San”.
  • the method for preventing leakage of sensitive information in the embodiment may input personal information that needs to be detected according to a user's operation interface on the mobile terminal, and then the mobile terminal automatically searches for the personal information in the file content stored locally in each APP, thereby The user needs to accurately find the sensitive information existing in the mobile terminal, that is, the present embodiment can accurately find the sensitive information existing in the mobile terminal, so that the user can accurately delete the sensitive information, so that the sensitive information is not easily leaked.
  • the fourth embodiment of the method for preventing leakage of sensitive information in the present application is provided. After the step of determining the field as a sensitive field, the method further includes:
  • the storage directory corresponding to the sensitive field is determined as a sensitive field leakage point, and the storage directory is written to the foregoing reminding message for reminding the user to delete the sensitive field, where the user is When viewing the above reminder message, you can view the above sensitive information and the storage directory corresponding to the sensitive information.
  • the user can view the location of the file where the sensitive information is located according to the foregoing storage directory, and then determine whether to delete or modify the sensitive information.
  • step S30 shown in FIG. 1 further includes:
  • the sensitive field is permanently deleted.
  • the foregoing reminder message carries a corresponding deletion instruction, which is used to delete the sensitive field.
  • the deletion instruction may be triggered, and after the mobile terminal detects the deletion instruction triggered by the user, the sensitive field is delete permanently.
  • the method for preventing leakage of sensitive information in the embodiment after determining the sensitive field, determining the storage directory corresponding to the sensitive field as a sensitive field leakage point, and writing the storage directory to the foregoing for reminding the user to delete the
  • the reminder message of the sensitive field when viewing the above reminder message, the user can view the sensitive information and the storage directory corresponding to the sensitive information, thereby helping the user to determine whether to delete the sensitive information according to the source of the sensitive information.
  • FIG. 2 prevents the present application.
  • the method for preventing leakage of sensitive information is a schematic flowchart of the fifth embodiment.
  • the method for preventing leakage of sensitive information in the present application further includes:
  • Step S40 When detecting any APP to generate a data packet, calling the detection keyword, performing feature matching on the source data used to generate the data packet, and determining whether the source data exists and the detection key a field that matches the word;
  • Step S50 If there is a field in the source data that matches the detected keyword, the data packet is determined to be a sensitive data packet;
  • Step S60 generating a reminder message for reminding the user whether to send the data message.
  • the real-time detection of each APP generates a data message sent to another terminal, and when any APP generates a data message, the preset detection keyword is invoked, and is used for Generating the source data of the data packet to perform feature matching, and determining whether there is a field matching the detection keyword in the source data, and if yes, determining the data packet as a sensitive data packet, and generating a reminder for generating Whether the user sends a reminder message for the data message.
  • the present application is not limited to the specific communication protocols of the various mobile communication terminals involved, and may include, but is not limited to, 2G, 3G, 4G, 5G networks, WCDMA,
  • different mobile terminals may use the same communication protocol or different communication protocols.
  • the application is not limited to a specific operating system of the mobile terminal, and may include, but is not limited to, iOS, Windows. Mobile, Symbian, Android ((Android), etc., different mobile terminals can use the same operating system, or different operating systems.
  • FIG. 3 is a schematic diagram of a network protocol stack corresponding to the mobile terminal in the fifth embodiment of the present application.
  • the mobile terminal has a network protocol stack for processing data messages, in OSI. (Open System Interconnection, Open System Interconnection)
  • OSI Open System Interconnection
  • the protocol stack also includes 7 protocol layers, namely: physical layer 111, data link layer 112, network layer 113, transport layer 114, session layer 115, representation Layer 116, application layer 117.
  • the network layer 113 corresponds to the third layer in the OSI reference model, which is between the transport layer 114 and the data link layer 112. Based on the functionality of the data link layer 112 to transmit data frames between two adjacent endpoints, the network layer 113 further manages data communications in the network, and attempts to transfer data packets from the source node to the target node through a number of intermediate nodes.
  • the transport layer 114 is provided with the most basic end-to-end data transfer service.
  • Transport layer 114 corresponds to a relatively important and critical layer in the OSI reference model, which is the only layer responsible for overall data transfer and data control. Transport layer 114 provides a mechanism for exchanging data end-to-end. The transport layer 114 provides reliable transport services for the upper three layers, such as the session layer 115, the presentation layer 116, and the application layer 117, and provides reliable target node information to the network layer 113.
  • Application layer 117 corresponds to layer 7 of the OSI reference model.
  • the application layer 117 directly interacts with the application's local processes and provides common web application services.
  • Application layer 117 also issues a request to presentation layer 116.
  • the data packet generated by any APP of the mobile terminal may be detected in the data link layer 112, the network layer 113, the transport layer 114, or the session layer 115 and the application layer 117 as shown in FIG.
  • step S60 shown in FIG. 2 further includes:
  • the cancel sending instruction triggered by the user is detected, the data message is withdrawn or modified, or the data message is deleted.
  • the foregoing reminding message for reminding the user whether to send the data message includes continuing to send an instruction and canceling the sending instruction, and the user may trigger to continue sending the instruction to normally send the sensitive data message, or may trigger to cancel sending.
  • the instruction retracts and modifies the above sensitive data message or deletes the above sensitive data message.
  • the mobile terminal continues to send the data message when detecting the resume sending command triggered by the user; when the mobile terminal detects the cancel sending command triggered by the user, the mobile terminal withdraws the data message, or deletes the above data packet. Data message.
  • FIG. 4 is a schematic diagram of a scenario for generating a reminder message for reminding a user whether to send a data packet in the fifth embodiment of the method for preventing leakage of sensitive information in the present application.
  • the mobile terminal when When the mobile terminal sends a message containing the sensitive information "xxx", the mobile terminal automatically generates a reminder message: "The message you want to send this time contains sensitive information 'xxx', whether to continue sending?", and displays on the mobile terminal operation interface .
  • the mobile terminal display interface when the user sends a message containing the phone number "135xxxxxxxx", the mobile terminal display interface generates a reminder message that "the message you want to send contains sensitive information '135xxxxxxxx', whether to continue sending?"
  • the terminal detects that the user triggers the “continue to send” command, the terminal sends the message. If the mobile terminal detects that the user has triggered the “cancel sending” command, the message is sent, and the message is deleted or modified. The message.
  • the method for preventing leakage of sensitive information in the embodiment when detecting any APP generating data message, calling a preset detection keyword, performing feature matching on the source data used to generate the data packet, if the source data If there is a field matching the detected keyword, the data packet is determined as a sensitive data packet, and a reminder message is generated for reminding the user whether to send the data packet, and then continues to be sent according to an instruction triggered by the user. Or canceling the sending of the data packet, thereby effectively preventing leakage of sensitive data stored in the mobile terminal, and further ensuring the security of storing data in the mobile terminal.
  • the present application also provides an apparatus for preventing leakage of sensitive information, the apparatus comprising a memory, a processor, and a sensitive information leakage prevention program stored on the memory and operable on the processor; the apparatus is preset by calling Detecting a keyword, performing feature matching on a file content stored locally in each APP installed in the mobile terminal, and if there is a field matching the detection keyword in the file content, determining the field as a sensitive field, and according to the The sensitive field generates a reminder message for reminding the user to delete the sensitive field, so that the user can discover and delete the sensitive information stored in each APP of the mobile terminal in time, and effectively protect personal privacy.
  • the field is determined as a sensitive field
  • FIG. 5 is a schematic structural diagram of a software operating environment involved in a device for preventing leakage of sensitive information.
  • the foregoing apparatus for preventing leakage of sensitive information may include: a processor 1001.
  • CPU central processing unit
  • network interface 1004 user interface 1003, memory 1005, communication bus 1002.
  • the communication bus 1002 is configured to implement connection communication between the components;
  • the user interface 1003 may include a display, an input unit such as a keyboard, and the optional user interface 1003 may further include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface, a wireless interface (such as a WI-FI interface); the memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile) Memory, such as a disk storage; the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
  • a wireless interface such as a WI-FI interface
  • the memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile) Memory, such as a disk storage; the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
  • FIG. 5 does not constitute a limitation to the above-described means for preventing leakage of sensitive information, and the device may include more or less components than those illustrated, or may combine certain components. Or different parts arrangement.
  • a memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and a sensitive information leakage prevention program.
  • the network interface 1004 is mainly used to connect to a background server for data communication with a background server; the user interface 1003 is mainly used to connect a client (user end) to perform data communication with the client; and the processor 1001 can use
  • the sensitive information leakage prevention program stored in the memory 1005 is called and the corresponding operation is performed.
  • the embodiments corresponding to the device for preventing the leakage of the sensitive information are substantially the same as the embodiments corresponding to the method for preventing the leakage of the sensitive information, and therefore are not described herein again.
  • the present application further provides a storage medium on which a sensitive information leakage prevention program is stored, and the storage medium can implement: calling a preset detection keyword to perform file content stored locally by each APP installed in the mobile terminal. Feature matching, if there is a field in the file content that matches the detection keyword, the field is determined as a sensitive field, and a reminder message for prompting the user to delete the sensitive field is generated according to the sensitive field, thereby enabling the user to Timely discover and delete sensitive information stored in each APP of the mobile terminal, effectively protecting personal privacy.
  • the field is determined as a sensitive field
  • the embodiments corresponding to the storage medium are substantially the same as the foregoing embodiments corresponding to the method for preventing leakage of sensitive information, and thus are not described herein again.
  • the present application also provides an apparatus for preventing leakage of sensitive information, and the apparatus for preventing leakage of sensitive information includes:
  • a judging module configured to call a preset detection keyword, perform feature matching on a file content stored locally by each application APP, and determine whether a field matching the detection keyword exists in the file content;
  • a determining module configured to determine the field as a sensitive field if a field matching the detected keyword exists in the file content
  • a generating module configured to generate, according to the sensitive field, a reminder message for reminding the user to delete the sensitive field.
  • the device for preventing leakage of sensitive information further includes:
  • the receiving module is configured to receive, in advance, a detection keyword for performing feature matching, where the detection keyword includes one or more of an ID card number, a phone number, a bank card number, a mailbox, an address, a name, an account name, and an account password.
  • the determining module includes:
  • a matching unit configured to perform feature matching on the detection keyword and each field of the file content
  • the first determining unit is configured to determine, when the matching similarity between the detection keyword and the arbitrary content of the file content is greater than a preset threshold, determining that a field matching the detected keyword exists in the file content.
  • the determining module further includes:
  • An obtaining unit configured to: when detecting an input operation triggered by a user, acquire personal information related to the detection keyword input by a user, and search for the personal information in a file content stored locally by each APP;
  • the second determining unit is configured to determine, if the personal information is found in the file content, a field that matches the detected keyword in the file content.
  • the device for preventing leakage of sensitive information further includes:
  • a writing module configured to write the storage directory corresponding to the field to the reminding message for reminding the user to delete the sensitive field.
  • the method further includes:
  • the sensitive field is permanently deleted.
  • the device for preventing the leakage of the sensitive information is further configured to: when detecting any APP-generated data message, calling the detection keyword, performing feature matching on the source data used to generate the data packet, and determining the source Whether there is a field in the data that matches the detected keyword;
  • the data packet is determined to be a sensitive data packet
  • a reminder message is generated for reminding the user whether to send the data message.
  • the device for preventing leakage of sensitive information is further configured to: if the continuous sending instruction triggered by the user is detected, send the data message;
  • the cancel sending instruction triggered by the user is detected, the data message is withdrawn or modified, or the data message is deleted.
  • the technical solution of the present application which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the methods described in the various embodiments of the present application.
  • a terminal device which may be a mobile phone, a computer, a server, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种防止敏感信息泄露的方法,该方法包括:调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。本申请还公开了一种防止敏感信息泄露的装置,以及一种存储介质。本申请能够使得用户及时发现并删除移动终端各个APP内存储的敏感信息,有效的保护个人隐私,解决了现有技术中无法有效检测以及删除移动终端本地存储的敏感信息,容易泄露敏感信息的技术问题。

Description

防止敏感信息泄露的方法、装置及存储介质
本申请要求于2017年06月16日提交中国专利局、申请号为201710463302.6、发明名称为“防止敏感信息泄露的方法、装置及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息安全技术领域,尤其涉及一种防止敏感信息泄露的方法、装置及存储介质。
背景技术
目前,移动终端上具有的应用程序种类越来越多,所能实现的功能也越来越广,用户在注册会员或者登录应用程序、使用应用程序过程中,难免会输入身份证号码、电话号码、住址等敏感信息,然后保存在该应用程序中。
在移动终端安装的应用程序种类较多,存储的文件类型及数量较多的情况下,便无法做到有效的检测以及删除敏感信息,从而容易将敏感信息泄露出去,给用户带来一些不必要的损失。
发明内容
本申请的主要目的在于提出一种防止敏感信息泄露的方法、装置及存储介质,旨在解决现有技术中无法有效检测以及删除移动终端本地存储的敏感信息,容易泄露敏感信息的技术问题。
为实现上述目的,本申请提供一种防止敏感信息泄露的方法,所述防止敏感信息泄露的方法包括:
调用预设的检测关键词,对各个APP(Application,应用程序)本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
此外,为实现上述目的,本申请还提供一种防止敏感信息泄露的装置,所述防止敏感信息泄露的装置包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的防止敏感信息泄露程序,所述防止敏感信息泄露程序被所述处理器执行时实现如下步骤:
调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
此外,为实现上述目的,本申请还提供一种存储介质,所述存储介质上存储有防止敏感信息泄露程序,所述防止敏感信息泄露程序被处理器执行时实现如上所述的防止敏感信息泄露的方法对应的各个步骤。
此外,为实现上述目的,本申请还提供一种防止敏感信息泄露的装置,所述防止敏感信息泄露的装置包括:
判断模块,用于调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
确定模块,用于若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
生成模块,用于根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
本申请所提供的防止敏感信息泄露的方法、装置及存储介质,能够实现:通过调用预设的检测关键词,对安装于移动终端内的各个APP对应本地存储的文件内容进行特征匹配,若该文件内容中存在与上述检测关键词相匹配的字段,则将该字段确定为敏感字段,并根据该敏感字段生成用于提醒用户删除该敏感字段的提醒消息,从而使得用户能够及时发现并删除移动终端各个APP内存储的敏感信息,有效的保护个人隐私,解决了现有技术中无法有效检测以及删除移动终端本地存储的敏感信息,容易泄露敏感信息的技术问题。
附图说明
图1为本申请防止敏感信息泄露的方法第一实施例的流程示意图;
图2为本申请防止敏感信息泄露的方法第五实施例的流程示意图;
图3为本申请第五实施例中移动终端对应的网络协议栈示意图;
图4为本申请防止敏感信息泄露的方法第五实施例中生成用于提醒用户是否发送数据报文的提醒消息的场景示意图;
图5为本申请防止敏感信息泄露的装置涉及的软件运行环境的结构示意图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
以下结合说明书附图对本申请的优选实施例进行说明,应当理解,此处所描述的优选实施例仅用于说明和解释本申请,并不用于限定本申请,并且在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
本申请以下实施例提供一种防止敏感信息泄露的方法,该方法通过调用预设的检测关键词,对安装于移动终端内的各个APP本地存储的文件内容进行特征匹配,若该文件内容中存在与上述检测关键词相匹配的字段,则将该字段确定为敏感字段,并根据该敏感字段生成用于提醒用户删除该敏感字段的提醒消息,从而使用户能够及时发现并删除移动终端各个APP内存储的敏感信息,有效的保护个人隐私。
参照图1,图1为本申请防止敏感信息泄露的方法第一实施例的流程示意图,本实施例中,本申请防止敏感信息泄露的方法包括:
步骤S10,调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段。
具体的,本步骤之前还包括:预先接收进行特征匹配的检测关键词,所述检测关键词包括身份证号码、电话号码、银行卡***、邮箱、地址、姓名、账户名、账户密码中一项或者多项。
本实施例中,移动终端可根据用户的自定义操作,对安装于移动终端内的各个APP本地存储的文件内容进行特征匹配,判断该文件内容中是否存在与所述检测关键词相匹配的字段,例如用户可自定义每隔一定的时间间隔(如每隔一天或者每隔一个星期),移动终端便自动调用上述检测关键词,对安装于移动终端内的各个APP本地存储的文件内容进行特征匹配;另外,移动终端也可以根据检测到的用户主动触发的敏感信息检测指令,来调用上述检测关键词,对安装于移动终端内的各个APP本地存储的文件内容进行特征匹配。
其中,用户可以自定义设置上述检测关键词,例如身份证号码、电话号码、银行卡***、邮箱、家庭/工作地址、姓名、账户名、账户密码等等。
可以理解的是,对于不同的检测关键词,其对应的字符特征也会不同,例如,对于身份证号码而言,其属于一组特征组合码,由17位数字本体码和1位数字校验码组成,排列顺序从左至右依次为:6位数字地址码,8位数字出生日期码,3位数字顺序码和1位数字校验码;对于电话号码而言,固话座机号码一般由7至8位数组成的,手机号码由11数字组成;对于银行卡***而言,各个商业银行之间的业务号段有统一的规定,一般由16至19位数字组成,***的前6位数字代表发卡行标识代码,不同的发卡行标识代码代表了不同的银行卡组织和卡片级别;对于邮箱而言,一般是由“用户名@邮箱域名”来组成;对于家庭/工作地址而言,一般由一串字符组成,内含国家、省份、城市或乡村、街道、门牌号码、大厦等建筑物名称,或者再加楼层数目、房间编号等。
其中,移动终端在调用上述检测关键词之后,则自动对各个应用程序APP本地存储的文件内容进行特征匹配,查找与上述检测关键词相匹配的字段。其中也包括根据上述检测关键词对于的特征,自动识别各个应用程序APP本地存储的文件内容中包含的敏感信息。例如,当某一APP本地存储的文件内容中包含一组由17位数字组成的字段,且前6位数字属于身份证号码中的地址码,则可以确定该字段为身份证号码;当该文件内容中包含一组由11位数字组成的字段,且前3位数字属于营运商投入的号码段(如138、135等),则可以确定该字段为电话号码。
步骤S20,若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段。
本实施例中,当移动终端任意APP本地存储的文件内容中存在与上述检测关键词相匹配的字段时,则将该字段确定为敏感字段。
步骤S30,根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
本实施例中,在确定某个APP本地存储的文件内容中存在敏感字段之后,则生成一条用于提醒用户删除该敏感字段的提醒消息,并输出至移动终端显示界面进行显示,或者发送至移动终端消息列表。
其中,用户在接收到上述提醒消息后,即可根据该提醒消息删除上述敏感字段。
本实施例所述的防止敏感信息泄露的方法,通过调用预设的检测关键词,对安装于移动终端内的各个APP对应本地存储的文件内容进行特征匹配,若该文件内容中存在与上述检测关键词相匹配的字段,则将该字段确定为敏感字段,并根据该敏感字段生成用于提醒用户删除该敏感字段的提醒消息,从而使得用户能够及时发现并删除移动终端各个APP内存储的敏感信息,有效的保护个人隐私,解决了现有技术中无法有效检测以及删除移动终端本地存储的敏感信息,容易泄露敏感信息的技术问题。
进一步地,基于上述图1所述的本申请防止敏感信息泄露的方法第一实施例,提出本申请防止敏感信息泄露的方法第二实施例,上述图1所示步骤S10中所述的判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤包括:
将所述检测关键词与所述文件内容的各个字段进行特征匹配;
当所述检测关键词与所述文件内容任意字段的匹配相似度大于预设的阈值时,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
本实施例中,用户可以根据自身需求,设置具体的检测关键词,来对安装于移动终端的各个APP本地存储的文件内容进行特征匹配,例如,用户可以设置检测关键词为“000111”,然后对上述文件内容的各个字段进行特征匹配,当上述文件内容任意字段与检测关键词“000111”的匹配相似度大于预设的阈值(如80%)时,则确定所述文件内容中存在与检测关键词相匹配的字段。
其中,对于关键词匹配相似度的计算方式具有很多种,本实施例提供以下可选的计算方式;
本实施例可根据不同类型的资源服务描述信息,如文字本体概念、句子、数值(包括数值区间和模糊数)、实体类(数据结构体)概念间的相似度匹配算法,来建立一个匹配模型。其中,上述相似度匹配算法包括:文字概念相似度算法、句子相似度算法、数值区间相似度算法等。
其中,文字概念相似度算法主要是先将文本转换为词向量空间,然后将匹配关键词分解为概念集合,通过计算概念间的内积空间,得到匹配关键词之间的匹配相似度,最后根据匹配关键词之间的匹配相似度,计算文本间的匹配相似度。句子相似度算法主要是基于句子的词表层特征和信息熵从数据资源库中选择出少量候选实例,然后针对这些候选实例进行泛华匹配,从而计算出句子之间的匹配相似度。数值区间相似度算法主要是利用学习样本得到单位相似度向量,并得到各维度数据的最优分区间,利用最优分区间得到预测样本与学习样本的单位相似度向量,从而得到预测样本的匹配相似度。
本实施例所述的防止敏感信息泄露的方法,当检测关键词与任意APP本地存储的文件内容任意字段的匹配相似度大于预设的阈值时,则确定该文件内容中存在与检测关键词相匹配的字段,由此既可以查找出上述文件内容中的敏感信息,还可以查找出类似敏感信息的字段,方便用户及时处理,能够有效提升移动终端内隐私信息的安全性。
进一步地,基于本申请防止敏感信息泄露的方法第一实施例,提出本申请防止敏感信息泄露的方法第三实施例,上述图1所示步骤S10中所述的判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤还包括:
当检测到由用户触发的输入操作时,获取用户输入的与所述检测关键词相关的个人信息,在各个APP本地存储的文件内容中查找所述个人信息;
若所述文件内容中能够查找出所述个人信息,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
本实施例中,用户还可以在移动终端的操作界面输入想要检测的个人信息,移动终端在获取到用户输入的个人信息后,自动在各个APP本地存储的文件内容中查找该个人信息;若能够查找出,则确定上述文件内容中存在与检测关键词相匹配的字段。
其中,本申请中可以利用信息检索的基本原理来进行特征匹配,信息检索原理是将表达信息需求的检索提问与存储在检索***中的信息标识进行异同的比较与匹配,选取两者相符或部分相符的信息予以输出。
例如,用户“张三”想要了解自己所使用的移动终端各个APP是否保存了自己的姓名,则只需要在移动终端操作界面输入自己的姓名“张三”,移动终端便自动在各个APP本地存储的文件内容中查找关键词“张三”,若能够查找出,则确定该移动终端某个APP存储有与检测关键词“张三”相匹配的字段。
本实施例所述的防止敏感信息泄露的方法,可以根据用户在移动终端操作界面输入需要检测的个人信息,然后移动终端自动在各个APP本地存储的文件内容中查找该个人信息,由此可以根据用户的需求精确查找出移动终端内存在的敏感信息,即本实施例能够准确查找出移动终端内存在的敏感信息,从而方便用户能够准确的删除此敏感信息,使得敏感信息不易泄露。
进一步地,基于本申请防止敏感信息泄露的方法第一、第二、第三实施例,提出本申请防止敏感信息泄露的方法第四实施例,上述图1所示步骤S20中所述的将所述字段确定为敏感字段的步骤之后还包括:
将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
本实施例中,在确定敏感字段之后,将该敏感字段对应的存储目录确定为敏感字段泄漏点,并将该存储目录写入到上述用于提醒用户删除所述敏感字段的提醒消息,用户在查看上述提醒消息时,既可以查看到上述敏感信息,又可以看到该敏感信息对应的存储目录。
其中,用户可以根据上述存储目录,查看上述敏感信息所在文件的位置,然后判断是否删除或修改该敏感信息。
可以理解的是,对于移动终端内安装的某些APP而言,例如记事本、日记本、office办公软件等等,其本地存储的文件中可能会存在一些与上述检测关键词相匹配的字段,但是用户仅仅根据该字段有时候并不能确定是否需要删除该字段,此时,用户需要根据该字段所在的文件,或根据该字段子在文件中的位置,结合上下文来判断是否删除该字段。
进一步地,上述图1所示步骤S30中所述的生成用于提醒用户删除所述敏感字段的提醒消息的步骤之后还包括:
若检测到由用户触发的删除指令,则将所述敏感字段永久删除。
本实施例中,上述提醒消息中携带有相应的删除指令,用于删除上述敏感字段。其中,用户在接收到上述提醒消息之后,若确定要删除该提醒消息中显示的敏感字段,则可以触发上述删除指令,移动终端在检测到由用户触发的删除指令之后,则将所述敏感字段永久删除。
本实施例所述的防止敏感信息泄露的方法,在确定敏感字段之后,将该敏感字段对应的存储目录确定为敏感字段泄漏点,并将该存储目录写入到上述用于提醒用户删除所述敏感字段的提醒消息,用户在查看上述提醒消息时,既可以查看到上述敏感信息,又可以看到该敏感信息对应的存储目录,从而有助于用户根据敏感信息的出处来确定是否删除该敏感信息,防止由于误删而导致用户资料丢失。
进一步地,基于本申请防止敏感信息泄露的方法第一、第二、第三、第四实施例,提出本申请防止敏感信息泄露的方法第五实施例,参照图2,图2为本申请防止敏感信息泄露的方法第五实施例的流程示意图,本实施例中,本申请防止敏感信息泄露的方法还包括:
步骤S40,在检测到任意APP生成数据报文时,调用所述检测关键词,对用于生成所述数据报文的源数据进行特征匹配,判断所述源数据中是否存在与所述检测关键词相匹配的字段;
步骤S50,若所述源数据中存在与所述检测关键词相匹配的字段,则将所述数据报文确定为敏感数据报文;
步骤S60,生成用于提醒用户是否发送所述数据报文的提醒消息。
本实施了中,在移动终端使用过程中,实时检测各个APP是否生成发送向其他终端的数据报文,在检测到任意APP生成数据报文时,则调用预设的检测关键词,对用于生成上述数据报文的源数据进行特征匹配,判断该源数据中是否存在与上述检测关键词相匹配的字段,若存在,则将该数据报文确定为敏感数据报文,并生成用于提醒用户是否发送所述数据报文的提醒消息。
其中,就移动通信***而言,本申请并不局限于所涉及的各个移动通信终端的具体通信协议,可以包括(但不限于)2G、3G、4G、5G网络,WCDMA、
CDMA2000、TD-SCDMA***等,不同的移动终端可以采用相同的通信协议,也可以采用不同的通信协议。同时,本申请也并不局限于移动终端的具体操作***,可以包括(但不限于)iOS、Windows Mobile、 Symbian、安卓((Android)等,不同的移动终端可以采用相同的操作***,也可以采用不同的操作***。
进一步的,参考图3,图3为本申请第五实施例中移动终端对应的网络协议栈示意图。在图3中,移动终端中具有用于处理数据报文的网络协议栈,在OSI (Open System Interconnection,开放式***互联)7层参考模型下,该协议栈也相应地包括7个协议层,即:物理层111,数据链路层112、网络层113、传输层114、会话层115、表示层116、应用层 117。
其中,网络层113对应于OSI参考模型中的第3层,其介于传输层114和数据链路层112之间。基于数据链路层112提供的在两个相邻端点之间传输数据帧的功能,网络层113进一步管理网络中的数据通信,将数据报文设法从源节点经过若干个中间节点传送到目标节点,从而向传输层114提供最基本的端到端的数据传输服务。
传输层114对应于OSI参考模型中相对重要和关键的一层,其是唯一负责总体数据传输和数据控制的一层。传输层114提供用于端到端的交换数据的机制。传输层114为会话层115、表示层116和应用层117等上三层提供可靠的传输服务,向网络层113提供可靠的目标节点信息。
应用层117对应于OSI参考模型的第7层。应用层117直接和应用程序的本地进程交互并提供常见的网络应用服务。应用层117也向表示层116发出请求。
本实施例中,可以在如图3所示的数据链路层112、网络层113、传输层114或会话层115、应用层117中,检测移动终端任意APP生成的数据报文。
进一步地,上述图2所示步骤S60中所述的生成用于提醒用户是否发送所述数据报文的提醒消息的步骤之后还包括:
若检测到由用户触发的继续发送指令,则发送所述数据报文;
若检测到由用户触发的取消发送指令,则将所述数据报文撤回修改,或删除所述数据报文。
本实施例中,上述用于提醒用户是否发送所述数据报文的提醒消息中包括继续发送指令与取消发送指令,用户可以触发继续发送指令来正常发送上述敏感数据报文,也可以触发取消发送指令来撤回修改上述敏感数据报文或删除上述敏感数据报文。
其中,移动终端在检测到由用户触发的继续发送指令时,则继续发送上述数据报文;移动终端在检测到由用户触发的取消发送指令时,则将上述数据报文撤回修改,或删除上述数据报文。
为了更好的理解本申请,参照图4,图4为本申请防止敏感信息泄露的方法第五实施例中生成用于提醒用户是否发送数据报文的提醒消息的场景示意图,图4中,当移动终端发送包含敏感信息“xxx”的消息时,移动终端就会自动生成提醒消息:“您本次所要发送的消息包含敏感信息‘xxx’,是否继续发送?”,并在移动终端操作界面显示。例如,当用户发送包含电话号码“135xxxxxxxx”的消息时,移动终端显示界面就会生成“您本次所要发送的消息包含敏感信息‘135xxxxxxxx’,是否继续发送?”的提醒消息,若此时移动终端检测到用户触发了“继续发送”指令,则将该消息进行发送,若此时移动终端检测到用户触发了“取消发送”指令,则将该消息进行发送,将该消息撤回修改,或删除该消息。
本实施例所述的防止敏感信息泄露的方法,在检测到任意APP生成数据报文时,调用预设的检测关键词,对用于生成数据报文的源数据进行特征匹配,若该源数据中存在与检测关键词相匹配的字段,则将该数据报文确定为敏感数据报文,并生成用于提醒用户是否发送所述数据报文的提醒消息,然后根据用户触发的指令,继续发送或取消发送该数据报文,从而能够有效防止移动终端内存储的敏感数据外泄,进一步保障了移动终端内存储数据的安全性。
本申请还提供一种防止敏感信息泄露的装置,该装置包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的防止敏感信息泄露程序;该装置通过调用预设的检测关键词,对安装于移动终端内的各个APP本地存储的文件内容进行特征匹配,若该文件内容中存在与上述检测关键词相匹配的字段,则将该字段确定为敏感字段,并根据该敏感字段生成用于提醒用户删除该敏感字段的提醒消息,从而使用户能够及时发现并删除移动终端各个APP内存储的敏感信息,有效的保护个人隐私。
具体的,上述防止敏感信息泄露程序被处理器执行时实现如下步骤:
调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
为了更好的理解本申请,参照图5,图5为本申请防止敏感信息泄露的装置涉及的软件运行环境的结构示意图,本实施例中,上述防止敏感信息泄露的装置可包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信;用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口;网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口);存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器;存储器1005可选的还可以是独立于前述处理器1001的存储装置。
本领域技术人员可以理解,图5中示出的***结构并不构成对上述防止敏感信息泄露的装置的限定,该装置可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图5所示,作为一种计算机存储介质的存储器1005中,可以包括操作***、网络通信模块、用户接口模块以及防止敏感信息泄露程序。
如图5所示,网络接口1004主要用于连接后台服务器,与后台服务器进行数据通信;用户接口1003主要用于连接客户端(用户端),与客户端进行数据通信;而处理器1001可以用于调用存储器1005中存储的防止敏感信息泄露程序,并执行相应的操作。
其中,该防止敏感信息泄露的装置对应的实施例与上述防止敏感信息泄露的方法对应的各个实施例基本相同,故在此不再赘述。
本申请还提供一种存储介质,该存储介质上存储有防止敏感信息泄露程序,该存储介质能够实现:调用预设的检测关键词,对安装于移动终端内的各个APP本地存储的文件内容进行特征匹配,若该文件内容中存在与上述检测关键词相匹配的字段,则将该字段确定为敏感字段,并根据该敏感字段生成用于提醒用户删除该敏感字段的提醒消息,从而使用户能够及时发现并删除移动终端各个APP内存储的敏感信息,有效的保护个人隐私。
具体的,上述防止敏感信息泄露程序被处理器执行时实现如下步骤:
调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
其中,该存储介质对应的实施例与上述防止敏感信息泄露的方法对应的各个实施例基本相同,故在此不再赘述。
本申请还提供一种防止敏感信息泄露的装置,该防止敏感信息泄露的装置包括:
判断模块,用于调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
确定模块,用于若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
生成模块,用于根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
进一步地,所述防止敏感信息泄露的装置还包括:
接收模块,用于预先接收进行特征匹配的检测关键词,所述检测关键词包括身份证号码、电话号码、银行卡***、邮箱、地址、姓名、账户名、账户密码中一项或者多项。
进一步地,所述判断模块包括:
匹配单元,用于将所述检测关键词与所述文件内容的各个字段进行特征匹配;
第一确定单元,用于当所述检测关键词与所述文件内容任意字段的匹配相似度大于预设的阈值时,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
进一步地,所述判断模块还包括:
获取单元,用于当检测到由用户触发的输入操作时,获取用户输入的与所述检测关键词相关的个人信息,在各个APP本地存储的文件内容中查找所述个人信息;
第二确定单元,用于若所述文件内容中能够查找出所述个人信息,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
进一步地,所述防止敏感信息泄露的装置还包括:
写入模块,用于将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
进一步地,所述生成用于提醒用户删除所述敏感字段的提醒消息的步骤之后还包括:
若检测到由用户触发的删除指令,则将所述敏感字段永久删除。
进一步地,防止敏感信息泄露的装置还用于在检测到任意APP生成数据报文时,调用所述检测关键词,对用于生成所述数据报文的源数据进行特征匹配,判断所述源数据中是否存在与所述检测关键词相匹配的字段;
若所述源数据中存在与所述检测关键词相匹配的字段,则将所述数据报文确定为敏感数据报文;
生成用于提醒用户是否发送所述数据报文的提醒消息。
所述防止敏感信息泄露的装置还用于:若检测到由用户触发的继续发送指令,则发送所述数据报文;
若检测到由用户触发的取消发送指令,则将所述数据报文撤回修改,或删除所述数据报文。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者***不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者***所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者***中还存在另外的相同要素。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (26)

  1. 一种防止敏感信息泄露的方法,其特征在于,所述防止敏感信息泄露的方法包括:
    调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
    若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
    根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
  2. 如权利要求1所述的防止敏感信息泄露的方法,其特征在于,所述调用预设的检测关键词,对各个APP本地存储的文件内容进行特征匹配的步骤之前还包括:
    预先接收进行特征匹配的检测关键词,所述检测关键词包括身份证号码、电话号码、银行卡***、邮箱、地址、姓名、账户名、账户密码中一项或者多项。
  3. 如权利要求1所述的防止敏感信息泄露的方法,其特征在于,判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤包括:
    将所述检测关键词与所述文件内容的各个字段进行特征匹配;
    当所述检测关键词与所述文件内容任意字段的匹配相似度大于预设的阈值时,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  4. 如权利要求1所述的防止敏感信息泄露的方法,其特征在于,判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤还包括:
    当检测到由用户触发的输入操作时,获取用户输入的与所述检测关键词相关的个人信息,在各个APP本地存储的文件内容中查找所述个人信息;
    若所述文件内容中能够查找出所述个人信息,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  5. 如权利要求3所述的防止敏感信息泄露的方法,其特征在于,将所述字段确定为敏感字段的步骤之后还包括:
    将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
  6. 如权利要求4所述的防止敏感信息泄露的方法,其特征在于,将所述字段确定为敏感字段的步骤之后还包括:
    将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
  7. 如权利要求5所述的防止敏感信息泄露的方法,其特征在于,所述生成用于提醒用户删除所述敏感字段的提醒消息的步骤之后还包括:
    若检测到由用户触发的删除指令,则将所述敏感字段永久删除。
  8. 如权利要求7所述的防止敏感信息泄露的方法,其特征在于,所述防止敏感信息泄露的方法还包括:
    在检测到任意APP生成数据报文时,调用所述检测关键词,对用于生成所述数据报文的源数据进行特征匹配,判断所述源数据中是否存在与所述检测关键词相匹配的字段;
    若所述源数据中存在与所述检测关键词相匹配的字段,则将所述数据报文确定为敏感数据报文;
    生成用于提醒用户是否发送所述数据报文的提醒消息。
  9. 如权利要求8所述的防止敏感信息泄露的方法,其特征在于,所述生成用于提醒用户是否发送所述数据报文的提醒消息的步骤之后还包括:
    若检测到由用户触发的继续发送指令,则发送所述数据报文;
    若检测到由用户触发的取消发送指令,则将所述数据报文撤回修改,或删除所述数据报文。
  10. 一种防止敏感信息泄露的装置,其特征在于,所述防止敏感信息泄露的装置包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的防止敏感信息泄露程序,所述防止敏感信息泄露程序被所述处理器执行时实现如下步骤:
    调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
    若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
    根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
  11. 如权利要求10所述的防止敏感信息泄露的装置,其特征在于,判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤包括:
    将所述检测关键词与所述文件内容的各个字段进行特征匹配;
    当所述检测关键词与所述文件内容任意字段的匹配相似度大于预设的阈值时,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  12. 如权利要求10所述的防止敏感信息泄露的装置,其特征在于,判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤还包括:
    当检测到由用户触发的输入操作时,获取用户输入的与所述检测关键词相关的个人信息,在各个APP本地存储的文件内容中查找所述个人信息;
    若所述文件内容中能够查找出所述个人信息,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  13. 如权利要求11所述的防止敏感信息泄露的装置,其特征在于,将所述字段确定为敏感字段的步骤之后还包括:
    将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
  14. 如权利要求13所述的防止敏感信息泄露的装置,其特征在于,所述生成用于提醒用户删除所述敏感字段的提醒消息的步骤之后还包括:
    若检测到由用户触发的删除指令,则将所述敏感字段永久删除。
  15. 如权利要求14所述的防止敏感信息泄露的装置,其特征在于,所述防止敏感信息泄露的方法还包括:
    在检测到任意APP生成数据报文时,调用所述检测关键词,对用于生成所述数据报文的源数据进行特征匹配,判断所述源数据中是否存在与所述检测关键词相匹配的字段;
    若所述源数据中存在与所述检测关键词相匹配的字段,则将所述数据报文确定为敏感数据报文;
    生成用于提醒用户是否发送所述数据报文的提醒消息。
  16. 如权利要求15所述的防止敏感信息泄露的装置,其特征在于,所述生成用于提醒用户是否发送所述数据报文的提醒消息的步骤之后还包括:
    若检测到由用户触发的继续发送指令,则发送所述数据报文;
    若检测到由用户触发的取消发送指令,则将所述数据报文撤回修改,或删除所述数据报文。
  17. 一种存储介质,其特征在于,所述存储介质上存储有防止敏感信息泄露程序,所述防止敏感信息泄露程序被处理器执行时实现如下步骤:调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
    若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
    根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
  18. 如权利要求17所述的存储介质,其特征在于,判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤包括:
    将所述检测关键词与所述文件内容的各个字段进行特征匹配;
    当所述检测关键词与所述文件内容任意字段的匹配相似度大于预设的阈值时,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  19. 如权利要求17所述的存储介质,其特征在于,判断所述文件内容中是否存在与所述检测关键词相匹配的字段的步骤还包括:
    当检测到由用户触发的输入操作时,获取用户输入的与所述检测关键词相关的个人信息,在各个APP本地存储的文件内容中查找所述个人信息;
    若所述文件内容中能够查找出所述个人信息,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  20. 如权利要求18所述的存储介质,其特征在于,将所述字段确定为敏感字段的步骤之后还包括:
    将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
  21. 一种防止敏感信息泄露的装置,其特征在于,所述防止敏感信息泄露的装置包括:
    判断模块,用于调用预设的检测关键词,对各个应用程序APP本地存储的文件内容进行特征匹配,判断所述文件内容中是否存在与所述检测关键词相匹配的字段;
    确定模块,用于若所述文件内容中存在与所述检测关键词相匹配的字段,则将所述字段确定为敏感字段;
    生成模块,用于根据所述敏感字段,生成用于提醒用户删除所述敏感字段的提醒消息。
  22. 如权利要求21所述的防止敏感信息泄露的装置,其特征在于,所述防止敏感信息泄露的装置还包括:
    接收模块,用于预先接收进行特征匹配的检测关键词,所述检测关键词包括身份证号码、电话号码、银行卡***、邮箱、地址、姓名、账户名、账户密码中一项或者多项。
  23. 如权利要求21所述的防止敏感信息泄露的装置,其特征在于,所述判断模块包括:
    匹配单元,用于将所述检测关键词与所述文件内容的各个字段进行特征匹配;
    第一确定单元,用于当所述检测关键词与所述文件内容任意字段的匹配相似度大于预设的阈值时,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  24. 如权利要求21所述的防止敏感信息泄露的装置,其特征在于,所述判断模块还包括:
    获取单元,用于当检测到由用户触发的输入操作时,获取用户输入的与所述检测关键词相关的个人信息,在各个APP本地存储的文件内容中查找所述个人信息;
    第二确定单元,用于若所述文件内容中能够查找出所述个人信息,则确定所述文件内容中存在与所述检测关键词相匹配的字段。
  25. 如权利要求23所述的防止敏感信息泄露的装置,其特征在于,所述防止敏感信息泄露的装置还包括:
    写入模块,用于将所述字段对应的存储目录写入到所述用于提醒用户删除所述敏感字段的提醒消息。
  26. 如权利要求25所述的防止敏感信息泄露的装置,其特征在于,所述生成用于提醒用户删除所述敏感字段的提醒消息的步骤之后还包括:
    若检测到由用户触发的删除指令,则将所述敏感字段永久删除。
PCT/CN2018/083843 2017-06-16 2018-04-20 防止敏感信息泄露的方法、装置及存储介质 WO2018228050A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710463302.6 2017-06-16
CN201710463302.6A CN107862214A (zh) 2017-06-16 2017-06-16 防止敏感信息泄露的方法、装置及存储介质

Publications (1)

Publication Number Publication Date
WO2018228050A1 true WO2018228050A1 (zh) 2018-12-20

Family

ID=61699090

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/083843 WO2018228050A1 (zh) 2017-06-16 2018-04-20 防止敏感信息泄露的方法、装置及存储介质

Country Status (2)

Country Link
CN (1) CN107862214A (zh)
WO (1) WO2018228050A1 (zh)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107862214A (zh) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 防止敏感信息泄露的方法、装置及存储介质
CN109960938A (zh) * 2017-12-22 2019-07-02 北京三快在线科技有限公司 敏感信息的处理方法、装置、介质和电子设备
CN110557498A (zh) * 2018-05-31 2019-12-10 中兴通讯股份有限公司 一种移动终端应用内容显示的方法及装置
CN109302338B (zh) * 2018-08-31 2022-04-19 南昌努比亚技术有限公司 智能风险提示方法、移动终端及计算机可读存储介质
CN109598139A (zh) * 2018-11-21 2019-04-09 金色熊猫有限公司 隐私信息处理方法、装置、电子设备及计算机可读介质
CN109766719B (zh) * 2018-12-28 2021-03-02 微梦创科网络科技(中国)有限公司 一种敏感信息检测方法、装置及电子设备
CN110222170B (zh) * 2019-04-25 2024-05-24 平安科技(深圳)有限公司 一种识别敏感数据的方法、装置、存储介质及计算机设备
CN110460583B (zh) * 2019-07-15 2022-06-03 中国平安人寿保险股份有限公司 一种敏感信息记录方法及装置、电子设备
CN111027095B (zh) * 2019-12-10 2023-02-28 北京小米移动软件有限公司 隐私数据的识别方法、装置、设备及可读存储介质
CN111092895B (zh) * 2019-12-23 2022-09-23 和元达信息科技有限公司 一种互联网敏感数据安全防护***及方法
CN111294459B (zh) * 2020-01-21 2022-04-12 上海万物新生环保科技集团有限公司 检测安卓手机隐私的方法、设备及存储介质
CN111277696A (zh) * 2020-01-21 2020-06-12 上海悦易网络信息技术有限公司 检测苹果手机隐私的方法及设备
CN113496035A (zh) * 2020-04-08 2021-10-12 阿里巴巴集团控股有限公司 信息、笔记信息、代码检测方法、设备及存储介质
CN112291341A (zh) * 2020-10-28 2021-01-29 维沃移动通信有限公司 文件传输方法、装置和设备
CN113852626A (zh) * 2021-09-23 2021-12-28 杭州安恒信息安全技术有限公司 一种泄密监控方法、***、装置及存储介质
CN114936374B (zh) * 2022-05-20 2023-03-21 合肥亚慕信息科技有限公司 基于人工智能算法数据安全保护方法
CN117077207A (zh) * 2023-09-01 2023-11-17 广州世安智慧科技有限公司 一种敏感信息检测方法及***

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799816A (zh) * 2009-12-25 2010-08-11 华为终端有限公司 一种搜索移动终端信息中关键词的方法和移动终端
CN102547621A (zh) * 2010-12-23 2012-07-04 ***通信集团公司 一种垃圾短信监控与处理的***、装置及方法
CN105159913A (zh) * 2015-07-06 2015-12-16 北京金山安全软件有限公司 一种待清理文件确定方法及装置
CN107862214A (zh) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 防止敏感信息泄露的方法、装置及存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158978A (zh) * 2014-08-27 2014-11-19 北京数字天域科技股份有限公司 一种信息自动删除的方法及装置
CN105809042A (zh) * 2014-12-31 2016-07-27 中兴通讯股份有限公司 信息保护、显示方法及信息保护、显示装置及终端
CN105337988A (zh) * 2015-11-20 2016-02-17 刘奇 一种防止敏感信息泄露的方法及***
CN106385506A (zh) * 2016-09-21 2017-02-08 乐视控股(北京)有限公司 信息通知管理方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799816A (zh) * 2009-12-25 2010-08-11 华为终端有限公司 一种搜索移动终端信息中关键词的方法和移动终端
CN102547621A (zh) * 2010-12-23 2012-07-04 ***通信集团公司 一种垃圾短信监控与处理的***、装置及方法
CN105159913A (zh) * 2015-07-06 2015-12-16 北京金山安全软件有限公司 一种待清理文件确定方法及装置
CN107862214A (zh) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 防止敏感信息泄露的方法、装置及存储介质

Also Published As

Publication number Publication date
CN107862214A (zh) 2018-03-30

Similar Documents

Publication Publication Date Title
WO2018228050A1 (zh) 防止敏感信息泄露的方法、装置及存储介质
WO2019037396A1 (zh) 账户清结算方法、装置、设备及存储介质
WO2015196960A1 (en) Method and system for checking security of url for mobile terminal
WO2018107610A1 (zh) 业务数据处理方法、***、设备及计算机可读存储介质
WO2019192085A1 (zh) 银企直联通信方法、装置、设备及计算机可读存储介质
WO2017142293A1 (en) Electronic device and method of application data display therefor
WO2020138928A1 (en) Information processing method, apparatus, electrical device and readable storage medium
WO2019104876A1 (zh) 保险产品的推送方法、***、终端、客户终端及存储介质
WO2019196213A1 (zh) 接口测试方法、装置、设备及计算机可读存储介质
WO2017054592A1 (zh) 一种界面显示的方法及终端
WO2019061613A1 (zh) 贷款资质筛选方法、装置及计算机可读存储介质
WO2015131803A1 (en) Application recommending method and system
WO2015120808A1 (en) Method and system for security protection of account information
WO2014084498A2 (ko) 웹사이트와 어플에서의 회원 간 만남주선 시스템
WO2017142256A1 (en) Electronic device for authenticating based on biometric data and operating method thereof
WO2015072670A1 (en) System and method of sharing profile image card for communication
WO2019161597A1 (zh) 基于即时通讯的信息发送方法、装置、设备和存储介质
WO2018233370A1 (zh) 镜像同步方法、***、设备及计算机可读存储介质
WO2019100531A1 (zh) 数字签名生成、验证方法及其设备和存储介质
WO2017099342A1 (ko) 임시 계정 정보를 제공하는 방법, 장치 및 시스템
WO2018166091A1 (zh) 贷款面签方法、***、终端及计算机可读存储介质
WO2017028597A1 (zh) 一种虚拟资源的数据处理方法及装置
EP3405861A1 (en) Electronic device and method for operating the same
WO2018034491A1 (en) A primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
WO2019109521A1 (zh) 视频面签身份审核方法、装置、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18816649

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18816649

Country of ref document: EP

Kind code of ref document: A1