CN104063671A - Information security management method and system - Google Patents

Information security management method and system Download PDF

Info

Publication number
CN104063671A
CN104063671A CN201310091662.XA CN201310091662A CN104063671A CN 104063671 A CN104063671 A CN 104063671A CN 201310091662 A CN201310091662 A CN 201310091662A CN 104063671 A CN104063671 A CN 104063671A
Authority
CN
China
Prior art keywords
storage space
information
protected
space
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310091662.XA
Other languages
Chinese (zh)
Other versions
CN104063671B (en
Inventor
雷宇
何竞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310091662.XA priority Critical patent/CN104063671B/en
Publication of CN104063671A publication Critical patent/CN104063671A/en
Application granted granted Critical
Publication of CN104063671B publication Critical patent/CN104063671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The invention discloses an information security management method and system and belongs to the technical field of information security. The method comprises the steps as follows: creating a first storage space through a space entrance, and saving a first user password set for the first storage space which is used for storing to-be-protected information; matching the to-be-protected information in the first storage space with to-be-protected information in a second storage space, wherein the second storage space is created before the first storage space; if information matched with the to-be-protected information in the second storage space exists in the to-be-protected information in the first storage space, setting the first storage space to be unable to obtain information related to the matched information. By the aid of the information security management method, the security of the information in the storage space created before is effectively protected, intercepting behaviour of a malicious user is prevented, and the information security is improved.

Description

The method and system of information security management
Technical field
The present invention relates to field of information security technology, particularly a kind of method and system of information security management.
Background technology
At present, along with the convenient practicality of smart mobile phone, the demonstration of the feature such as powerful, smart mobile phone is universal coming in various user groups gradually also, causes thus a series of mobile phone safety problem.Smart mobile phone safety mainly refers to uses smart mobile phone to carry out the security of the information that produces in communication process, and this category information may be revealed in intentional or unintentional situation, once reveal, will cause damage to cellie.Therefore, numerous terminal business, software business man etc. have proposed the solution of mobile phone information safety in succession.
Comparatively common a solution is at present, user can create a storage space on smart mobile phone, and this storage space is for storing the information of need to be keep secret, and a password is set for this storage space, user just can enter this storage space by password, with the safety of guarantee information.
At least there is following problem in prior art: if there is malicious user to create another one storage space on user's smart mobile phone; setting goes this storage space to go to obtain the data of contact person a in original storage space; after receiving the information of contact person a; smart mobile phone change meeting sends to this two storage spaces by the information of contact person a simultaneously; make malicious user obtain information that should be secret, the information on smart mobile phone just can not effectively be protected like this.
Summary of the invention
In order to guarantee the information security in terminal, in the embodiment of the present invention, provide a kind of method and system of information security management.Described technical scheme is as follows:
On the one hand, provide a kind of method of information security management, described method comprises:
By space entrance, create the first storage space, and save as the first user password that described the first storage space arranges, described the first storage space is for storing information to be protected;
Information to be protected in described the first storage space is mated with information to be protected in the second storage space, and wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space;
If in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
On the other hand, provide a kind of system of information security management, described device comprises: described system comprises:
Creation module, for creating the first storage space by space entrance, and saves as the first user password that described the first storage space arranges, and described the first storage space is for storing information to be protected;
Matching module, for described the first storage space information to be protected is mated with information to be protected in the second storage space, wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space;
Module is set, if in described the first storage space information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is: by space entrance, create the first storage space, and save as the first user password that described the first storage space arranges, described the first storage space is for storing information to be protected; Information to be protected in described the first storage space is mated with information to be protected in the second storage space, and wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space; If in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.Thereby effectively protected the information security in the storage space first creating, prevented the eavesdropping behavior of malicious user, the security that has improved information.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the method flow diagram of a kind of information security of providing in the embodiment of the present invention one;
Fig. 2 is the method flow diagram of a kind of information security of providing in the embodiment of the present invention two;
Fig. 3 is the system architecture schematic diagram of a kind of information security of providing in the embodiment of the present invention three;
Fig. 4 is the system architecture schematic diagram of the another kind of information security that provides in the embodiment of the present invention three.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
The method and system of the information security management of the embodiment of the present invention can run on the operating system platform for Portable movable smart machine that the exploitation of Android(Google is installed), the operating system platform for Portable movable smart machine of iOS(Apple exploitation), the operating system platform for Portable movable smart machine of Windows Phone(Microsoft exploitation) terminal of operating system such as, this terminal can be mobile phone, palm PC, any one in panel computer etc., in this terminal, can comprise central processing unit, storer, switching device, power supply, clock signal maker, image processor, combination in any in Sound Processor Unit etc., above-mentioned central processing unit, storer, switching device, power supply, clock signal maker, image processor, combination in any in Sound Processor Unit etc. is for realizing the method for information security management and the function of Information Security Management System of embodiments of the invention.
In the present embodiment, for user provides a space entrance, by this portal users, can create for storing the storage space of information to be protected, i.e. user's private space.Wherein, described space entrance is an independent function in terminal, particularly, can reserve on the table the icon of this function, user can enter space entrance by clicking this icon, certainly, can adopt alternate manner to trigger space entrance, not do too much explanation herein.
The first and second execution sequences that do not represent successively that relate in the present embodiment, just in order to illustrate two different storage spaces.
Embodiment mono-
Referring to Fig. 1, a kind of method of information security management is provided in the present embodiment, comprising:
101, by space entrance, create the first storage space, and save as the first user password that described the first storage space arranges, described the first storage space is for storing information to be protected;
102, information to be protected in described the first storage space is mated with information to be protected in the second storage space, wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space;
If in 103 described the first storage spaces, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
In another embodiment, described by space entrance, create the first storage space before, also comprise:
By space entrance, create the second storage space, and save as the second user cipher that described storage space arranges, described the second storage space is for storing information to be protected.
In another embodiment, described method also comprises:
After the relevant information of information that receives described coupling, described relevant information is stored in described the second storage space.
In another embodiment, described method also comprises:
Delete the sign of the information of the coupling in described the second storage space and described the first storage space;
In described the first storage space, again store the information of described coupling;
After the relevant information of information that receives described coupling, described relevant information is stored in described the first storage space.
In another embodiment, described method also comprises:
If described space entrance is triggered and receives the password that user inputs, confirm the storage space corresponding with the password of described user's input, and enter the storage space that described password is corresponding.
The beneficial effect of the present embodiment is: by space entrance, create the first storage space, and save as the first user password that described storage space arranges, described the first storage space is for storing information to be protected; Information to be protected in described the first storage space is mated with information to be protected in the second storage space, and wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space; If in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.Thereby effectively protected the information security in the storage space first creating, prevented the eavesdropping behavior of malicious user, the security that has improved information.
Embodiment bis-
A kind of method of information security management is provided in the embodiment of the present invention, and referring to Fig. 2, method flow comprises:
201, by space entrance, create the second storage space, and save as the second user cipher that described storage space arranges.
In the present embodiment, for the safety of protection information, user creates the second storage space by space entrance in terminal, and user's private space, can store user's information to be protected in this storage space.Information to be protected in the present embodiment can be any information relevant with terminal, includes but not limited to: user's personal information, address list, note, message registration, photo, p.m.entry etc.
When creating the second storage space, be that the second storage space arranges corresponding access code, user is only had by input reference password could conduct interviews to the second storage space, to guarantee the information security in the second storage space.Wherein, preferably, password can be numerical ciphers, and the length of password can be 6,9 or 10 etc., in this present embodiment and be not specifically limited.
202, by space entrance, create the first storage space, and save as the first user password that described the first storage space arranges.
In the present embodiment, consider that user may need different information classification to preserve, allow user to create a plurality of storage spaces by space entrance, and corresponding access code is set for this storage space.Concrete how by space entrance, realize in establishment the present embodiment of a plurality of storage spaces and be not specifically limited.
In the present embodiment, by space entrance, create the first storage space, and be that the first storage space arranges the first access code, wherein, the first access code is different from the second access code, to facilitate the management of user to different storage spaces.
In the present embodiment, user can create according to identical flow process a plurality of storage spaces, and this sentences and creates the first and second storage spaces is that example describes.If described space entrance is triggered and receives the password that user inputs, confirm the storage space corresponding with the password of described user's input, and enter the storage space that described password is corresponding, this present embodiment is repeated no more.
203, information to be protected in described the first storage space is mated with information to be protected in the second storage space; if in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
In the present embodiment, in order to prevent that the first storage space from being that malicious user creates for eavesdropping private information, when creating the first storage space, information to be protected in the first storage space is mated with information to be protected in described the second storage space, to judge whether the information needing protection in the first storage space comprises information to be protected in the second storage space, if the first storage space comprises the information to be protected in the second storage space, the relevant information that the first storage space can not get the information of described coupling is set, after receiving the information relevant to the information of mating, directly store this information into second storage space.Wherein the information relevant to match information includes but not limited to: note, phone or mail etc., be not specifically limited this present embodiment.For example, in the second storage space, stored the information of contact person a, the first storage space is also set the information of storing contact a, after two storage spaces mate, found the information of common contact person a, the first storage space is set and can not obtains the information relevant to contact person a, as the note of contact person a, phone or mail etc.
In concrete the present embodiment, in finding the first storage space, have after the information matching with the second storage space, the sign of the information matching described in can retaining in the first storage space, for example, name of contact person or contact person's contact method etc., but this sign is entity function not, can not receive the information relevant to the information of mating.
What deserves to be explained is; if having other storage space also to have precedence over the first storage space in terminal creates; also need the information to be protected in the first storage space to mate with the information to be protected in other storage space respectively, to prevent the eavesdropping behavior of malicious user.
204,, after the relevant information of information that receives described coupling, described relevant information is stored in described the second storage space.
In this step, owing to having set the storage mode of the information of coupling, after receiving the information relevant to the information of mating, directly this information is stored in the second storage space, the first storage space can not obtain this information, thereby effectively stoped the eavesdropping behavior of malicious user, the security that has improved information.
In addition, if the establishment of the establishment of the first storage space and the second storage space is all legal in the present embodiment, it is the establishment that terminal user carries out, if user wants to revise the memory location of the information of the coupling in the first storage space and the second storage space, can enter corresponding storage space according to password, delete the sign of the information of the coupling in the first storage space and the second storage space, and in the first storage space, again store the information of described coupling.After the relevant information of information that receives described coupling, described relevant information is stored in described the first storage space like this.Wherein, because storage space has cryptoguard, even if the first storage space is malicious user, create, malicious user can not enter easily the second storage space and delete band protection information above.
The beneficial effect of the present embodiment is: by space entrance, create the first storage space, and save as the first user password that described storage space arranges, described the first storage space is for storing information to be protected; Information to be protected in described the first storage space is mated with information to be protected in the second storage space, and wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space; If in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.Thereby effectively protected the information security in the storage space first creating, prevented the eavesdropping behavior of malicious user, the security that has improved information.
Embodiment tri-
Referring to Fig. 3, a kind of system of information security management is provided in the embodiment of the present invention, comprising: creation module 301, matching module 302 and module 303 is set.
Creation module 301, for creating the first storage space by space entrance, and saves as the first user password that described storage space arranges, and described the first storage space is for storing information to be protected;
Matching module 302, for described the first storage space information to be protected is mated with information to be protected in the second storage space, wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space;
Module 303 is set, if in described the first storage space information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
In another embodiment, described creation module 301 also for:
Before creating the first storage space by space entrance, by space entrance, create the second storage space, and save as the second user cipher that described storage space arranges, described the second storage space is for storing information to be protected.
Referring to Fig. 4, in another embodiment, described system also comprises:
The first memory module 304, after the relevant information of information when receiving described coupling, stores described relevant information in described the second storage space into.
Referring to Fig. 4, in another embodiment, described system also comprises:
Removing module 305, for deleting the sign of information of the coupling of described the second storage space and described the first storage space;
The second memory module 306, for again storing the information of described coupling at described the first storage space;
Described the first memory module 304, also, for after the relevant information of information when receiving described coupling, stores described relevant information in described the first storage space into.
Referring to Fig. 4, in another embodiment, described system also comprises:
Confirm module 307, if be triggered and receive the password that user inputs for described space entrance, confirm the storage space corresponding with the password of described user's input, and enter the storage space that described password is corresponding.
The beneficial effect of the present embodiment is: by space entrance, create the first storage space, and save as the first user password that described storage space arranges, described the first storage space is for storing information to be protected; Information to be protected in described the first storage space is mated with information to be protected in the second storage space, and wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space; If in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.Thereby effectively protected the information security in the storage space first creating, prevented the eavesdropping behavior of malicious user, the security that has improved information.
It should be noted that: the system of the information security management that above-described embodiment provides, only the division with above-mentioned each functional module is illustrated, in practical application, can above-mentioned functions be distributed and by different functional modules, completed as required, the inner structure of the system of being about to is divided into different functional modules, to complete all or part of function described above.
In addition, the system of the information security management that above-described embodiment provides and the embodiment of the method for information security management belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can come the hardware that instruction is relevant to complete by program, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a method for information security management, is characterized in that, described method comprises:
By space entrance, create the first storage space, and save as the first user password that described the first storage space arranges, described the first storage space is for storing information to be protected;
Information to be protected in described the first storage space is mated with information to be protected in the second storage space, and wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space;
If in described the first storage space, in information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
2. method according to claim 1, is characterized in that, described by space entrance, create the first storage space before, also comprise:
By space entrance, create the second storage space, and save as the second user cipher that described the second storage space arranges, described the second storage space is for storing information to be protected.
3. method according to claim 1, is characterized in that, described method also comprises:
After the relevant information of information that receives described coupling, described relevant information is stored in described the second storage space.
4. method according to claim 1, is characterized in that, described method also comprises:
Delete the sign of the information of the coupling in described the second storage space and described the first storage space;
In described the first storage space, again store the information of described coupling;
After the relevant information of information that receives described coupling, described relevant information is stored in described the first storage space.
5. method according to claim 1, is characterized in that, described method also comprises:
If described space entrance is triggered and receives the password that user inputs, confirm the storage space corresponding with the password of described user's input, and enter the storage space that described password is corresponding.
6. a system for information security management, is characterized in that, described system comprises:
Creation module, for creating the first storage space by space entrance, and saves as the first user password that described the first storage space arranges, and described the first storage space is for storing information to be protected;
Matching module, for described the first storage space information to be protected is mated with information to be protected in the second storage space, wherein, the creation-time of described the second storage space is before the creation-time of described the first storage space;
Module is set, if in described the first storage space information to be protected, have with described the second storage space in the information that matches of information to be protected, the relevant information that described the first storage space can not get the information of described coupling is set.
7. system according to claim 6, is characterized in that, described creation module also for:
Before creating the first storage space by space entrance, by space entrance, create the second storage space, and save as the second user cipher that described the second storage space arranges, described the second storage space is for storing information to be protected.
8. system according to claim 6, is characterized in that, described system also comprises:
The first memory module, after the relevant information of information when receiving described coupling, stores described relevant information in described the second storage space into.
9. system according to claim 6, is characterized in that, described system also comprises:
Removing module, for deleting the sign of information of the coupling of described the second storage space and described the first storage space;
The second memory module, for again storing the information of described coupling at described the first storage space;
Described the first memory module, also, for after the relevant information of information when receiving described coupling, stores described relevant information in described the first storage space into.
10. system according to claim 6, is characterized in that, described system also comprises:
Confirm module, if be triggered and receive the password that user inputs for described space entrance, confirm the storage space corresponding with the password of described user's input, and enter the storage space that described password is corresponding.
CN201310091662.XA 2013-03-21 2013-03-21 The method and system of information security management Active CN104063671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310091662.XA CN104063671B (en) 2013-03-21 2013-03-21 The method and system of information security management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310091662.XA CN104063671B (en) 2013-03-21 2013-03-21 The method and system of information security management

Publications (2)

Publication Number Publication Date
CN104063671A true CN104063671A (en) 2014-09-24
CN104063671B CN104063671B (en) 2016-08-10

Family

ID=51551378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310091662.XA Active CN104063671B (en) 2013-03-21 2013-03-21 The method and system of information security management

Country Status (1)

Country Link
CN (1) CN104063671B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4907268A (en) * 1986-11-03 1990-03-06 Enigma Logic, Inc. Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
CN1984402A (en) * 2006-04-06 2007-06-20 华为技术有限公司 Method and device for managing multi-users of mobile terminal
CN102075618A (en) * 2010-12-14 2011-05-25 东莞宇龙通信科技有限公司 Personal information management method, system and mobile terminal
CN102710837A (en) * 2012-06-26 2012-10-03 宇龙计算机通信科技(深圳)有限公司 Terminal and address book managing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4907268A (en) * 1986-11-03 1990-03-06 Enigma Logic, Inc. Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
CN1984402A (en) * 2006-04-06 2007-06-20 华为技术有限公司 Method and device for managing multi-users of mobile terminal
CN102075618A (en) * 2010-12-14 2011-05-25 东莞宇龙通信科技有限公司 Personal information management method, system and mobile terminal
CN102710837A (en) * 2012-06-26 2012-10-03 宇龙计算机通信科技(深圳)有限公司 Terminal and address book managing method

Also Published As

Publication number Publication date
CN104063671B (en) 2016-08-10

Similar Documents

Publication Publication Date Title
JP6568355B2 (en) Method and apparatus for mutual communication of accounts between apps
CN105144188B (en) Apparatus and method for notifying security information in electronic device and computer-readable recording medium thereof
CN102257504B (en) Method for using a CAPTCHA challenge to protect a removable mobile flash memory storage device
US20200374665A1 (en) Short Message Processing Method and Apparatus, and Electronic Device
CN104838350A (en) Coordination of application workflow on multi-display screen
US20160306988A1 (en) Providing secure access to data in mobile devices
CN104754563A (en) Wireless hotspot access sharing method, mobile terminals and system
CN109154968B (en) System and method for secure and efficient communication within an organization
CN106776908B (en) Data cleaning method and device and terminal
CN102118503B (en) Data protection method, device and terminal
CN106203141A (en) The data processing method of a kind of application and device
CN108459852A (en) Script processing method and device, storage medium, electronic equipment
CN103399875A (en) File managing method and device
CN104732165A (en) Management method of applications and terminal
CN108184210B (en) Multimode intelligent wireless communication system based on multi-network fusion and implementation method thereof
CN104333563A (en) Method of information processing and electronic equipment
CN108134994A (en) The SIM card of Double-puzzle operation
CN112632647A (en) Electronic equipment information anti-theft method, related device and computer storage medium
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
CN110719590A (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN107135471B (en) Data transmission method and mobile terminal
CN103425936B (en) A kind of method realizing data confidentiality and electronic equipment
CN104036203A (en) Information security management method and information security management system
CN104063671A (en) Information security management method and system
CN103971422A (en) Check-in method and device based on electronic business card adopting NFC (Near Field Communication) technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant