CN104063671B - The method and system of information security management - Google Patents
The method and system of information security management Download PDFInfo
- Publication number
- CN104063671B CN104063671B CN201310091662.XA CN201310091662A CN104063671B CN 104063671 B CN104063671 B CN 104063671B CN 201310091662 A CN201310091662 A CN 201310091662A CN 104063671 B CN104063671 B CN 104063671B
- Authority
- CN
- China
- Prior art keywords
- information
- memory space
- protected
- space
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Abstract
The invention discloses the method and system of a kind of information security management, belong to field of information security technology.Described method includes: creating the first memory space by space entry, and save as the first user password that described memory space is arranged, described first memory space is for storing information to be protected;The information that information to be protected in described first memory space is to be protected with the second memory space being mated, wherein, the time that creates of described second memory space is before the establishment time of described first memory space;If information to be protected in described first memory space has the information of the information match to be protected with described second memory space, then the relevant information that described first memory space can not get the information of described coupling is set.The present invention is effectively protected the information security in the memory space first created, it is therefore prevented that the eavesdropping behavior of malicious user, improves the safety of information.
Description
Technical field
The present invention relates to field of information security technology, particularly to the method and system of a kind of information security management.
Background technology
At present, along with the convenient practicality of smart mobile phone, the demonstration of the feature such as powerful, smart mobile phone also by
Gradually popularize in various user groups and come, thus cause a series of mobile phone safe problem.Smart mobile phone is pacified
Entirely being primarily referred to as using smart mobile phone to carry out the safety of produced information in communication process, this category information can
Can reveal in the case of intentionally or accidentally, once reveal and cellie will be caused damage.Therefore,
Numerous terminal business, software business man etc. propose the solution of mobile phone information safety the most in succession.
The most relatively conventional a solution is, user can create a storage sky on smart mobile phone
Between, this memory space is for storing the information of need for confidentiality, and arranges a password for this memory space, uses
Family could enter this memory space, with the safety of guarantee information by password.
Prior art at least there is problems in that if there being malicious user to create on the smart mobile phone of user
Another one memory space, sets and goes this memory space to go to obtain the data of contact person a in original memory space,
Then after the information receiving contact person a, smart mobile phone change the information of contact person a can be sent simultaneously to this two
Individual memory space, makes malicious user obtain the information that should maintain secrecy, and the information on such smart mobile phone is the most not
Can be effectively protected.
Summary of the invention
In order to ensure the information security in terminal, the embodiment of the present invention provides a kind of information security management
Method and system.Described technical scheme is as follows:
On the one hand, it is provided that a kind of method of information security management, described method includes:
Create the first memory space by space entry, and save as the first of described first memory space setting
User cipher, described first memory space is for storing information to be protected;
The information that information to be protected in described first memory space is to be protected with the second memory space is carried out
Coupling, wherein, described second memory space create the time the establishment time of described first memory space it
Before;
If information to be protected in described first memory space having to be protected with described second memory space
The information of information match, then described first memory space is set and can not get the information of described coupling
Relevant information.
On the other hand, it is provided that the system of a kind of information security management, described device includes: described system bag
Include:
Creation module, for creating the first memory space by space entry, and saves as described first storage
The first user password that space is arranged, described first memory space is for storing information to be protected;
Matching module, for treating information to be protected in described first memory space in the second memory space
The information of protection is mated, and wherein, the establishment time of described second memory space is at described first storage sky
Between the establishment time before;
Module is set, deposits with described second if information to be protected in described first memory space has
The information of information match to be protected in storage space, then arranging described first memory space can not get
The relevant information of the information of described coupling.
The technical scheme that the embodiment of the present invention provides has the benefit that and creates first by space entry
Memory space, and save as the first user password that described first memory space is arranged, described first storage sky
Between for storing information to be protected;By information to be protected in described first memory space and the second storage sky
Information to be protected between is mated, and wherein, the establishment time of described second memory space is described first
Before the establishment time of memory space;If information to be protected in described first memory space has with described
The information of information match to be protected in the second memory space, then arranging described first memory space can not
Get the relevant information of the information of described coupling.Thus be effectively protected in the memory space first created
Information security, it is therefore prevented that the eavesdropping behavior of malicious user, improves the safety of information.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below
The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work,
Other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow diagram of a kind of information security provided in the embodiment of the present invention one;
Fig. 2 is the method flow diagram of a kind of information security provided in the embodiment of the present invention two;
Fig. 3 is the system structure schematic diagram of a kind of information security provided in the embodiment of the present invention three;
Fig. 4 is the system structure schematic diagram of the another kind of information security provided in the embodiment of the present invention three.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the present invention
Embodiment is described in further detail.
The method and system of the information security management of the embodiment of the present invention can run on and be provided with Android(paddy
The operating system platform for Portable movable smart machine of song company exploitation), iOS(Apple opens
The operating system platform for Portable movable smart machine sent out), Windows Phone(Microsoft
Exploitation the operating system platform for Portable movable smart machine) etc. operating system terminal in, should
Terminal can be any one in mobile phone, palm PC, panel computer etc., permissible in this terminal
Including central processing unit, memorizer, switching device, power supply, clock signal generators, image processor,
Combination in any in Sound Processor Unit etc., above-mentioned central processing unit, memorizer, switching device, power supply, time
Combination in any in clock signal generator, image processor, Sound Processor Unit etc. is for realizing the reality of the present invention
Execute the function in the method for the information security management of example and Information Security Management System.
In the present embodiment, provide the user a space entry, can be created by this portal users and be used for depositing
Store up the private space of the memory space of information to be protected, i.e. user.Wherein, in described space entry is terminal
One single function, specifically, can reserve the icon of this function on the table, and user can pass through a little
Hit this icon and enter space entry, of course, it is possible to use alternate manner to trigger space entry, do not do
Too much explanation.
First and second related in the present embodiment do not represent execution sequence successively, simply to illustrate that
Two different memory spaces.
Embodiment one
See Fig. 1, a kind of method providing information security management in the present embodiment, including:
101, create the first memory space by space entry, and save as what described first memory space was arranged
First user password, described first memory space is for storing information to be protected;
102, by information to be protected in information to be protected in described first memory space and the second memory space
Mating, wherein, the time that creates of described second memory space is when the establishment of described first memory space
Before between;
Treat in described second memory space if information to be protected in 103 described first memory spaces has
The information of the information match of protection, then arrange described first memory space and can not get described coupling
The relevant information of information.
In another embodiment, described create the first memory space by space entry before, also include:
Create the second memory space by space entry, and save as the second user that described memory space is arranged
Password, described second memory space is for storing information to be protected.
In another embodiment, described method also includes:
After receiving the relevant information of information of described coupling, described relevant information is stored described second
In memory space.
In another embodiment, described method also includes:
Delete the mark of the information of coupling in described second memory space and described first memory space;
The information of described coupling is again stored in described first memory space;
After receiving the relevant information of information of described coupling, described relevant information is stored described first
In memory space.
In another embodiment, described method also includes:
If described space entry is triggered and receives the password of user's input, then confirm defeated with described user
The memory space that the password that enters is corresponding, and enter the memory space that described password is corresponding.
The present embodiment provides the benefit that: creates the first memory space by space entry, and saves as described
The first user password that memory space is arranged, described first memory space is for storing information to be protected;Will
Information to be protected in the described first memory space information to be protected with the second memory space is mated,
Wherein, the time that creates of described second memory space is before the establishment time of described first memory space;As
Information to be protected in the most described first memory space has the information to be protected with described second memory space
The information matched, then arrange described first memory space and can not get information relevant of described coupling
Information.Thus it is effectively protected the information security in the memory space first created, it is therefore prevented that malicious user
Eavesdropping behavior, improves the safety of information.
Embodiment two
A kind of method providing information security management in the embodiment of the present invention, sees Fig. 2, and method flow includes:
201, create the second memory space by space entry, and save as the second of the setting of described memory space
User cipher.
In the present embodiment, in order to protect the safety of information, user creates second by space entry in terminal
The private space of memory space, i.e. user, can store the information that user is to be protected in this memory space.This
Information to be protected in embodiment can be any information relevant with terminal, includes but not limited to: user's
Personal information, address list, note, message registration, photo, memorandum etc..
When creating the second memory space, it is that the second memory space arranges and accesses password accordingly, makes user only
Have and the second memory space could be conducted interviews, to guarantee in the second memory space by input access password
Information security.Wherein it is preferred to, password can be numerical ciphers, and the length of password can be 6,9
Or 10 etc., in this present embodiment and be not specifically limited.
202, create the first memory space by space entry, and save as what described first memory space was arranged
First user password.
In the present embodiment, it is contemplated that user may need to preserve different information classifications, it is allowed to user passes through
Space entry creates multiple memory spaces, and arranges for this memory space and access password accordingly.The most why
Sample is realized in establishment the present embodiment of multiple memory spaces and be not specifically limited by space entry.
In the present embodiment, create the first memory space by space entry, and be that the first memory space arranges
One accesses password, and wherein, first accesses password is different from the second access password, to facilitate user to deposit difference
The management in storage space.
In the present embodiment, user can create multiple memory spaces according to identical flow process, and this sentences establishment the
One and second illustrates as a example by memory space.If described space entry is triggered and receives user's input
Password, then confirm and the memory space corresponding to password of described user input, and enter described password correspondence
Memory space, this present embodiment is repeated no more.
203, by information to be protected in information to be protected in described first memory space and the second memory space
Mate, if information to be protected in described first memory space has with in described second memory space
The information of information match to be protected, then arrange described first memory space and can not get described coupling
The relevant information of information.
In the present embodiment, in order to prevent the first memory space be malicious user be eavesdropping private information and create,
When creating the first memory space, by information to be protected in the first memory space and described second memory space
In information to be protected mate, to judge the first memory space needing, whether information to be protected includes
Information to be protected in two memory spaces, if the first memory space includes that treating in the second memory space is protected
Protect information, then the relevant information that the first memory space can not get the information of described coupling is set, is connecing
After the information that the information that receives and mate is relevant, this information is directly stored in the second memory space.Wherein with
The information that match information is relevant includes but not limited to: note, phone or mail etc., to this present embodiment not
It is specifically limited.Such as, storing the information of contact person a in the second memory space, the first memory space is also
Set the information of storing contact a, after two memory spaces mate, it was found that common contact person a
Information, then the first memory space is set and can not obtain the information relevant to contact person a, such as contact person a
Note, phone or mail etc..
In concrete the present embodiment, when finding that the first memory space has the letter matched with the second memory space
After breath, can retain in the first memory space described in the mark of information that matches, such as, contact person's surname
Name or contact person's contact method etc., but this mark does not has entity function, i.e. can not receive with
The information that the information joined is relevant.
What deserves to be explained is, creating if there being other memory space also to have precedence over the first memory space in terminal,
Then be also required to by the information to be protected in the first memory space respectively with the information to be protected in other memory space
Mate, to prevent the eavesdropping behavior of malicious user.
204, after receiving the relevant information of information of described coupling, described relevant information is stored described
In second memory space.
In this step, owing to setting the storage mode of the information of coupling, in the information phase received and mate
After the information closed, directly storing the information in the second memory space, the first memory space can not obtain this
Information, thus effectively prevent the eavesdropping behavior of malicious user, improve the safety of information.
If it addition, the establishment with the second memory space that creates of the first memory space is all to close in the present embodiment
Method, the establishment that i.e. terminal use is carried out, if then user wants to revise the first memory space and the second storage sky
The storage position of the information of the coupling between, then can enter corresponding memory space according to password, delete the
The mark of the information of the coupling in one memory space and the second memory space, and in the first memory space again
Store the information of described coupling.So after receiving the relevant information of information of described coupling, by described phase
Pass information stores in described first memory space.Wherein, owing to memory space has cryptoguard, even if
First memory space is that malicious user creates, and malicious user can not enter the second memory space easily and delete
Except band protection information above.
The present embodiment provides the benefit that: creates the first memory space by space entry, and saves as described
The first user password that memory space is arranged, described first memory space is for storing information to be protected;Will
Information to be protected in the described first memory space information to be protected with the second memory space is mated,
Wherein, the time that creates of described second memory space is before the establishment time of described first memory space;As
Information to be protected in the most described first memory space has the information to be protected with described second memory space
The information matched, then arrange described first memory space and can not get information relevant of described coupling
Information.Thus it is effectively protected the information security in the memory space first created, it is therefore prevented that malicious user
Eavesdropping behavior, improves the safety of information.
Embodiment three
See Fig. 3, the embodiment of the present invention provides the system of a kind of information security management, including: create mould
Block 301, matching module 302 and module 303 is set.
Creation module 301, for creating the first memory space by space entry, and saves as described storage sky
Between the first user password that arranges, described first memory space is for storing information to be protected;
Matching module 302, for by information to be protected in described first memory space and the second memory space
Information to be protected is mated, and wherein, the establishment time of described second memory space stores described first
Before the establishment time in space;
Module 303 is set, if had and described second in information to be protected in described first memory space
The information of information match to be protected in memory space, then arranging described first memory space can not obtain
Relevant information to the information of described coupling.
In another embodiment, described creation module 301 is additionally operable to:
Before creating the first memory space by space entry, create the second memory space by space entry,
And saving as the second user cipher that described memory space is arranged, described second memory space is used for storing to be waited to protect
The information protected.
Seeing Fig. 4, in another embodiment, described system also includes:
First memory module 304, for after receiving the relevant information of information of described coupling, by described phase
Pass information stores in described second memory space.
Seeing Fig. 4, in another embodiment, described system also includes:
Removing module 305, for deleting coupling in described second memory space and described first memory space
The mark of information;
Second memory module 306, for again storing the information of described coupling in described first memory space;
Described first memory module 304, is additionally operable to after receiving the relevant information of information of described coupling, will
Described relevant information stores in described first memory space.
Seeing Fig. 4, in another embodiment, described system also includes:
Confirm module 307, if being triggered for described space entry and receiving the password that user inputs, then
Confirm the memory space corresponding with the password of described user input, and enter the memory space that described password is corresponding.
The present embodiment provides the benefit that: creates the first memory space by space entry, and saves as described
The first user password that memory space is arranged, described first memory space is for storing information to be protected;Will
Information to be protected in the described first memory space information to be protected with the second memory space is mated,
Wherein, the time that creates of described second memory space is before the establishment time of described first memory space;As
Information to be protected in the most described first memory space has the information to be protected with described second memory space
The information matched, then arrange described first memory space and can not get information relevant of described coupling
Information.Thus it is effectively protected the information security in the memory space first created, it is therefore prevented that malicious user
Eavesdropping behavior, improves the safety of information.
It should be understood that the system of the information security management of above-described embodiment offer, only with above-mentioned each function
The division of module is illustrated, and in actual application, can distribute above-mentioned functions by not as desired
With functional module complete, the internal structure of system will be divided into different functional modules, above to complete
The all or part of function described.
It addition, the system of information security management that above-described embodiment provides is implemented with the method for information security management
Example belongs to same design, and it implements process and refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can be passed through
Hardware completes, it is also possible to instructing relevant hardware by program and complete, described program can be stored in
In a kind of computer-readable recording medium, storage medium mentioned above can be read only memory, disk or
CD etc..
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all the present invention's
Within spirit and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention's
Within protection domain.
Claims (10)
1. the method for an information security management, it is characterised in that described method includes:
Create the first memory space by space entry, and save as the first of described first memory space setting
User cipher, described first memory space is for storing information to be protected;
The information that information to be protected in described first memory space is to be protected with the second memory space is carried out
Coupling, wherein, described second memory space create the time the establishment time of described first memory space it
Before;
If information to be protected in described first memory space having to be protected with described second memory space
The information of information match, then described first memory space is set and can not get the information of described coupling
Relevant information.
Method the most according to claim 1, it is characterised in that described by space entry establishment first
Before memory space, also include:
Create the second memory space by space entry, and save as the second of described second memory space setting
User cipher, described second memory space is for storing information to be protected.
Method the most according to claim 1, it is characterised in that described method also includes:
If information to be protected in described first memory space having to be protected with described second memory space
The information of information match, then after receiving the relevant information of information of described coupling, by described relevant
Information stores in described second memory space.
Method the most according to claim 1, it is characterised in that described method also includes:
Delete the information of described coupling in described second memory space and described first memory space;
The information of described coupling is again stored in described first memory space;
After receiving the relevant information of information of described coupling, described relevant information is stored described first
In memory space.
Method the most according to claim 1, it is characterised in that described method also includes:
If described space entry is triggered and receives the password of user's input, then confirm defeated with described user
The memory space that the password that enters is corresponding, and enter the memory space that described password is corresponding.
6. the system of an information security management, it is characterised in that described system includes:
Creation module, for creating the first memory space by space entry, and saves as described first storage
The first user password that space is arranged, described first memory space is for storing information to be protected;
Matching module, for treating information to be protected in described first memory space in the second memory space
The information of protection is mated, and wherein, the establishment time of described second memory space is at described first storage sky
Between the establishment time before;
Module is set, deposits with described second if information to be protected in described first memory space has
The information of information match to be protected in storage space, then arranging described first memory space can not get
The relevant information of the information of described coupling.
System the most according to claim 6, it is characterised in that described creation module is additionally operable to:
Before creating the first memory space by space entry, create the second memory space by space entry,
And saving as the second user cipher that described second memory space is arranged, described second memory space is used for storing
Information to be protected.
System the most according to claim 6, it is characterised in that described system also includes:
First memory module, if had in information to be protected in described first memory space and described the
The information of information match to be protected in two memory spaces, then when information relevant receiving described coupling
After information, described relevant information is stored in described second memory space.
System the most according to claim 6, it is characterised in that described system also includes:
Removing module, for deleting the described coupling in described second memory space and described first memory space
Information;
Second memory module, for again storing the information of described coupling in described first memory space;
Described first memory module, is additionally operable to after receiving the relevant information of information of described coupling, by institute
State relevant information to store in described first memory space.
System the most according to claim 6, it is characterised in that described system also includes:
Confirm module, if being triggered for described space entry and receiving the password that user inputs, the most really
Recognize the memory space corresponding with the password that described user inputs, and enter the memory space that described password is corresponding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310091662.XA CN104063671B (en) | 2013-03-21 | 2013-03-21 | The method and system of information security management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310091662.XA CN104063671B (en) | 2013-03-21 | 2013-03-21 | The method and system of information security management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104063671A CN104063671A (en) | 2014-09-24 |
CN104063671B true CN104063671B (en) | 2016-08-10 |
Family
ID=51551378
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310091662.XA Active CN104063671B (en) | 2013-03-21 | 2013-03-21 | The method and system of information security management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104063671B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4907268A (en) * | 1986-11-03 | 1990-03-06 | Enigma Logic, Inc. | Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer |
CN1984402A (en) * | 2006-04-06 | 2007-06-20 | 华为技术有限公司 | Method and device for managing multi-users of mobile terminal |
CN102075618A (en) * | 2010-12-14 | 2011-05-25 | 东莞宇龙通信科技有限公司 | Personal information management method, system and mobile terminal |
CN102710837A (en) * | 2012-06-26 | 2012-10-03 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and address book managing method |
-
2013
- 2013-03-21 CN CN201310091662.XA patent/CN104063671B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4907268A (en) * | 1986-11-03 | 1990-03-06 | Enigma Logic, Inc. | Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer |
CN1984402A (en) * | 2006-04-06 | 2007-06-20 | 华为技术有限公司 | Method and device for managing multi-users of mobile terminal |
CN102075618A (en) * | 2010-12-14 | 2011-05-25 | 东莞宇龙通信科技有限公司 | Personal information management method, system and mobile terminal |
CN102710837A (en) * | 2012-06-26 | 2012-10-03 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and address book managing method |
Also Published As
Publication number | Publication date |
---|---|
CN104063671A (en) | 2014-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103390026B (en) | A kind of mobile intelligent terminal secure browser and its method of work | |
CN100464313C (en) | Mobile memory device and method for accessing encrypted data in mobile memory device | |
CN106022155B (en) | Method and server for database security management | |
CN104834868A (en) | Electronic data protection method, device and terminal equipment | |
CN101268470A (en) | Portable terminal device, address book transmitter, information displaying method in portable terminal device, address book transmitting method, and computer program | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
CN101296457A (en) | Screen operation method and device | |
CN103902862A (en) | Mobile device management method and device and mobile device | |
CN102902935A (en) | Mobile terminal privacy protection method and device | |
CN101916342A (en) | Secure mobile storage device and method for realizing secure data exchange by using same | |
CN102638471A (en) | Password protection and management method | |
CN104281272B (en) | Password Input processing method and processing device | |
CN101159754A (en) | Internet application management system operating on intelligent mobile terminal | |
Epifani et al. | Learning iOS forensics | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
CN104717343A (en) | Intelligent digital watermarking mobile phone | |
CN103379483B (en) | A kind of method of information of mobile terminal safety management, device and mobile terminal | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
CN102867157A (en) | Mobile terminal and data protecting method | |
US8972747B2 (en) | Managing information in a document serialization | |
CN102118503B (en) | Data protection method, device and terminal | |
CN102868826A (en) | Terminal and terminal data protection method | |
CN106203141A (en) | The data processing method of a kind of application and device | |
CN103049705B (en) | A kind of based on virtualized method for secure storing, terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |