CN104063671B - The method and system of information security management - Google Patents

The method and system of information security management Download PDF

Info

Publication number
CN104063671B
CN104063671B CN201310091662.XA CN201310091662A CN104063671B CN 104063671 B CN104063671 B CN 104063671B CN 201310091662 A CN201310091662 A CN 201310091662A CN 104063671 B CN104063671 B CN 104063671B
Authority
CN
China
Prior art keywords
information
memory space
protected
space
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310091662.XA
Other languages
Chinese (zh)
Other versions
CN104063671A (en
Inventor
雷宇
何竞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310091662.XA priority Critical patent/CN104063671B/en
Publication of CN104063671A publication Critical patent/CN104063671A/en
Application granted granted Critical
Publication of CN104063671B publication Critical patent/CN104063671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The invention discloses the method and system of a kind of information security management, belong to field of information security technology.Described method includes: creating the first memory space by space entry, and save as the first user password that described memory space is arranged, described first memory space is for storing information to be protected;The information that information to be protected in described first memory space is to be protected with the second memory space being mated, wherein, the time that creates of described second memory space is before the establishment time of described first memory space;If information to be protected in described first memory space has the information of the information match to be protected with described second memory space, then the relevant information that described first memory space can not get the information of described coupling is set.The present invention is effectively protected the information security in the memory space first created, it is therefore prevented that the eavesdropping behavior of malicious user, improves the safety of information.

Description

The method and system of information security management
Technical field
The present invention relates to field of information security technology, particularly to the method and system of a kind of information security management.
Background technology
At present, along with the convenient practicality of smart mobile phone, the demonstration of the feature such as powerful, smart mobile phone also by Gradually popularize in various user groups and come, thus cause a series of mobile phone safe problem.Smart mobile phone is pacified Entirely being primarily referred to as using smart mobile phone to carry out the safety of produced information in communication process, this category information can Can reveal in the case of intentionally or accidentally, once reveal and cellie will be caused damage.Therefore, Numerous terminal business, software business man etc. propose the solution of mobile phone information safety the most in succession.
The most relatively conventional a solution is, user can create a storage sky on smart mobile phone Between, this memory space is for storing the information of need for confidentiality, and arranges a password for this memory space, uses Family could enter this memory space, with the safety of guarantee information by password.
Prior art at least there is problems in that if there being malicious user to create on the smart mobile phone of user Another one memory space, sets and goes this memory space to go to obtain the data of contact person a in original memory space, Then after the information receiving contact person a, smart mobile phone change the information of contact person a can be sent simultaneously to this two Individual memory space, makes malicious user obtain the information that should maintain secrecy, and the information on such smart mobile phone is the most not Can be effectively protected.
Summary of the invention
In order to ensure the information security in terminal, the embodiment of the present invention provides a kind of information security management Method and system.Described technical scheme is as follows:
On the one hand, it is provided that a kind of method of information security management, described method includes:
Create the first memory space by space entry, and save as the first of described first memory space setting User cipher, described first memory space is for storing information to be protected;
The information that information to be protected in described first memory space is to be protected with the second memory space is carried out Coupling, wherein, described second memory space create the time the establishment time of described first memory space it Before;
If information to be protected in described first memory space having to be protected with described second memory space The information of information match, then described first memory space is set and can not get the information of described coupling Relevant information.
On the other hand, it is provided that the system of a kind of information security management, described device includes: described system bag Include:
Creation module, for creating the first memory space by space entry, and saves as described first storage The first user password that space is arranged, described first memory space is for storing information to be protected;
Matching module, for treating information to be protected in described first memory space in the second memory space The information of protection is mated, and wherein, the establishment time of described second memory space is at described first storage sky Between the establishment time before;
Module is set, deposits with described second if information to be protected in described first memory space has The information of information match to be protected in storage space, then arranging described first memory space can not get The relevant information of the information of described coupling.
The technical scheme that the embodiment of the present invention provides has the benefit that and creates first by space entry Memory space, and save as the first user password that described first memory space is arranged, described first storage sky Between for storing information to be protected;By information to be protected in described first memory space and the second storage sky Information to be protected between is mated, and wherein, the establishment time of described second memory space is described first Before the establishment time of memory space;If information to be protected in described first memory space has with described The information of information match to be protected in the second memory space, then arranging described first memory space can not Get the relevant information of the information of described coupling.Thus be effectively protected in the memory space first created Information security, it is therefore prevented that the eavesdropping behavior of malicious user, improves the safety of information.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, Other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow diagram of a kind of information security provided in the embodiment of the present invention one;
Fig. 2 is the method flow diagram of a kind of information security provided in the embodiment of the present invention two;
Fig. 3 is the system structure schematic diagram of a kind of information security provided in the embodiment of the present invention three;
Fig. 4 is the system structure schematic diagram of the another kind of information security provided in the embodiment of the present invention three.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the present invention Embodiment is described in further detail.
The method and system of the information security management of the embodiment of the present invention can run on and be provided with Android(paddy The operating system platform for Portable movable smart machine of song company exploitation), iOS(Apple opens The operating system platform for Portable movable smart machine sent out), Windows Phone(Microsoft Exploitation the operating system platform for Portable movable smart machine) etc. operating system terminal in, should Terminal can be any one in mobile phone, palm PC, panel computer etc., permissible in this terminal Including central processing unit, memorizer, switching device, power supply, clock signal generators, image processor, Combination in any in Sound Processor Unit etc., above-mentioned central processing unit, memorizer, switching device, power supply, time Combination in any in clock signal generator, image processor, Sound Processor Unit etc. is for realizing the reality of the present invention Execute the function in the method for the information security management of example and Information Security Management System.
In the present embodiment, provide the user a space entry, can be created by this portal users and be used for depositing Store up the private space of the memory space of information to be protected, i.e. user.Wherein, in described space entry is terminal One single function, specifically, can reserve the icon of this function on the table, and user can pass through a little Hit this icon and enter space entry, of course, it is possible to use alternate manner to trigger space entry, do not do Too much explanation.
First and second related in the present embodiment do not represent execution sequence successively, simply to illustrate that Two different memory spaces.
Embodiment one
See Fig. 1, a kind of method providing information security management in the present embodiment, including:
101, create the first memory space by space entry, and save as what described first memory space was arranged First user password, described first memory space is for storing information to be protected;
102, by information to be protected in information to be protected in described first memory space and the second memory space Mating, wherein, the time that creates of described second memory space is when the establishment of described first memory space Before between;
Treat in described second memory space if information to be protected in 103 described first memory spaces has The information of the information match of protection, then arrange described first memory space and can not get described coupling The relevant information of information.
In another embodiment, described create the first memory space by space entry before, also include:
Create the second memory space by space entry, and save as the second user that described memory space is arranged Password, described second memory space is for storing information to be protected.
In another embodiment, described method also includes:
After receiving the relevant information of information of described coupling, described relevant information is stored described second In memory space.
In another embodiment, described method also includes:
Delete the mark of the information of coupling in described second memory space and described first memory space;
The information of described coupling is again stored in described first memory space;
After receiving the relevant information of information of described coupling, described relevant information is stored described first In memory space.
In another embodiment, described method also includes:
If described space entry is triggered and receives the password of user's input, then confirm defeated with described user The memory space that the password that enters is corresponding, and enter the memory space that described password is corresponding.
The present embodiment provides the benefit that: creates the first memory space by space entry, and saves as described The first user password that memory space is arranged, described first memory space is for storing information to be protected;Will Information to be protected in the described first memory space information to be protected with the second memory space is mated, Wherein, the time that creates of described second memory space is before the establishment time of described first memory space;As Information to be protected in the most described first memory space has the information to be protected with described second memory space The information matched, then arrange described first memory space and can not get information relevant of described coupling Information.Thus it is effectively protected the information security in the memory space first created, it is therefore prevented that malicious user Eavesdropping behavior, improves the safety of information.
Embodiment two
A kind of method providing information security management in the embodiment of the present invention, sees Fig. 2, and method flow includes:
201, create the second memory space by space entry, and save as the second of the setting of described memory space User cipher.
In the present embodiment, in order to protect the safety of information, user creates second by space entry in terminal The private space of memory space, i.e. user, can store the information that user is to be protected in this memory space.This Information to be protected in embodiment can be any information relevant with terminal, includes but not limited to: user's Personal information, address list, note, message registration, photo, memorandum etc..
When creating the second memory space, it is that the second memory space arranges and accesses password accordingly, makes user only Have and the second memory space could be conducted interviews, to guarantee in the second memory space by input access password Information security.Wherein it is preferred to, password can be numerical ciphers, and the length of password can be 6,9 Or 10 etc., in this present embodiment and be not specifically limited.
202, create the first memory space by space entry, and save as what described first memory space was arranged First user password.
In the present embodiment, it is contemplated that user may need to preserve different information classifications, it is allowed to user passes through Space entry creates multiple memory spaces, and arranges for this memory space and access password accordingly.The most why Sample is realized in establishment the present embodiment of multiple memory spaces and be not specifically limited by space entry.
In the present embodiment, create the first memory space by space entry, and be that the first memory space arranges One accesses password, and wherein, first accesses password is different from the second access password, to facilitate user to deposit difference The management in storage space.
In the present embodiment, user can create multiple memory spaces according to identical flow process, and this sentences establishment the One and second illustrates as a example by memory space.If described space entry is triggered and receives user's input Password, then confirm and the memory space corresponding to password of described user input, and enter described password correspondence Memory space, this present embodiment is repeated no more.
203, by information to be protected in information to be protected in described first memory space and the second memory space Mate, if information to be protected in described first memory space has with in described second memory space The information of information match to be protected, then arrange described first memory space and can not get described coupling The relevant information of information.
In the present embodiment, in order to prevent the first memory space be malicious user be eavesdropping private information and create, When creating the first memory space, by information to be protected in the first memory space and described second memory space In information to be protected mate, to judge the first memory space needing, whether information to be protected includes Information to be protected in two memory spaces, if the first memory space includes that treating in the second memory space is protected Protect information, then the relevant information that the first memory space can not get the information of described coupling is set, is connecing After the information that the information that receives and mate is relevant, this information is directly stored in the second memory space.Wherein with The information that match information is relevant includes but not limited to: note, phone or mail etc., to this present embodiment not It is specifically limited.Such as, storing the information of contact person a in the second memory space, the first memory space is also Set the information of storing contact a, after two memory spaces mate, it was found that common contact person a Information, then the first memory space is set and can not obtain the information relevant to contact person a, such as contact person a Note, phone or mail etc..
In concrete the present embodiment, when finding that the first memory space has the letter matched with the second memory space After breath, can retain in the first memory space described in the mark of information that matches, such as, contact person's surname Name or contact person's contact method etc., but this mark does not has entity function, i.e. can not receive with The information that the information joined is relevant.
What deserves to be explained is, creating if there being other memory space also to have precedence over the first memory space in terminal, Then be also required to by the information to be protected in the first memory space respectively with the information to be protected in other memory space Mate, to prevent the eavesdropping behavior of malicious user.
204, after receiving the relevant information of information of described coupling, described relevant information is stored described In second memory space.
In this step, owing to setting the storage mode of the information of coupling, in the information phase received and mate After the information closed, directly storing the information in the second memory space, the first memory space can not obtain this Information, thus effectively prevent the eavesdropping behavior of malicious user, improve the safety of information.
If it addition, the establishment with the second memory space that creates of the first memory space is all to close in the present embodiment Method, the establishment that i.e. terminal use is carried out, if then user wants to revise the first memory space and the second storage sky The storage position of the information of the coupling between, then can enter corresponding memory space according to password, delete the The mark of the information of the coupling in one memory space and the second memory space, and in the first memory space again Store the information of described coupling.So after receiving the relevant information of information of described coupling, by described phase Pass information stores in described first memory space.Wherein, owing to memory space has cryptoguard, even if First memory space is that malicious user creates, and malicious user can not enter the second memory space easily and delete Except band protection information above.
The present embodiment provides the benefit that: creates the first memory space by space entry, and saves as described The first user password that memory space is arranged, described first memory space is for storing information to be protected;Will Information to be protected in the described first memory space information to be protected with the second memory space is mated, Wherein, the time that creates of described second memory space is before the establishment time of described first memory space;As Information to be protected in the most described first memory space has the information to be protected with described second memory space The information matched, then arrange described first memory space and can not get information relevant of described coupling Information.Thus it is effectively protected the information security in the memory space first created, it is therefore prevented that malicious user Eavesdropping behavior, improves the safety of information.
Embodiment three
See Fig. 3, the embodiment of the present invention provides the system of a kind of information security management, including: create mould Block 301, matching module 302 and module 303 is set.
Creation module 301, for creating the first memory space by space entry, and saves as described storage sky Between the first user password that arranges, described first memory space is for storing information to be protected;
Matching module 302, for by information to be protected in described first memory space and the second memory space Information to be protected is mated, and wherein, the establishment time of described second memory space stores described first Before the establishment time in space;
Module 303 is set, if had and described second in information to be protected in described first memory space The information of information match to be protected in memory space, then arranging described first memory space can not obtain Relevant information to the information of described coupling.
In another embodiment, described creation module 301 is additionally operable to:
Before creating the first memory space by space entry, create the second memory space by space entry, And saving as the second user cipher that described memory space is arranged, described second memory space is used for storing to be waited to protect The information protected.
Seeing Fig. 4, in another embodiment, described system also includes:
First memory module 304, for after receiving the relevant information of information of described coupling, by described phase Pass information stores in described second memory space.
Seeing Fig. 4, in another embodiment, described system also includes:
Removing module 305, for deleting coupling in described second memory space and described first memory space The mark of information;
Second memory module 306, for again storing the information of described coupling in described first memory space;
Described first memory module 304, is additionally operable to after receiving the relevant information of information of described coupling, will Described relevant information stores in described first memory space.
Seeing Fig. 4, in another embodiment, described system also includes:
Confirm module 307, if being triggered for described space entry and receiving the password that user inputs, then Confirm the memory space corresponding with the password of described user input, and enter the memory space that described password is corresponding.
The present embodiment provides the benefit that: creates the first memory space by space entry, and saves as described The first user password that memory space is arranged, described first memory space is for storing information to be protected;Will Information to be protected in the described first memory space information to be protected with the second memory space is mated, Wherein, the time that creates of described second memory space is before the establishment time of described first memory space;As Information to be protected in the most described first memory space has the information to be protected with described second memory space The information matched, then arrange described first memory space and can not get information relevant of described coupling Information.Thus it is effectively protected the information security in the memory space first created, it is therefore prevented that malicious user Eavesdropping behavior, improves the safety of information.
It should be understood that the system of the information security management of above-described embodiment offer, only with above-mentioned each function The division of module is illustrated, and in actual application, can distribute above-mentioned functions by not as desired With functional module complete, the internal structure of system will be divided into different functional modules, above to complete The all or part of function described.
It addition, the system of information security management that above-described embodiment provides is implemented with the method for information security management Example belongs to same design, and it implements process and refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can be passed through Hardware completes, it is also possible to instructing relevant hardware by program and complete, described program can be stored in In a kind of computer-readable recording medium, storage medium mentioned above can be read only memory, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all the present invention's Within spirit and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention's Within protection domain.

Claims (10)

1. the method for an information security management, it is characterised in that described method includes:
Create the first memory space by space entry, and save as the first of described first memory space setting User cipher, described first memory space is for storing information to be protected;
The information that information to be protected in described first memory space is to be protected with the second memory space is carried out Coupling, wherein, described second memory space create the time the establishment time of described first memory space it Before;
If information to be protected in described first memory space having to be protected with described second memory space The information of information match, then described first memory space is set and can not get the information of described coupling Relevant information.
Method the most according to claim 1, it is characterised in that described by space entry establishment first Before memory space, also include:
Create the second memory space by space entry, and save as the second of described second memory space setting User cipher, described second memory space is for storing information to be protected.
Method the most according to claim 1, it is characterised in that described method also includes:
If information to be protected in described first memory space having to be protected with described second memory space The information of information match, then after receiving the relevant information of information of described coupling, by described relevant Information stores in described second memory space.
Method the most according to claim 1, it is characterised in that described method also includes:
Delete the information of described coupling in described second memory space and described first memory space;
The information of described coupling is again stored in described first memory space;
After receiving the relevant information of information of described coupling, described relevant information is stored described first In memory space.
Method the most according to claim 1, it is characterised in that described method also includes:
If described space entry is triggered and receives the password of user's input, then confirm defeated with described user The memory space that the password that enters is corresponding, and enter the memory space that described password is corresponding.
6. the system of an information security management, it is characterised in that described system includes:
Creation module, for creating the first memory space by space entry, and saves as described first storage The first user password that space is arranged, described first memory space is for storing information to be protected;
Matching module, for treating information to be protected in described first memory space in the second memory space The information of protection is mated, and wherein, the establishment time of described second memory space is at described first storage sky Between the establishment time before;
Module is set, deposits with described second if information to be protected in described first memory space has The information of information match to be protected in storage space, then arranging described first memory space can not get The relevant information of the information of described coupling.
System the most according to claim 6, it is characterised in that described creation module is additionally operable to:
Before creating the first memory space by space entry, create the second memory space by space entry, And saving as the second user cipher that described second memory space is arranged, described second memory space is used for storing Information to be protected.
System the most according to claim 6, it is characterised in that described system also includes:
First memory module, if had in information to be protected in described first memory space and described the The information of information match to be protected in two memory spaces, then when information relevant receiving described coupling After information, described relevant information is stored in described second memory space.
System the most according to claim 6, it is characterised in that described system also includes:
Removing module, for deleting the described coupling in described second memory space and described first memory space Information;
Second memory module, for again storing the information of described coupling in described first memory space;
Described first memory module, is additionally operable to after receiving the relevant information of information of described coupling, by institute State relevant information to store in described first memory space.
System the most according to claim 6, it is characterised in that described system also includes:
Confirm module, if being triggered for described space entry and receiving the password that user inputs, the most really Recognize the memory space corresponding with the password that described user inputs, and enter the memory space that described password is corresponding.
CN201310091662.XA 2013-03-21 2013-03-21 The method and system of information security management Active CN104063671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310091662.XA CN104063671B (en) 2013-03-21 2013-03-21 The method and system of information security management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310091662.XA CN104063671B (en) 2013-03-21 2013-03-21 The method and system of information security management

Publications (2)

Publication Number Publication Date
CN104063671A CN104063671A (en) 2014-09-24
CN104063671B true CN104063671B (en) 2016-08-10

Family

ID=51551378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310091662.XA Active CN104063671B (en) 2013-03-21 2013-03-21 The method and system of information security management

Country Status (1)

Country Link
CN (1) CN104063671B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4907268A (en) * 1986-11-03 1990-03-06 Enigma Logic, Inc. Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
CN1984402A (en) * 2006-04-06 2007-06-20 华为技术有限公司 Method and device for managing multi-users of mobile terminal
CN102075618A (en) * 2010-12-14 2011-05-25 东莞宇龙通信科技有限公司 Personal information management method, system and mobile terminal
CN102710837A (en) * 2012-06-26 2012-10-03 宇龙计算机通信科技(深圳)有限公司 Terminal and address book managing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4907268A (en) * 1986-11-03 1990-03-06 Enigma Logic, Inc. Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
CN1984402A (en) * 2006-04-06 2007-06-20 华为技术有限公司 Method and device for managing multi-users of mobile terminal
CN102075618A (en) * 2010-12-14 2011-05-25 东莞宇龙通信科技有限公司 Personal information management method, system and mobile terminal
CN102710837A (en) * 2012-06-26 2012-10-03 宇龙计算机通信科技(深圳)有限公司 Terminal and address book managing method

Also Published As

Publication number Publication date
CN104063671A (en) 2014-09-24

Similar Documents

Publication Publication Date Title
CN103390026B (en) A kind of mobile intelligent terminal secure browser and its method of work
CN100464313C (en) Mobile memory device and method for accessing encrypted data in mobile memory device
CN106022155B (en) Method and server for database security management
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN101268470A (en) Portable terminal device, address book transmitter, information displaying method in portable terminal device, address book transmitting method, and computer program
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN101296457A (en) Screen operation method and device
CN103902862A (en) Mobile device management method and device and mobile device
CN102902935A (en) Mobile terminal privacy protection method and device
CN101916342A (en) Secure mobile storage device and method for realizing secure data exchange by using same
CN102638471A (en) Password protection and management method
CN104281272B (en) Password Input processing method and processing device
CN101159754A (en) Internet application management system operating on intelligent mobile terminal
Epifani et al. Learning iOS forensics
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
CN104717343A (en) Intelligent digital watermarking mobile phone
CN103379483B (en) A kind of method of information of mobile terminal safety management, device and mobile terminal
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN102867157A (en) Mobile terminal and data protecting method
US8972747B2 (en) Managing information in a document serialization
CN102118503B (en) Data protection method, device and terminal
CN102868826A (en) Terminal and terminal data protection method
CN106203141A (en) The data processing method of a kind of application and device
CN103049705B (en) A kind of based on virtualized method for secure storing, terminal and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant