Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive information input security monitoring method and device

A sensitive information and information input technology, which is applied in the computer field, can solve the problems of reducing the security of sensitive information input and leakage of sensitive information, so as to achieve the effect of improving security and avoiding security risks

Inactive Publication Date: 2016-01-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, when a user uses a user terminal for business processing, the user usually needs to manually enter the bank card number, cardholder name, cardholder ID number, and mobile phone number reserved in the bank for the bound card on the user terminal. The so-called sensitive information refers to the loss, improper use or unauthorized access, which is not conducive to the implementation of national interests or the implementation of federal government programs or the personal privacy rights enjoyed by individuals due to access or modification. For all information, the environment where users input sensitive information through the user terminal is generally more complicated, and there is a risk of sensitive information being snooped by people around, which may easily lead to the leakage of sensitive information and reduce the security of sensitive information input

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information input security monitoring method and device
  • Sensitive information input security monitoring method and device
  • Sensitive information input security monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] The embodiment of the present invention provides a security monitoring method and device for sensitive information input, which can confirm that when the terminal is currently in the state of sensitive information input, the information input monitoring screen can be obtained through the camera device of the terminal, and the current existence of information input can be confirmed according to the information input monitoring screen. Security risks, and imple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive information input security monitoring method and a device. The sensitive information input security monitoring method comprises steps that, a terminal in a sensitive information input state is determined; an information input monitoring frame is acquired through a shooting device of the terminal; information input security risks at present is confirmed according to the information input monitoring frame; information security control strategy is performed according to the existing information input security risks. Through the method, security risks in a sensitive information input process can be avoided, and sensitive information input security is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a safety monitoring method and device for sensitive information input. Background technique [0002] With the rapid development of Internet technology, business processing (such as online payment, etc.) Become a convenient and popular processing method. In practical applications, when a user uses a user terminal for business processing, the user usually needs to manually enter the bank card number, cardholder name, cardholder ID number, and mobile phone number reserved in the bank for the bound card on the user terminal. The so-called sensitive information refers to the loss, improper use or unauthorized access, which is not conducive to the implementation of national interests or the implementation of federal government programs or the personal privacy rights enjoyed by individuals due to access or modification. For all information, the environment where users input sensitiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18G06F21/55
Inventor 陈宪涛刘雅兰陈单枝商冲晨
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More