Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method, device, terminal and system for preventing information leakage

A technology of information leakage and input information, applied in the security field, can solve the problems of incomplete data in the phishing website database and inability to obtain security protection, and achieve the effect of protecting property and privacy

Active Publication Date: 2020-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the data in the phishing website library is incomplete, and there will be a certain percentage of missed phishing websites. When users visit these missed phishing websites, they cannot get security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, terminal and system for preventing information leakage
  • A method, device, terminal and system for preventing information leakage
  • A method, device, terminal and system for preventing information leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] The embodiment of the present invention provides a method for preventing information leakage, such as figure 1 As shown, the method includes:

[0051] S101. In response to the detected interface operation, acquire the URL address of the Uniform Resource Locator to be accessed.

[0052] If the user inputs the website address or clicks on the website link, the terminal used by the user obtains the URL address of the Uniform Resource Locator to be accessed. T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device, terminal and system for preventing information leakage. According to the method, device, terminal and system for preventing information leakage, corresponding processing can be carried out on an URL (Universal Resource Locator) to be accessed on the basis of a safety state of the URL to be accessed; and a dangerous webpage is intercepted, a safety webpage is directly accessed, and an unknown webpage is subjected to safety protection on the basis of a user behavior so as to give consideration to various safety states. If the safety state of the URL to be accessed is unknown, information input by a user is detected, and sensitive information is prompted, so that a case that the user is deceived by a malicious website to leak the sensitive information is prevented, and property and privacy safety of the user is protected.

Description

technical field [0001] The present invention relates to the security field, in particular to a method, device, terminal and system for preventing information leakage. Background technique [0002] In recent years, phishing websites have appeared frequently around the world, seriously affecting the development of online financial services and e-commerce, endangering the interests of users, and affecting users' confidence in using the Internet. Phishing websites usually fake the Uniform Resource Locator (Universal Resource Locator, URL) address and page content of legitimate websites, or pretend to be legitimate websites by other means to defraud users of private information such as bank card numbers and passwords. [0003] The prior art solution usually uses a specific method to identify the URL of the phishing website to form a phishing website library, and judges whether the URL to be accessed is a phishing website based on the phishing website library. However, the data i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F16/955
CPCG06F16/9566H04L63/1483
Inventor 张辉
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products