Sensitive information protection method and device, computing equipment and storage medium
A technology for sensitive information and computing equipment, which is applied in the field of information security and can solve problems such as low security and cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] figure 1 It is a flow chart of the sensitive information protection method provided in Embodiment 1 of the present invention. The sensitive information protection method protects sensitive information transmission from a first computing device to a second computing device.
[0059] The invention relates to a smart city, and can be applied to scenarios such as smart government affairs, smart communities, smart medical care, and smart education, thereby promoting the construction of a smart city.
[0060] Such as figure 1 As shown, the sensitive information protection method includes:
[0061] 101. A first computing device judges whether display data to be sent to a second computing device includes sensitive information of a user.
[0062] The display data is used for page display. For example, the second computing device sends a bank account balance query request to the first computing device, and the first computing device responds to the query request to send displ...
Embodiment 2
[0120] figure 2 It is a structural diagram of the sensitive information protection device provided by Embodiment 2 of the present invention. The sensitive information protection apparatus 20 is applied to the first computing device. The sensitive information protection device 20 protects the transmission of sensitive information from the first computing device to the second computing device.
[0121] Such as figure 2 As shown, the sensitive information protection device 20 may include a judgment module 201 , a desensitization module 202 , a first encryption module 203 , a second encryption module 204 , a combination module 205 , a generation module 206 , and a sending module 207 .
[0122] A judging module 201, configured to judge whether the presentation data to be sent to the second computing device contains sensitive information of the user.
[0123] The display data is used for page display. For example, the second computing device sends a bank account balance query ...
Embodiment 3
[0181] This embodiment provides a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps in the above embodiments of the sensitive information protection method are implemented, for example figure 1 101-107 shown:
[0182] 101. Determine whether the display data to be sent to the second computing device contains sensitive information of the user;
[0183] 102. If the display data to be sent to the second computing device contains sensitive information of the user, desensitize the sensitive information to obtain desensitized information;
[0184] 103. Encrypt the sensitive information by using the user's public key to obtain first encrypted information;
[0185] 104. Acquire noise information, and encrypt the noise information by using the user's public key to obtain second encrypted information;
[0186] 105. Combining the first encrypted information and the second encrypted information into an encrypted inf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


