Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensitive information protection method and device, computing equipment and storage medium

A technology for sensitive information and computing equipment, which is applied in the field of information security and can solve problems such as low security and cracking

Active Publication Date: 2020-10-23
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main reason for this security issue is the insecure transmission of sensitive information from a first computing device (such as a server) to a second computing device (such as a client)
At present, the transmission of sensitive information from the first computing device to the second computing device usually adopts RSA encrypted plaintext, MD5 value transmission, etc. Although plaintext transmission is avoided, hackers can easily crack these sensitive information through some methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information protection method and device, computing equipment and storage medium
  • Sensitive information protection method and device, computing equipment and storage medium
  • Sensitive information protection method and device, computing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] figure 1 It is a flow chart of the sensitive information protection method provided in Embodiment 1 of the present invention. The sensitive information protection method protects sensitive information transmission from a first computing device to a second computing device.

[0059] The invention relates to a smart city, and can be applied to scenarios such as smart government affairs, smart communities, smart medical care, and smart education, thereby promoting the construction of a smart city.

[0060] Such as figure 1 As shown, the sensitive information protection method includes:

[0061] 101. A first computing device judges whether display data to be sent to a second computing device includes sensitive information of a user.

[0062] The display data is used for page display. For example, the second computing device sends a bank account balance query request to the first computing device, and the first computing device responds to the query request to send displ...

Embodiment 2

[0120] figure 2 It is a structural diagram of the sensitive information protection device provided by Embodiment 2 of the present invention. The sensitive information protection apparatus 20 is applied to the first computing device. The sensitive information protection device 20 protects the transmission of sensitive information from the first computing device to the second computing device.

[0121] Such as figure 2 As shown, the sensitive information protection device 20 may include a judgment module 201 , a desensitization module 202 , a first encryption module 203 , a second encryption module 204 , a combination module 205 , a generation module 206 , and a sending module 207 .

[0122] A judging module 201, configured to judge whether the presentation data to be sent to the second computing device contains sensitive information of the user.

[0123] The display data is used for page display. For example, the second computing device sends a bank account balance query ...

Embodiment 3

[0181] This embodiment provides a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps in the above embodiments of the sensitive information protection method are implemented, for example figure 1 101-107 shown:

[0182] 101. Determine whether the display data to be sent to the second computing device contains sensitive information of the user;

[0183] 102. If the display data to be sent to the second computing device contains sensitive information of the user, desensitize the sensitive information to obtain desensitized information;

[0184] 103. Encrypt the sensitive information by using the user's public key to obtain first encrypted information;

[0185] 104. Acquire noise information, and encrypt the noise information by using the user's public key to obtain second encrypted information;

[0186] 105. Combining the first encrypted information and the second encrypted information into an encrypted inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to information security, and provides a sensitive information protection method and device, computing equipment and a storage medium. The method comprises the following steps: ifdisplay data to be sent to second computing equipment by first computing equipment contains sensitive information of a user, desensitizing the sensitive information to obtain desensitized information; encrypting the sensitive information to obtain first encrypted information; acquiring noise information, and encrypting the noise information to obtain second encrypted information; forming an encrypted information vector by the first encrypted information and the second encrypted information; generating index information of the first encrypted information; and sending the display data containing the desensitized information, the encrypted information vector and the index information to a second computing device, so that the second computing equipment generates a display page according to the display data, obtains first encrypted information from the encrypted information vector according to the index information, and decrypts the first encrypted information to obtain sensitive information. According to the invention, the transmission security of sensitive information between computing devices can be improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a sensitive information protection method, device, computing device and storage medium. Background technique [0002] Most hackers steal sensitive information left by customers in a certain system, such as home address, ID card, bank card, name, etc., through network interception, cracking customer simple password, DNS hijacking, fake IP and other means. The main reason for this security problem is that the transmission of sensitive information from a first computing device (such as a server) to a second computing device (such as a client) is not secure. At present, the transmission of sensitive information from the first computing device to the second computing device usually adopts RSA encrypted plaintext, MD5 value transmission, etc. Although plaintext transmission is avoided, hackers can easily crack these sensitive information through some methods. Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08
CPCH04L9/0869H04L9/3066H04L63/0428H04L63/0442
Inventor 杨宇奇
Owner PING AN TECH (SHENZHEN) CO LTD