Terminal and method for preventing sensitive information leakage

A sensitive information and anti-leakage technology, which is applied in the electronic field, can solve the problems of insufficient sensitive information leakage methods, and achieve the effects of reducing the risk of being leaked, improving terminal performance, and reducing load

Active Publication Date: 2014-05-07
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the above technical problems, the present invention provides a new terminal and a method for preventing leakage of sensitive information, which solves the problem that existing methods for preventing leakage of sensitive information are not perfect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and method for preventing sensitive information leakage
  • Terminal and method for preventing sensitive information leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0033] figure 1 For the flow chart of the method for preventing the leakage of sensitive information provided by an embodiment of the present invention, please refer to figure 1 , including the following processes:

[0034] S101. Detect whether it is necessary to activate the anti-leakage function of sensitive information. If so, proceed to step S102. If not, continue to detect.

[0035] Methods for detecting whether the sensitive information leakage prevention function needs to be activated include but are not limited to methods 1 to 3 listed below:

[0036] Method 1: Detect whether there is a sensitive application program currently running, and if so, the detection result indicates that the sensitive information leakage prevention function needs to be activated.

[0037] Sensitive applications include but are not limited to o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal and a method for preventing sensitive information leakage. The terminal comprises a detection module and a log generating function control module, wherein the detection module is used for detecting whether starting a sensitive information leakproof function is needed or not; the log generating function control module is used for closing the terminal log generating function when a detecting result of the detection module is that starting the sensitive information leakproof function is needed. The method comprises the following steps: detecting whether starting the sensitive information leakproof function is needed or not; closing the terminal log generating function if starting the sensitive information leakproof function is needed. According to the technical scheme, the problem that conventional methods for preventing sensitive information leakage are not thorough is solved.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a terminal and a method for preventing leakage of sensitive information. Background technique [0002] When users use sensitive applications on terminals (such as online banking, online shopping clients, etc.), they usually need to input sensitive information (such as account numbers, passwords, etc.). Taking the user's login account as an example, a common method to protect this type of sensitive information is: after entering a string of characters that the user uses as the login account, the background program encrypts it with various algorithms during the process of clicking the login operation, in order to protect it from being leaked. The focus of this type of anti-leakage measures is on the encryption method of sensitive information, while ignoring the log function in the terminal, because the current terminal will generate log information after it is turned on, and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/55G06F11/34
CPCG06F21/6245
Inventor 陈祥汪智勇
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products