METHOD AND DEVICE FOR INFORMATION SECURITY MANAGEMENT AND STORAGE MEDIUM
First Claim
1. A method for information security management, comprising:
- detecting an information input operation of a terminal;
obtaining key information corresponding to a triggering operation of a first key, when the triggering operation of the first key is detected; and
determining whether the obtained key information matches preset key information, and if so, outputting information related to private information stored in a private information database, which corresponds to the preset key information, wherein, the preset key information includes an access password for the private information database and second key information.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention discloses a method and a device for information security management, and a storage medium, in the field of information security technologies. The method comprises: detecting an information input operation of a terminal; obtaining key information corresponding to a triggering operation of a first key, when the triggering operation of the first key is detected; determining whether the obtained key information matches preset key information, and if so, outputting information related to private information stored in a private information database, which corresponds to the preset key information, wherein, the preset key information includes an access password for the private information database and second key information. In the invention, a user needs not access a private space to check private information; instead, the user only needs to input the preset key information to query the information related to the private information. Therefore, the security of the private information is improved.
27 Citations
15 Claims
-
1. A method for information security management, comprising:
-
detecting an information input operation of a terminal; obtaining key information corresponding to a triggering operation of a first key, when the triggering operation of the first key is detected; and determining whether the obtained key information matches preset key information, and if so, outputting information related to private information stored in a private information database, which corresponds to the preset key information, wherein, the preset key information includes an access password for the private information database and second key information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device for information security management, comprising at least a processor operating in conjunction with a memory and a plurality of units, wherein the plurality of units comprise:
-
a detecting module, which is configured for detecting an information input operation of a terminal; an obtaining module, which is configured for obtaining key information corresponding to a triggering operation of a first key, when the triggering operation of the first key is detected; and an outputting module, which is configured for determining whether the obtained key information matches preset key information, and if so, outputting information related to private information stored in a private information database, which corresponds to the preset key information, wherein, the preset key information comprises an access password for the private information database and second key information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A storage medium containing computer-executable instructions, which, when executed by a computer processor, perform a method for information security management, wherein, the method comprises:
-
detecting an information input operation of a terminal; obtaining key information corresponding to a triggering operation of a first key, when the triggering operation of the first key is detected; and determining whether the obtained key information matches preset key information, and if so, outputting information related to private information stored in a private information database, which corresponds to the preset key information, wherein, the preset key information includes an access password for the private information database and second key information.
-
Specification