Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for preventing sensitive data from betraying confidential matters and device thereof

A technology for sensitive data and data, applied in the field of network security, can solve the problem that anti-sensitive data cannot effectively prevent the leakage of sensitive data, and achieve the effect of preventing leakage

Inactive Publication Date: 2010-07-28
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and device for preventing sensitive data leakage, which is used to solve the problem that the existing technology for preventing sensitive data leakage cannot effectively prevent sensitive data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing sensitive data from betraying confidential matters and device thereof
  • Method for preventing sensitive data from betraying confidential matters and device thereof
  • Method for preventing sensitive data from betraying confidential matters and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Due to the inherent characteristics of the Internet, it is very weak in network security, so a large number of related network security products have emerged, such as firewalls, intrusion detection, vulnerability scanning, and security auditing. The characteristics of these security products are to protect private networks or Resources are not accessed and modified without authorization, or audit logs are recorded for future evidence collection, etc. The main idea of ​​the invention is to prevent the sensitive data of the enterprise from being published on the Internet on the firewall. see figure 2 As shown, the firewall network deployment in the embodiment of the present invention is as follows: the deployment location of the firewall is usually between the Internet and the server area or / and the internal network, and the deployment location of the firewall determines that it is the first security guarantee for network security, and it is also The most important secu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preventing sensitive data from betraying confidential matters and a device thereof, and relates to the field of network security, aiming at solving the problem that the existing technology for preventing sensitive data from betraying confidential matters can not effectively prevent the sensitive data from betraying confidential matters. The method comprises the steps that a firewall intercepts connecting request sent by an access source; sensitive data access policy matching is carried out on the connecting request by the firewall; if the matching result is allowed, the connecting request is transmitted, and target data is allowed to be accessed; and if the matching result is not allowed, the connecting request is blocked. The firewall comprises an intercepting unit used for intercepting the connecting request sent by an access source, a matching unit used for carrying out sensitive data access policy matching on the intercepted connecting request, a transmitting unit used for transmitting the connecting request and allowing the target data to be accessed when the matching result is allowed to be triggered, and a blocking unit used for blocking the connecting request when the matching result is not allowed to be triggered.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for preventing sensitive data leakage. Background technique [0002] The rapid development and popularization of the Internet has made it the main means for daily individuals, enterprises or government departments to obtain and release information, making the Internet a treasure trove of information rich in resources; the Internet has become an important means of information dissemination and is gradually replacing Traditional means of information dissemination. [0003] In order to obtain information from the Internet, the internal network of the enterprise must be connected to the Internet. Criminals or hackers can use various means to enter the enterprise's intranet to steal sensitive data; insiders can also leak sensitive data of the enterprise through the Internet. Therefore, protecting the sensitive data of enterprises from being leaked through the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 柯宗贵柯宗庆
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products