Method and system for auditing and distributing sensitive data based on evolution strategy
A technology of sensitive data and evolution strategy, applied in the field of information security, it can solve the problems of losing the effectiveness of confirming the source of the original data, leaking audit applications, and being easily damaged.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] The sensitive data audit distribution method and system based on the evolution strategy provided by the present invention can be applied to the technical field of anti-leakage applications such as enterprise design drawings and confidential documents of confidential institutions, without any preprocessing (such as embedding watermarks) on sensitive data carriers. operation), and because the distribution refers to the user attributes of the received data, once a data leak is found, the system can detect the leak source with a high probability in a short period of time, thereby rejecting the leak source’s subsequent application and suppressing its leak behavior , effectively preventing the leakage of sensitive data.
[0058] The present invention needs to generate an initial allocation plan based on whether there is a distribution history, obtain a group of feasible allocation sub-schemes from the initial plan, and analyze the allocation plan by using evaluation criteria; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


