Method and system for detecting sensitive information in database

A sensitive information and detection method technology, applied in the field of information security, can solve the problem of not detecting where the sensitive information is

Active Publication Date: 2014-10-29
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Common database security scanning software mainly detects database system configuration risks and security vulnerabilities of the datab

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting sensitive information in database
  • Method and system for detecting sensitive information in database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] First of all, it should be explained that the present invention relates to database technology, which is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software functional modules include but are not limited to: regular expression feature library, scanning module, judging module, display module, etc. All mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.

[0034] Below in conjunction w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and provides a method and system for detecting sensitive information in a database. The method for detecting the sensitive information in the database comprises the steps of scanning a system view of the database to acquire all user tables, extracting a part of data from each field of each user table as a sample, and carrying out analysis and matching on the samples to judge whether the sensitive information exists. The system for detecting the sensitive information in the database comprises a system table, a scanning module, a judgment module and a display module, wherein the scanning module is connected with the database, and the judgment module is connected with a sensitive information feature base, the scanning module and the display module. According to the method and system for detecting the sensitive information in the database, based on the regular expression feature base, by carrying out scanning detection on the user data in the database through the feature base, the position of the sensitive information of mobile phone numbers, bank card numbers, ID numbers, e-mail addresses and the like can be found, a detailed scanning report can be provided, and then a database administrator can carry out key protection and auditing.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a database sensitive information detection method and system. Background technique [0002] At present, various sensitive information leakage incidents still occur frequently, and data security has attracted more and more attention. But the current database system is getting bigger and bigger. The large amount of data has brought new problems to the security management of the database. It is easy to manage if there are only a few pieces of data in the database, but if there are dozens of databases and thousands of tables, and you don’t know where the important information is, it will be impossible to protect and audit. Therefore, there must be a method that can quickly and comprehensively discover the location of important information in the database, and carry out key protection and audit on these important information. [0003] Common database security scanning ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/245G06F16/2457
Inventor 刘海卫范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products