Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensitive data scanning method and sensitive data scanning system

A technology for sensitive data and scanning methods, applied in the field of sensitive data scanning methods and systems, can solve problems such as user property loss or commercial loss, endanger user information security, and achieve the effect of preventing leakage

Active Publication Date: 2015-08-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If sensitive data is stolen by a malicious application, it will seriously endanger the user's information security, and even cause property loss or commercial loss to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data scanning method and sensitive data scanning system
  • Sensitive data scanning method and sensitive data scanning system
  • Sensitive data scanning method and sensitive data scanning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] Unless the context clearly states otherwise, the number of elements and components in the present invention can exist in a single form or in multiple forms, and the present invention is not limited thereto. Although the steps in the present invention are arranged with labels, they are not used to limit the order of the steps. Unless the order of the steps is clearly stated or the execution of a certain step requires other steps as a basis, the relative order of the steps can be adjusted. It can be understood that the term "and / or" used herein refers to and covers any and all possible combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a sensitive data scanning method, which comprises the following steps of: obtaining an input target scanning application and an input sensitive word to be scanned; obtaining data generated by the target scanning application; searching the sensitive word in the obtained data; and prompting the searching result if the sensitive word is found. The data generated in the application running process can be easily stolen by a malicious application, so that if the data generated by the application includes sensitive data, the sensitive data leakage risk of the application is great. According to the sensitive data scanning method, the sensitive word to be scanned input by a user is searched for in the data generated by the target scanning application input by the user, and whether the target scanning application has the risk of leaking the specific sensitive data or not can be detected, so that the goal of effectively preventing the leakage of the sensitive data is conveniently achieved. The invention also provides a sensitive data scanning system, and a sensitive data scanning method and a sensitive data scanning system applied to a mobile terminal.

Description

technical field [0001] The invention relates to the technical field of mobile terminals and computers, in particular to a sensitive data scanning method and system. Background technique [0002] With the rapid development of mobile terminal technology and computer technology, there are a wide variety of software applications running on it, covering a wide range of areas, involving social networking, online games, e-commerce and government affairs, online banking and online securities, etc. The use of various software applications has brought convenience to people's life, work and study, but it has also brought about information security issues. During the operation of various software applications, some sensitive data may be leaked, such as passwords, private keys, and account card numbers. If sensitive data is stolen by a malicious application, it will seriously endanger the user's information security, and even cause property loss or commercial loss to the user. Therefor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/55G06F17/30
Inventor 廖志委
Owner TENCENT TECH (SHENZHEN) CO LTD