Sensitive word checking method and device

An inspection method and inspection device technology, which is applied in the field of sensitive word inspection methods and devices, can solve the problems of insufficient inspection, time-consuming and labor-consuming, and unsatisfactory inspection results, so as to improve inspection efficiency and solve low inspection efficiency.

Inactive Publication Date: 2015-12-02
RUN TECH CO LTD BEIJING
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the limited human energy, and the larger the enterprise, the more types of information that enters and exits the enterprise network every day, and the more complex the content. If the enterprise information security is completely realized by manual inspection, this is undoubtedly a time-consuming and labor-intensive task. Moreover, it is easy to appear that the inspection is not comprehensive enough, and the inspection effect is not ideal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive word checking method and device
  • Sensitive word checking method and device
  • Sensitive word checking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 It is a flow chart of a method for checking sensitive words provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of checking files containing sensitive words in storage devices. The method can be executed by the system, and specifically includes the following steps :

[0026] S110. Scan the directory to be checked to obtain the target file to be checked;

[0027] Wherein, the directory to be checked is a folder that can be used to store data in the storage device, and its specific scope can be a system default directory or a directory manually set by itself, which can be all storage space or part of the storage space. The directory to be checked can be scanned by itself at regular intervals, or can be started after receiving a request from the user for scanning.

[0028] The target file to be checked refers to a file whose file type belongs to one of the target file types, and the target file can be suffixes such a...

Embodiment 2

[0044] figure 2 It is a flow chart of another method for checking sensitive words provided by Embodiment 2 of the present invention. In this embodiment, on the basis of the foregoing embodiments, a manual verification step is added.

[0045] The method provided in this embodiment specifically includes the following:

[0046] S210. Scan the directory to be checked to obtain the target file to be checked;

[0047] S220. Obtain the text information to be checked from the target file to be checked;

[0048] S230. Perform word segmentation processing on the text information to be checked according to the sensitive lexicon, confirm whether there are sensitive words in the text information, if there are sensitive words, move the target file to be checked to the directory to be verified, otherwise , and move the target file to be checked to the verified directory.

[0049] S240. If there are sensitive words in the text information, add the corresponding file name of the target fi...

Embodiment 3

[0057] image 3 It is a sensitive word checking device provided by Embodiment 3 of the present invention, and the device includes: a catalog scanning module 310 , a text information extracting module 320 , and a sensitive word checking module 330 .

[0058] Wherein, directory scanning module 310 is used to scan the directory to be checked to obtain the target file to be checked; text information extraction module 320 is used to obtain the text information to be checked from the target file to be checked; sensitive word checking module 330 uses Perform word segmentation processing on the text information to be checked according to the sensitive lexicon, confirm whether there are sensitive words in the text information; and move the target file to be checked if there are sensitive words in the text information to the directory to be verified, otherwise, move the target file to be checked to the verified directory.

[0059] Further, the target scanning module 310 is specifically...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose a sensitive word checking method and device. The method comprises: scanning a to-be-checked directory, to acquire a to-be-checked target file; acquiring to-be-checked text information from the to-be-checked target file; according to a sensitive word library, performing word segmentation on the to-be-checked text information, to determine whether a sensitive word exists in the text information; if a sensitive word exists, moving the to-be-checked target file into a to-be-verified directory; and otherwise, moving the to-be-checked target file into a verified directory. According to the method and device provided by the embodiments of the invention, checking efficiency of sensitive word checking can be efficiently improved, and an ideal checking effect can be obtained.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of computer information security, in particular to a method and device for checking sensitive words. Background technique [0002] Information security is related to enterprise information security and national information security. With the rapid development of information construction, enterprises pay more and more attention to their own information security work. [0003] How to improve enterprise information security is the top priority in enterprise information construction. In daily work, enterprises often need to conduct information security checks on the information content entering and exiting the enterprise intranet and extranet to ensure that sensitive information is not leaked. At present, the commonly used information security inspection methods are mostly manual inspection methods. [0004] Due to the limited human energy, and the larger the enterprise, the more typ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/903
Inventor 贾高峰曹良景火一莽万月亮曹晓飞刘虹
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products