Method and system for preventing sensitive information from leakage

A sensitive information and algorithm technology, applied in the field of information security, can solve problems such as increasing the risk of log leakage, and achieve the effect of preventing leakage

Inactive Publication Date: 2016-02-17
刘奇
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the above problems, the present invention provides a method and system for preventing the leakage of sensitive information, so as to solve the above problem that the logs containing sensitive information need to be sent to a third party to increase the risk of log leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing sensitive information from leakage
  • Method and system for preventing sensitive information from leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings. However, those skilled in the art know that the present invention is not limited to the drawings and the following embodiments.

[0035] figure 1 It is a flowchart of a method for log obfuscation according to an embodiment of the present invention.

[0036] Step 101, before the client terminal runs the application program, the terminal user activates the log tool of the application program.

[0037] In this step, the application program installed on the client includes the application program interface. When the user needs to run a certain application program, the user selects the application program and displays the application program interface of the application program on the terminal screen. There is a button of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for preventing sensitive information from leakage. The method comprises the following steps: before operating an application program at a client, enabling a client user to activate a log tool of the application program; after the client activates the log tool of the application program, determining whether a log confusion function of the log tool is started or not by the client; if determining that the log confusion function is started, when operating the application program, confusing original sensitive information in a generated log when the log confusion function generates the log; matching the confused log information with the original sensitive information in the log and storing the original sensitive information to a local dictionary; when the client user determines that the application program has faults according to the confused log information, finding out the original sensitive information from the local dictionary; and debugging the application program according to the original sensitive information. The invention further provides a system for preventing the sensitive information from leakage.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for preventing leakage of sensitive information. Background technique [0002] With the development of technology, various applications become more complex than before. Generally speaking, there are more than one application programs running in the system environment of many companies, and these applications are all running on the company's system. If an error occurs in any application, logging or logging is required to debug and analyze the error. However, there are a lot of sensitive and / or confidential information in the application program in the company system environment, for example, the user name and password for logging into the system, the IP address and port information of the connection, etc., are all recorded in the log. If the log information is exposed to others, it will bring huge risks to the company's IT system. Hackers (hackers) will a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0656H04L63/0428
Inventor 刘奇
Owner 刘奇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products