Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for data leakage protection

A data feature and data fingerprint technology, which is applied in the field of data security, can solve the problems of reduced accuracy of extraction, decreased algorithm performance and accuracy, and inability to automatically complete feature extraction, so as to prevent leakage and ensure accuracy.

Active Publication Date: 2016-09-21
量子创新(北京)信息技术有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional DLP systems usually extract data features by manually setting keywords or generating data fingerprints for the entire file. The former cannot automatically complete feature extraction, and the latter will reduce the accuracy of extraction when the file is large.
In addition, for the matching of sensitive data, rule matching and hash matching algorithms are usually used. Similarly, when faced with large files, the performance and accuracy of the algorithm will be seriously degraded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for data leakage protection
  • Method and system for data leakage protection
  • Method and system for data leakage protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A schematic diagram of a data leakage prevention system 100 according to an embodiment of the present invention is shown. Inside the enterprise, the computing devices 110 are connected through a local area network. Here, the components of the computing device 110 may include, but are not limited to: one or more processors or processing units, system memory, connecting different system components (including system me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for data leakage protection. The method comprises a method of extracting data features from a document so as to obtain a first data fingerprint and a second data fingerprint, a method for judging whether a first document and a second document are related or not according to the extracted data features, and a method for judging whether a suspected document comprises a sensitive content or not according to the relevancy. Meanwhile, the invention also correspondingly provides a corresponding device for extracting the data features of the document, a judgment device for judging whether the first and second documents are related or not, and a device for judging whether the suspected document comprises the sensitive content or not.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and system for data leakage protection. Background technique [0002] In recent years, with the rapid development of information technology, data security is particularly important in the daily operation of information enterprises. If the data is maliciously tampered with or destroyed, it may cause irreparable losses to the enterprise. In order to improve data security, it is often necessary to set some data security policies to monitor and protect data. In the current big data environment, with the increase of enterprise data volume, how to quickly and effectively monitor and protect the ever-increasing data has become an important issue in the current data security field. [0003] At present, in order to prevent data leakage, many enterprises have deployed a data leakage prevention (Data leakage prevention, DLP) system in the intranet to ensure the security of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F21/62
CPCG06F16/334G06F21/6245
Inventor 李唱康靖陈虎
Owner 量子创新(北京)信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More