Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensitive data identification method and device

A technology of sensitive data and identification method, applied in the information field, can solve the problems of low precision of sensitive data, inability to encrypt sensitive data, incomplete sensitive data, etc.

Active Publication Date: 2020-11-24
BEIJING QIHOO TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users will also input sensitive data in subsequent applications. The application data obtained based on the network layer contains incomplete sensitive data. If the sensitive data is obtained by identifying the application data obtained based on the network layer, the accuracy of the sensitive data will be low. , and some sensitive data cannot be encrypted, resulting in low security of sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data identification method and device
  • Sensitive data identification method and device
  • Sensitive data identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] The embodiment of the present invention provides a sensitive data identification method, such as figure 1 As shown, the method includes:

[0025] 101. Acquire a bearer protocol corresponding to a preset application layer protocol.

[0026] Wherein, the preset application layer protocol can be Hyper Text Transfer Protocol (Hyper Text Transfer Protocol, HTTP), File Transfer Protocol (File Transfer Protocol, FTP) etc.; over S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive data identification method and device, and relates to the technical field of information. The invention mainly aims at improving the precision of sensitive data and improving the security of the sensitive data. The method comprises the following steps: obtaining a bearer protocol corresponding to a preset application layer protocol; matching the bearer protocol with feature character data in a preset storage position, wherein different feature character data is stored in the preset storage position; and identifying the bearer protocol according to a matching result to obtain the sensitive data. The sensitive data identification method and device disclosed by the invention are suitable for identifying the sensitive data.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a sensitive data identification method and device. Background technique [0002] With the continuous development of information technology, cloud storage services appear. Cloud storage services are online storage services launched by Internet companies, providing users with data management functions such as storage, access, backup, and sharing of Internet application data. There are more and more Internet-based applications. Some Internet-based applications will involve users' sensitive data. The sensitive data can be data such as user account passwords, user ID numbers, and names. Viewed or stolen by other users. In order to ensure the security of sensitive data, it is usually necessary to encrypt the sensitive data. [0003] At present, when sensitive data is identified, the sensitive data is usually identified based on application data acquired at the network layer. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L29/08
CPCG06F21/602H04L67/1097
Inventor 刘敬良黄凌志
Owner BEIJING QIHOO TECH CO LTD