Method and device for detecting data leakage interface

A technology for interface detection and data leakage, which is applied in the field of information security, can solve the problems of low efficiency of privacy leakage interface detection, and achieve the effects of authenticity, reduced labor costs, and wide data coverage

Inactive Publication Date: 2017-08-11
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a data leakage interface detection method and device,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting data leakage interface
  • Method and device for detecting data leakage interface
  • Method and device for detecting data leakage interface

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0044] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0045] Reference figure 1 The first embodiment of the data leakage interface detection method of the present invention provides a data leakage interface detection method. The data leakage interface detection method includes:

[0046] Step S10: When the application software is running, collect the data output by the application software interface to the outside of the terminal and / or stored locally in the terminal.

[0047] The invention collects the data output externally during the operation of the application software, and automatically detects whether the data output externally contains private data offline, without manual manual detection, does not rely on manual experience, and can automatically check the privacy of the application software in all directions Leakage problems, avoid false negatives, and improve the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting a data leakage interface. The method comprises the steps of collecting data which are output to the outside of a terminal and/or are stored in the terminal by an application software interface when the application software runs; detecting whether the collected data include a privacy data according to the preconfigured privacy database; and if so, determining the interface as an interface for leaking of privacy data. The invention also discloses a device for detecting the data leakage interface. According to the method and the device for detecting the data leakage interface, in combination with dynamic data collection and static data automatic analysis, the integrity of data for detection analysis is guaranteed, misinformation and missing reporting of the privacy data leakage interface are avoided, the efficiency for detection of the privacy leakage interface of the application software is greatly improved and the labor cost is reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for detecting a data leakage interface. Background technique [0002] A variety of application software involves people's social, property, office, life and other aspects, bringing convenience to people's work and life, and has become an indispensable part of smart terminals. During the application process, the application software can contact and collect a large amount of user data, including account passwords, chat information and other private information. [0003] In order to protect the information security of users, the current method of checking the privacy leakage of application software is generally manual analysis, using the experience of testers to determine whether the data of each interface in the local storage, network transmission and log output during the operation of the application software involves privacy Leakage problem. On ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/52G06F21/60G06F21/55
CPCG06F21/52G06F21/554G06F21/60
Inventor 王金锭
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products