Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information leakage detecting method and device

A technology of information leakage and detection methods, applied in the field of information security, can solve problems such as information leakage, clear text transmission of sensitive information, unrecognizable matching, etc., and achieve the effect of reducing duplication of labor

Active Publication Date: 2017-08-18
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if USERNAME appears in the parameter in the http request of the newly developed system, and the specific keyword includes username but does not include USERNAME, the match cannot be identified, or if uname appears in the parameter in the http request, the match cannot be identified, which may lead to sensitive information plaintext Transmission, Risk of Information Disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leakage detecting method and device
  • Information leakage detecting method and device
  • Information leakage detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] Such as figure 1 As shown, a first embodiment of an information leakage detection method of the present invention is shown. The information leakage detection method of this embodiment includes:

[0053] Step S10, receiving the request message sent by the channel party.

[0054] In this embodiment, the information leakage detection method is applied to the server, mainly to detect the leakage of interface sensitive information. The server is the back-end server corresponding to the front-end channel party. When the server receives the http request message sent by the channel party or returns a response data packet to the channel party according to the request message, it will detect the request message or response data packet to prevent information Give way.

[0055] Preferably, the server can be preset with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information leakage detecting method and device, which comprises the following steps of receiving a request message sent by a channel party; matching a parameter included in the request message and a key word obtained from prior machine learning, and obtaining a matching degree between the parameter and the key word based on a matching result; and when the matching degree is greater than a preset threshold, determining that information of the request message is disclosed, and recording the relative information of the request message. The invention also discloses an information leakage detecting device. According to the information leakage detecting method and the device, more key words can be identified automatically through the machine learning; sensitive information can be identified substantially and effectively; duplicate work of safety testers can be reduced; and efficiency of detecting the information leakage can be improved and risks of leaking information can be reduced.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information leakage detection method and device. Background technique [0002] At present, in order to protect the user's information security, the server only pre-defines specific keywords corresponding to sensitive information during the process of detecting information leakage through the web application vulnerability scanner, such as email, username, etc., and compares the parameters of the scanning record with the key If there is a parameter consistent with the keyword in the scanned record parameters, it means that there is a clear text transmission of sensitive information, that is, there is a risk of information leakage. However, if USERNAME appears in the parameter in the http request of the newly developed system, and the specific keyword includes username but does not include USERNAME, the match cannot be identified, or if uname appears in the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F17/27G06F17/30
CPCG06F16/951G06F21/556G06F40/284H04L63/30G06F21/6263G06N20/00G06F16/90344G06F21/6245G06N7/01
Inventor 王胡园
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products