Information leakage detecting method and device
A technology of information leakage and detection methods, applied in the field of information security, can solve problems such as information leakage, clear text transmission of sensitive information, unrecognizable matching, etc., and achieve the effect of reducing duplication of labor
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0052] Such as figure 1 As shown, a first embodiment of an information leakage detection method of the present invention is shown. The information leakage detection method of this embodiment includes:
[0053] Step S10, receiving the request message sent by the channel party.
[0054] In this embodiment, the information leakage detection method is applied to the server, mainly to detect the leakage of interface sensitive information. The server is the back-end server corresponding to the front-end channel party. When the server receives the http request message sent by the channel party or returns a response data packet to the channel party according to the request message, it will detect the request message or response data packet to prevent information Give way.
[0055] Preferably, the server can be preset with...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com