Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information Leakage Detection Method and Device

A technology of information leakage and detection methods, applied in the field of information security, can solve problems such as information leakage, unrecognizable matching, and clear text transmission of sensitive information, and achieve the effect of reducing duplication of labor

Active Publication Date: 2019-07-12
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if USERNAME appears in the parameter in the http request of the newly developed system, and the specific keyword includes username but does not include USERNAME, the match cannot be identified, or if uname appears in the parameter in the http request, the match cannot be identified, which may lead to sensitive information plaintext Transmission, Risk of Information Disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information Leakage Detection Method and Device
  • Information Leakage Detection Method and Device
  • Information Leakage Detection Method and Device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0052] like figure 1 As shown, the first embodiment of an information leakage detection method of the present invention is shown. The information leakage detection method of this embodiment includes:

[0053] Step S10: Receive the request message sent by the channel party.

[0054] In this embodiment, the information leakage detection method is applied to the server, mainly to detect the leakage of interface sensitive information. The server is the back-end server corresponding to the front-end channel party. When the server receives the http request message sent by the channel party or returns a response data packet to the channel party according to the request message, it will detect the request message or response data packet to prevent information Give way.

[0055] Preferably, the server may be preset w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting information leakage, comprising: receiving a request message sent by a channel party; matching parameters contained in the request message with keywords obtained by machine learning in advance, and obtaining the parameters and the parameters based on the matching results. The matching degree between the keywords; when the matching degree is greater than a preset threshold, it is determined that the information of the request message is leaked, and the relevant information of the request message is recorded. The invention also discloses an information leakage detection device. The present invention automatically identifies more keywords through machine learning, can identify sensitive information substantially and effectively, reduce the repetitive work of security testers, improve the efficiency of information leakage detection and reduce the risk of information leakage.

Description

technical field [0001] The present invention relates to the technical field of information security, and in particular, to a method and device for detecting information leakage. Background technique [0002] At present, in order to protect the user's information security, the server only pre-defines specific keywords corresponding to sensitive information, such as email, username, etc., in the process of detecting information leakage through the web application vulnerability scanner, and compares the parameters of the scan record with the key. If there is a parameter consistent with the keyword in the parameters of the scan record, it means that there is a clear text transmission of sensitive information, that is, there is a risk of information leakage. However, if USERNAME appears in the parameters in the http request of the newly developed system, and the specific keyword includes username, but does not include USERNAME, the match cannot be recognized, or the parameter in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F17/27G06F16/951
CPCG06F16/951G06F21/556G06F40/284H04L63/30G06F21/6263G06N20/00G06F16/90344G06F21/6245G06N7/01
Inventor 王胡园
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products