Executable file data anti-leakage scanning method, system and gateway

A technology for executing files and scanning methods, applied in the field of data security, can solve problems such as data leakage, inability to determine the sensitive data of executable files, and inability to identify the content of executable files, so as to achieve convenient operation, reduce the risk of data leakage, and facilitate The effect of promotion

Inactive Publication Date: 2018-05-18
北京明朝万达科技股份有限公司
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing anti-leakage gateways can only identify office, txt, and pdf type documents, and cannot identify executable files such as e

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Executable file data anti-leakage scanning method, system and gateway
  • Executable file data anti-leakage scanning method, system and gateway
  • Executable file data anti-leakage scanning method, system and gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Data leakage prevention: refers to the content-centric control method, which generates fingerprint records for the content of files, and controls files through terminals, gateways, and storage.

[0034] Executable file: refers to a file that can be loaded and executed by the operating system. Under different operating systems, executable files are presented in different ways. Under the windows operating system, the executable program can be .exe file, .sys file, .com and other file types, while under different operating systems such as Linux, Unix and IOS, it will be other different files.

[0035] Heuristic: Refers to the ability of self-discovery or the knowledge and skills of using a certain method or method to judge mistakes. It is the antivirus software that can analyze whether the logical structure of the file code contains the characteristics of a malicious program, or judge whether it has malicious behavior by proactively executing the code in a virtual safe env...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an executable file data anti-leakage scanning method, gateway and system. The method comprises the following steps of scanning and judging whether data flow passing the gatewaycontains an executable file or not when an intranet user sends the file to an extranet through the data gateway; capturing the executable file in the data flow passing the data gateway; judging whether the executable file contains sensitive data or not; according to the sensitive data contained in the executable file, determining a sensitivity level of the file; and according to the sensitivity level of the executable file, performing corresponding processing on the executable file, and caching a fingerprint of the executable file. Through the technical scheme, the executable file can be scanned, so that the data security is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to an executable file data leakage prevention scanning method, system and gateway. Background technique [0002] In recent years, with the popularization of information systems in enterprise groups and financial banks, the security design of IT systems has also received more and more attention. In line with the principle of reducing the risk of data leakage, this goal is achieved by deploying a data leakage prevention gateway during the construction of the internal IT system of the financial industry unit. The data leakage prevention gateway can identify the content of documents passing through the gateway, classify and classify documents according to the results of content identification and preset policies, encrypt with different levels of encryption, and record detailed access logs to improve the security of documents. safety. But the traditional file content recognition type is li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6209H04L63/0428
Inventor 刘自强王志海喻波秦凯吴宏毅
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products