Automatic information leakage monitoring method and system based on internet big data

A technology of information leakage and automatic monitoring, applied in the field of information security, can solve the problems of low threshold for information outflow, threat of information confidentiality control, etc., and achieve the effect of avoiding information leakage incidents

Active Publication Date: 2018-06-05
NANJING NANYOU INST OF INFORMATION TECHNOVATION CO LTD
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, online information channels such as portal websites, emails, instant messaging, and blogs have relatively low thresholds for sending out information, which poses a greater threat to information confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic information leakage monitoring method and system based on internet big data
  • Automatic information leakage monitoring method and system based on internet big data
  • Automatic information leakage monitoring method and system based on internet big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as figure 1 As shown, the automatic monitoring method for information leakage based on Internet big data includes the following steps:

[0033] S100. Install a security analysis server on the information exchange channel to provide basic services for information security review;

[0034] The security analysis server of the present invention has a network connection with the information exchange channel, and the ownership of the security analysis server belongs to the information exchange channel, and the information exchange channel mainly refers to online information such as various portal websites, mail services, instant messaging services, and blog services. outgoing channels.

[0035] Through the design of separating the information exchange channel and the confidential analysis server, the changes to the existing website are minor, and commercial development and application can be carried out, which improves the enthusiasm of the online information distributi...

Embodiment 2

[0051] In a more preferred embodiment, S501 semantic analysis also includes text extraction and scene recognition for images, voices and videos in the information exchange request, and then the process of extracting semantic features and keywords.

[0052] The confidential review of image, voice and video-related information needs to first extract the text, and then obtain the semantic features and keywords. The subsequent steps are like S502, S503, and S504.

Embodiment 3

[0054] In another embodiment, the registration process at S200 also includes a payment process by the confidential review unit to the information exchange channel.

[0055] By paying for the confidentiality review operation process, and making the operators of the information exchange channel provide socialized paid confidentiality review services for the registered confidentiality review operation modules according to the agreement, the cooperation between the information exchange channel and the commercial confidentiality review unit is achieved. Win-win and balance of interests.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an automatic information leakage monitoring method and system based on internet big data; the system comprises a secrecy analysis server, a secrecy checking operation module and a terminal user program, wherein the secrecy analysis server is arranged on an information exchange channel; the secrecy checking operation module and the terminal user program are registered on thesecrecy analysis server; the secrecy analysis server is installed on the information exchange channel, and a secrecy checking unit is used for registering the secrecy checking operation module to thesecrecy analysis server; when the terminal user program sends an information exchange request to the information exchange channel, the information exchange channel transmits the information exchangerequest to the secrecy analysis server through a network; the secrecy analysis server performs semantic analysis and extracts semantic features and keywords in the semantic analysis, and transmits thedata to the secrecy checking operation module or a secrecy checking operation host conforming to a transmission condition to carry out a secrecy checking operation and obtain a conclusion that the check passes and does not pass; and complex and changeable information secrecy real-time monitoring requirements of all kinds of online information channels, various enterprises, enterprise units and national institutions are met.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an information leakage automatic monitoring method and system based on Internet big data. Background technique [0002] At present, online information channels such as portal websites, emails, instant messaging, and blogs have relatively low thresholds for sending out information, which poses a greater threat to information confidentiality control, and there are many types of enterprises, institutions, and state agencies that require different information confidentiality rules. It is impossible to simply implement a simple transformation on a certain information channel. Leaking secrets through open online information channels has become the main channel for leaking secrets. Therefore, it is very important to develop a real-time monitoring system for information leakage that can be applied to various online information channels and can be used by many enterprises, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/27
CPCG06F40/30H04L63/0884H04L63/30
Inventor 林军
Owner NANJING NANYOU INST OF INFORMATION TECHNOVATION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products