Secret-associated network information leakage risk monitoring method
A risk monitoring and secret-related technology, which is applied in the field of network information leakage risk monitoring, can solve the problems of leaking secrets and the lack of comprehensive supervision of hidden danger behaviors, and achieves the effect of high judgment accuracy, easy audit management, and wide monitoring coverage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0039] The specific steps of a method for monitoring the risk of confidential network information leakage are:
[0040] The first step is to build a confidential network information leakage risk monitoring system
[0041] The confidential network information leakage risk monitoring system includes: client operation record module, leakage risk analysis module, operation correlation module and server-side behavior analysis module.
[0042] The function of the operation record module is: a monitoring module loaded on the user client in a driving form, real-time monitoring and recording of the client's file operations, program operations, network operations, and file inflow and outflow events. The operation record is formed according to factors such as operation ID, operation time, process, thread, operation method, input file, input file attribute, output file or uploaded data package, output file attribute, and the operation record is passed to the leakage risk analysis module.
[0043]...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap