File information leak-proof method, medium and equipment based on Hash algorithm

A hash algorithm and file information technology, applied in the field of information leakage prevention, can solve the problems of important information leakage and loss

Inactive Publication Date: 2018-09-21
北京云易天成安全科技开发有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network users often transfer files through email attachments, online transmission, U disk copy, CD burning, etc. During the transfer process, it will not detect whether the transferred file is a leaked file, which may cause important information leakage and cause irreparable damage. Loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File information leak-proof method, medium and equipment based on Hash algorithm
  • File information leak-proof method, medium and equipment based on Hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0037] Please refer to figure 1 , figure 1 It is a flow chart of the information protection process in a hash algorithm-based file information leakage prevention method provided in the first embodiment of the present invention. The hash algorithm-based file information leakage prevention method provided in this embodiment includes information Protection process:

[0038] Step S101: Intercepting files to be detected during data transmission.

[0039] Step S102: Calculating the fuzzy hash value of the file to be detected;

[0040] Step S103: According to the pre-calculated sample fuzzy hash value of the sample file, calculate the similarity between the sample fuzzy hash value and the fuzzy hash value to be detected.

[0041] Step S104: According to the similarity, determine whether the file to be detected is leaked.

[0042] Step S105: preventing the file to be detected that is determined to be leaked from passing through.

[0043] Calculate the fuzzy hash value of the file...

no. 2 example

[0146] In the above-mentioned first embodiment, a file information leakage prevention method based on a hash algorithm is provided. In combination with the above-mentioned first embodiment, the second embodiment of the present invention provides a computer-readable storage medium on which is stored A computer program, when the program is executed by a processor, implements the method for redirecting an access request provided in the first embodiment above.

[0147] It can be seen from the above technical solution that the computer-readable storage medium provided by this embodiment can intercept the file to be detected in the data transmission process under the control of the processor, calculate the fuzzy hash value to be detected of the file to be detected, according to the pre-calculated The sample fuzzy hash value of the sample file, calculate the similarity between the sample fuzzy hash value and the fuzzy hash value to be detected, and then judge whether the file to be de...

no. 3 example

[0149] In combination with the hash algorithm-based file information leakage prevention method provided in the first embodiment, the present invention also provides a computer device, including: a memory, a processor, and a computer program stored in the memory and operable on the processor When the processor executes the program, the method for preventing leakage of file information based on a hash algorithm provided in the above-mentioned first embodiment is implemented.

[0150] It can be seen from the above technical solution that the computer device provided in this embodiment can intercept the file to be detected during the data transmission process, calculate the fuzzy hash value to be detected of the file to be detected, and according to the pre-calculated sample fuzzy hash value of the sample file, Calculate the similarity between the fuzzy hash value of the sample and the fuzzy hash value to be detected, and then judge whether the file to be detected is leaked accordi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file information leak-proof method, medium and equipment based on Hash algorithm. The method comprises the following steps: intercepting a to-be-detected file in a data transmission process, computing a to-be-detected fuzzy hash value of the to-be-detected file, computing the similarity of a sample fuzzy hash value and the to-be-detected fuzzy hash value according to the pre-computed sample fuzzy hash value of a sample file, and judging whether the to-be-detected file is leaked according to the similarity, and then timely detecting the leaked file in the data transmission process; if the file is leaked, preventing the to-be-detected file from passing, thereby preventing the important file information from leaking, and protecting the important information.

Description

technical field [0001] The present invention relates to the technical field of information leakage prevention, in particular to a file information leakage prevention method, medium and equipment based on a hash algorithm. Background technique [0002] In the field of the Internet, data exists in various forms. Except for the data in the database, most of the rest exist in various file forms, such as plain text files, formatted text files, picture files, sound files, etc. documents etc. Network users often transfer files through email attachments, online transmission, U disk copy, CD burning, etc. During the transfer process, it will not detect whether the transferred file is a leaked file, which may cause important information leakage and cause irreparable damage. Loss. Contents of the invention [0003] Aiming at the defects in the prior art, the present invention provides a file information leakage prevention method, medium and equipment based on a hash algorithm, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/123H04L63/30
Inventor 刘立军周建波汪楫人
Owner 北京云易天成安全科技开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products