Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for detecting information leakage of cloud service

A technology of information leakage and detection method, applied in the field of cloud service information leakage detection, can solve problems such as important information leakage

Inactive Publication Date: 2018-12-21
长沙拓扑陆川新材料科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the defense method cannot completely avoid information leakage. As long as the client is left in the hands of the attacker for a long enough time, it will inevitably encounter the fate of being cracked, and the important information saved by the client, such as keys, will be destroyed. leaked out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting information leakage of cloud service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with its embodiments; it should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention. invention. Other systems, methods and / or features of this embodiment will become apparent to those skilled in the art after reviewing the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the following claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the following detailed description.

[0063] The present invention proposes a cloud service information leakage detection method, at least a part of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

At least a portion of the method is performed by a computing device includes at least one processor. The method includes identifying a cloud-based service to provide a remote software service to a client organization; Extracting a list of customers using cloud-based services from publicly accessible pages of cloud-based services; Retrieving, for each customer in the customer list, at least one link to a customer page on a cloud-based service, the link representing a method for a customer to access a remote software service provided by the cloud-based service; Analyzing at least one risk factorfor each identified customer page; Based on an analysis of the risk score of the computing service, the risk score represents an overall estimate of the security risk to the customer organization using cloud-based services.

Description

technical field [0001] The present invention relates to the technical field of cloud service information security, in particular to a cloud service information leakage detection method and system. Background technique [0002] Although the client in the current user environment adopts a variety of anti-reversible and anti-debugging methods to prevent the leakage of user privacy information, the main method for the client to prevent source code leakage and key and other important information leakage in the prior art is through: [0003] Code obfuscation: Make the source code unreadable by substituting variables, adding some constant changes, changing the order, etc.; packing: replacing and packaging the binary files of the client, and directly inserting some binary protection; encryption: converting important The content is encrypted to prevent direct exposure of passwords; anti-debugging: detect whether the application itself is being debugged by starting a process of mutual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 段安婧江柳其他发明人请求不公开姓名
Owner 长沙拓扑陆川新材料科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products