Sensitive information detection method and device and electronic device

A technology for sensitive information and detection methods, applied in the computer field, can solve problems such as false positives of detection results, achieve the effects of reducing data volume, improving screening efficiency, and reducing quantity

Active Publication Date: 2019-05-17
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a sensitive information detection method and system to solve the problem of a large number of false positives in detection results in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information detection method and device and electronic device
  • Sensitive information detection method and device and electronic device
  • Sensitive information detection method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] As mentioned above, leaks of sensitive information on the Internet are not uncommon. For example, GitHub has been the hardest hit area for leaks of sensitive information. Some staff who lack security awareness may submit sensitive information such as the company's important program codes, managed accounts and passwords to various platforms, resulting in the leakage of sensitive information, thus bringing a series of security risks to enterprises and individuals. Therefore, a scanning tool is needed to detect whether the information submitted by the staff of the enterprise contains sensitive information of the enterprise.

[0056]The currently commonly used scanning tools, in the whole detection process, first use the scanning tool to perform fuzzy query of sensitive information keywords to determine the suspected items related to the keywords; then further screen the suspected items to obtain information related to sensitive A collection of suspicious files matching inf...

Embodiment 2

[0091] Based on the same inventive concept as that of Embodiment 1, Embodiment 2 of the present invention provides a sensitive information detection device. For the description of each word mentioned in Embodiment 2, if there is any unclear, you can refer to Embodiment 1 . like figure 2 As shown, the device 20 includes: an information acquisition unit 201, a login unit 202, and a sensitive information identification unit 203, wherein:

[0092] An information acquiring unit 201, configured to acquire a set of suspicious files, where the set of suspicious files includes at least one suspicious file;

[0093] The login unit 202 is configured to extract the login account number and login password from the file content of each suspicious file to log in the account, and when at least one account in the suspicious file logs in successfully, determine the suspicious file as the first file containing sensitive information an object file;

[0094] The sensitive information identific...

Embodiment 3

[0105] Based on the same inventive concept as that of Embodiment 1, Embodiment 3 of the present invention provides a schematic structural diagram of an electronic device of an embodiment. Please refer to image 3 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a memory. Wherein, the memory may include a memory, such as a high-speed random-access memory (Random-Access Memory, RAM), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. Of course, the electronic device may also include hardware required by other services.

[0106] The processor, the network interface and the memory can be connected to each other through an internal bus, which can be an ISA (Industry Standard Architecture, industry standard architecture) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnection standard) bus or an EISA (Extended Indust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sensitive information detection method and device and an electronic device. The method comprises the steps of obtaining a suspicious file set matched with sensitive information keywords; extracting a login account and a login password from the file content of each suspicious file for account login, and determining the suspicious file as a first target file containing sensitive information when login of at least one account in the suspicious file is successful; and based on a pre-established sensitive information identification model, identifying suspicious files exceptthe first target file in the suspicious file set to obtain a second target file containing sensitive information. According to the method provided by the invention, the suspicious file set is furtherscreened, so that the false alarm quantity caused by keyword fuzzy query is effectively reduced, the subsequent audit data volume is further reduced, and the screening efficiency is improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a sensitive information detection method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] Currently, leaks of sensitive information on the Internet are not uncommon. Some staff members with weak security awareness may submit sensitive information such as important program codes, managed accounts and passwords of the company to various platforms, thus bringing a series of threats to enterprises and individuals. security risks. Therefore, a scanning tool is needed to detect whether it contains sensitive information by scanning the information submitted by enterprise staff on the platform. [0003] The detection process of the currently commonly used scanning tools is as follows: firstly, the scanning tool performs fuzzy query of sensitive information keywords to obtain a collection of suspicious files matching the k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/951G06K9/62
Inventor 丁玲
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products