Supercharge Your Innovation With Domain-Expert AI Agents!

Sensitive information illegal copy identification method, apparatus and device, and storage medium

A technology for illegally copying and sensitive information, applied in the field of information security, can solve the problems of corporate sensitive information leakage, internal data leakage, and difficulty in preventing employees from copying corporate internal data to private storage space in a timely manner

Pending Publication Date: 2019-05-28
SF TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it also poses a great challenge to the information security of enterprises, and leaks of sensitive information of enterprises occur from time to time
For example, it is common in enterprises to have internal data leakage incidents caused by employees intentionally or unintentionally copying enterprise files
At present, due to the inability to obtain the internal information of the copied files and the purpose of the copy, it is difficult to prevent employees from copying the internal data of the enterprise to the private storage space in a timely manner from a single file name, and there is no relatively complete detection technology for sensitive information being illegally copied and leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information illegal copy identification method, apparatus and device, and storage medium
  • Sensitive information illegal copy identification method, apparatus and device, and storage medium
  • Sensitive information illegal copy identification method, apparatus and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0029] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0030] Such as figure 1 As shown, the embodiment of the present invention provides an identification method for illegal copying of sensitive information, including the following steps:

[0031] S1: Obtain the file copy information of the employee to be investigated, where the file copy informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive information illegal copy identification method and device, equipment and a storage medium, and the method comprises the steps: obtaining the file copy information of a to-be-investigated employee, and enabling the file copy information to comprise a file name; based on a dictionary library of sensitive information classification, feature words corresponding to work categories not belonging to employees in the file names are extracted, and the dictionary library comprises a plurality of work categories and a plurality of feature words corresponding to the work categories; And at least carrying out logistic regression training on the extracted feature words, and determining whether illegal copying is carried out according to a training result. According tothe scheme, the feature words, not belonging to the work category, in the files copied by the employees are extracted through the dictionary library, the feature words are subjected to logistic regression training, and whether illegal copying is carried out or not is determined according to the training result. And when it is determined that the illegal copy exists, human intervention and investigation can be carried out to prevent the illegally copied employee from leaking the copied sensitive information.

Description

technical field [0001] The present invention generally relates to the field of information security, and in particular relates to an identification method, device, equipment and storage medium for illegal copying of sensitive information. Background technique [0002] With the development of network technology and storage technology, the duplication, storage and transmission of data and files have brought great convenience. However, it also poses a great challenge to the information security of enterprises, and leaks of sensitive information of enterprises occur from time to time. For example, internal data leakage incidents caused by employees' intentional or unintentional copying of corporate files are common in enterprises. At present, due to the inability to obtain the internal information of the copied files and the purpose of the copy, it is difficult to prevent employees from copying the internal data of the enterprise to the private storage space in a timely manner ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F17/27G06F16/35
Inventor 郑明胡泽柱
Owner SF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More