Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for constructing file derivative graph

A construction method and a technology of derived graphs, applied in the field of information security, can solve the problem of time-consuming and labor-intensive, unable to locate the equipment or employees that leak sensitive files, etc.

Active Publication Date: 2020-05-01
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing anti-leakage strategy cannot guarantee that all sensitive files will not be leaked. When sensitive files are leaked, in order to take remedial measures against the devices or employees who leaked sensitive files, such as downloading patches or warning employees, it is usually necessary to locate the leaked sensitive files first. equipment or staff
[0003] However, none of the existing anti-leakage strategies can locate the devices or employees that leaked sensitive files. Enterprises can only check all devices and employees in the enterprise one by one when sensitive files are leaked, which is time-consuming and labor-intensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for constructing file derivative graph
  • Method and device for constructing file derivative graph
  • Method and device for constructing file derivative graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Many devices in the enterprise contain private data, that is, sensitive files, such as business confidential files or employee privacy files. The enterprise does not want these sensitive files to be leaked, and at the same time, these files need to be transferred between devices within the enterprise for business operations . Therefore, enterprises have a leak-proof security requirement for these sensitive files, which can allow these sensitive files to be transferred between internal devices of the enterprise without being leaked to the outside.

[0040] In order to prevent these sensitive files from being leaked, there are many imperfect anti-leakage strategies. For example, an anti-leakage program is installed on each device of the enterprise, and the anti-leakage program records the digital summaries of all sensitive file contents. When an employee copies or sends a file on an internal enterprise device, the anti-leakage program will calculate the content digital di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for constructing a file derivative graph. The method comprises the following steps: aiming at any to-be-monitored file, executing the following graph initialization operations: creating a file node F0 corresponding to the current version of the file, determining a device node D (F0) corresponding to the current storage device of the current version, andcreating an edge between the F0 and the D (F0); after a preset file derivation operation is monitored, executing the following graph updating operations for the derivation operation: creating a file node Fn corresponding to the derived version, and determining a corresponding device node D (Fn) according to the current storage device of the derived version; and an edge between the Fn and the D (Fn) being created, an edge between the Fn-1 and the Fn being created, and the Fn-1 being a file node corresponding to the version before derivation. The file derivative graph is constructed through model construction and is used for representing the storage relationship between each file and the storage device, so that the device storing the file containing the private data can be positioned, and the device leaking the private data can be positioned.

Description

technical field [0001] The embodiments of this specification relate to the field of information security, and in particular to a method and device for constructing a file derivative graph. Background technique [0002] Many devices in the enterprise contain sensitive files, such as business confidential files or private files. Enterprises have security requirements for leak prevention for these sensitive files, which allow these sensitive files to be transferred between internal devices without being leaked to the outside. In order to keep these sensitive files from being leaked, many anti-leakage strategies exist. However, the existing anti-leakage strategy cannot guarantee that all sensitive files will not be leaked. When sensitive files are leaked, in order to take remedial measures against the devices or employees who leaked sensitive files, such as downloading patches or warning employees, it is usually necessary to locate the leaked sensitive files first. equipment or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/60G06F16/16
CPCG06F21/10G06F21/602G06F16/16
Inventor 金波
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products