Code file privacy protection method, evaluation method and device, and electronic equipment
A code file, privacy protection technology, applied in the field of information security, can solve problems such as the hidden danger of sensitive information leakage, and achieve the effect of solving sensitive information leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.
[0051] As mentioned earlier, the codes released by enterprises are often the source of leakage of sensitive information due to lack of attention to privacy and security, leaving huge hidden dangers for enterprises. To this end, this document aims to propose an assessment scheme for sensitive information leaks of code files and a privacy protection scheme for im...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


