Sensitive information detection method and device, equipment and storage medium

A technology of sensitive information and detection methods, applied in the field of computer and information security, can solve the problems of uneven developer level, attacking smart speakers, etc., to improve the efficiency of security assessment and reduce the rate of false positives and false negatives.

Pending Publication Date: 2020-12-15
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the uneven level of developers, third-party applications often have se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information detection method and device, equipment and storage medium
  • Sensitive information detection method and device, equipment and storage medium
  • Sensitive information detection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0018] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0019] figure 1 A flow 100 of an embodiment of the sensitive information d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a sensitive information detection method and device, equipment and a storage medium, and relates to the technical field of information security. One specificembodiment of the method comprises the following steps: directionally capturing a data packet of a to-be-detected third-party application installed in a screen-equipped intelligent sound box; automatically detecting the sensitive information in the data packet of the to-be-detected third-party application, and outputting a detection report. According to the embodiment, the security evaluation efficiency for the screen-equipped intelligent sound box to transmit the plaintext sensitive information by an introduced third-party application is effectively improved, human intervention is hardly needed, a tester does not need to have professional skills and knowledge, and the false alarm rate and the missing report rate can be fully reduced.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, specifically to the field of information security technology, and in particular to a sensitive information detection method, device, device, and storage medium. Background technique [0002] At present, smart speakers with screens are developing rapidly, and gradually become the central control of smart homes and personal assistants for users. Their security and privacy have attracted much attention from users. In order to enrich the user experience, a large number of pre-installed third-party applications are often introduced. However, due to the uneven level of developers, third-party applications often have security vulnerabilities and become the entrance for attackers to attack smart speakers. Among them, the most common and highly harmful is the transmission of sensitive information in clear text. The third-party application does not encrypt the sensitive infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/552G06F21/577G06F2221/033
Inventor 曲乐炜
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products