A js sensitive information leakage detection method, device, equipment and medium

A sensitive information, leak detection technology, applied in the direction of using information identifiers to retrieve web data, computer security devices, network data retrieval, etc., can solve problems such as low detection efficiency

Active Publication Date: 2022-07-12
福建有度网络安全技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the deficiencies of the prior art, the present invention provides a JS sensitive information leakage detection method, device, equipment and medium, which has the advantages of fast detection speed and solves the problem of low detection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A js sensitive information leakage detection method, device, equipment and medium
  • A js sensitive information leakage detection method, device, equipment and medium
  • A js sensitive information leakage detection method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0035] like figure 1 As shown, a JS sensitive information leak detection method includes the following steps:

[0036] 1) Obtain the URL of the website to be detected;

[0037] During specific implementation, URLs are obtained in batches.

[0038] 2) Search the URL by focusing on the web crawler, focus on the JS file, and grab the JS file;

[0039] In the specific implementation, by focusing on the web crawler to search the URL, and selectively crawling those...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of JS sensitive information, and discloses a method, device, equipment and medium for detecting leakage of JS sensitive information, comprising the following steps: 1) obtaining the URL of the website to be detected; JS files, grab the JS files; 3) Use incremental crawler technology to extract sensitive information sources, establish a data dictionary according to the existing sensitive information source standards, and exclude inspection-free information. The advantage of the present invention is that, by extracting keywords .html, .do and .action in the source code of the JS file, and scanning these key words that mainly contain sensitive information, some words unrelated to sensitive information can be bypassed, thereby improving detection Speed, reduce the occupation of resources, and for .html, .do and .action keywords without sensitive information, import the corresponding JS file and other source codes into the data dictionary for secondary scanning, improve the leakage of sensitive information The overall accuracy of the detection, while improving the detection efficiency.

Description

technical field [0001] The invention relates to the technical field of JS sensitive information, in particular to a method, device, equipment and medium for detecting leakage of JS sensitive information. Background technique [0002] As a fairly simple but powerful client-side scripting language, JavaScript is essentially an interpreted language. Therefore, its implementation principle is to explain and run. The above characteristics determine that JavaScript is different from some server scripting languages ​​(such as ASP, PHP) and compiled languages ​​(such as C, C++), and its source code can be easily obtained by anyone. Some careless developers store all kinds of sensitive information in JavaScript scripts. Due to the characteristics of JS, attackers can see this information at a glance, resulting in varying degrees of threat to WEB services and user privacy. [0003] The current detection methods still have the following problems: [0004] The current detection metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/951G06F16/955G06F21/55G06K9/62
CPCG06F16/951G06F16/955G06F21/554G06F18/28
Inventor 陈超张梦林
Owner 福建有度网络安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products