Unlock instant, AI-driven research and patent intelligence for your innovation.
A kind of sensitive information leakage detection method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A sensitive information and leakage detection technology, applied in the field of sensitive information leakage detection, can solve the problems of inability to maintain data security in time, low flexibility, and inability to give accurate alarm prompts, etc.
Active Publication Date: 2022-03-18
北京微步在线科技有限公司
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] However, in practice, it is found that due to the simple keyword matching mechanism and language differences, the detection accuracy is low, the flexibility is low, and it is impossible to track and analyze sensitive information leakage.
At the same time, for comparison file 1, when detecting whether sensitive data is leaked through the fingerprint feature matching method, the leakage path of the sensitive data cannot be tracked and analyzed, and an accurate warning prompt cannot be given; for comparison file 2, only abnormal access initiation of sensitive information can be determined. Programs and abnormal access receiving programs, which can only determine the origin of abnormal access, and cannot track and analyze the leakage path of sensitive information, so that data security cannot be maintained in a timely manner
It can be seen that the existing technology has low flexibility and accuracy, and cannot track and analyze sensitive information leakage paths, so it cannot maintain data security in a timely manner
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0053] Please see figure 1 , figure 1 A schematic flowchart of a sensitive information leakage detection method is provided for the embodiment of the present application. Among them, the sensitive information leakage detection method includes:
[0054] S101. Intercept all response data by monitoring the network traffic egress of the target organization.
[0055] In this embodiment of the present application, the subject of execution of the method may be a sensitive information leakage detection device. Specifically, the sensitive information leakage detection device may be a computer, a server, or other equipment, or a software device running on the above-mentioned client, for There is no limitation in this embodiment.
[0056] In the embodiment of this application, all the intercepted response data is the response data returned by the server to all clients in the target organization. Specifically, the target organization may be a company, an enterprise, a school, etc., wh...
Embodiment 2
[0120] Please see figure 2 , figure 2 It is a schematic structural diagram of a sensitive information leakage detection device provided in an embodiment of the present application. Such as figure 2 As shown, the sensitive information leakage detection device includes:
[0121] The interception unit 210 is configured to intercept all response data by monitoring the network traffic outlet of the target organization;
[0122] The first judging unit 220 is used to judge whether all the response data match the preset feature database;
[0123] An extraction unit 230, configured to extract sensitive information and access information associated with the sensitive information from the response data when it is judged that all the response data match the feature database;
[0124] The second judging unit 240 is used to judge whether the access situation information matches the preset cloud intelligence library;
[0125] The path acquisition unit 250 is used to acquire the leaka...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The embodiments of the present application provide a sensitive information leakage detection method and device, which relate to the field of data security technology. The sensitive information leakage detection method includes: intercepting all response data by monitoring the network traffic outlet of the target organization; Whether it matches the set feature database; if yes, extract sensitive information and access information associated with the sensitive information from the response data; then judge whether the access information matches the preset cloud intelligence library; if yes, then Obtain the leakage path of sensitive information, and output an alarm message including the leakage path to indicate that sensitive information has been maliciously accessed, and can quickly and accurately detect sensitive information leakage, with high flexibility and comprehensive coverage, and can monitor the entire traffic exit of the target organization At the same time, it can also conduct path tracking analysis on the leakage of sensitive information to maintain data security in a timely manner.
Description
technical field [0001] The present application relates to the technical field of data security, in particular, to a sensitive information leakage detection method and device. Background technique [0002] With the development of Internet technology, accessing and storing user information on the Internet has become a common way. When a user browses the web, the client and the server make requests and receive the returned content from the server. Due to improper handling, sensitive information involving user privacy or that needs to be kept secret is easily leaked. In the existing sensitive information leakage detection method, usually after the client initiates a request, the server returns the data, and the back-end module judges whether there is sensitive information in the return according to the keyword matching. alarm. [0003] For sensitive information leakage detection methods, there are other methods, such as Comparative Document 1: CN201710452471.X A data leakage d...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.