Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of sensitive information leakage detection method and device

A sensitive information and leakage detection technology, applied in the field of sensitive information leakage detection, can solve the problems of inability to maintain data security in time, low flexibility, and inability to give accurate alarm prompts, etc.

Active Publication Date: 2022-03-18
北京微步在线科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in practice, it is found that due to the simple keyword matching mechanism and language differences, the detection accuracy is low, the flexibility is low, and it is impossible to track and analyze sensitive information leakage.
At the same time, for comparison file 1, when detecting whether sensitive data is leaked through the fingerprint feature matching method, the leakage path of the sensitive data cannot be tracked and analyzed, and an accurate warning prompt cannot be given; for comparison file 2, only abnormal access initiation of sensitive information can be determined. Programs and abnormal access receiving programs, which can only determine the origin of abnormal access, and cannot track and analyze the leakage path of sensitive information, so that data security cannot be maintained in a timely manner
It can be seen that the existing technology has low flexibility and accuracy, and cannot track and analyze sensitive information leakage paths, so it cannot maintain data security in a timely manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of sensitive information leakage detection method and device
  • A kind of sensitive information leakage detection method and device
  • A kind of sensitive information leakage detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Please see figure 1 , figure 1 A schematic flowchart of a sensitive information leakage detection method is provided for the embodiment of the present application. Among them, the sensitive information leakage detection method includes:

[0054] S101. Intercept all response data by monitoring the network traffic egress of the target organization.

[0055] In this embodiment of the present application, the subject of execution of the method may be a sensitive information leakage detection device. Specifically, the sensitive information leakage detection device may be a computer, a server, or other equipment, or a software device running on the above-mentioned client, for There is no limitation in this embodiment.

[0056] In the embodiment of this application, all the intercepted response data is the response data returned by the server to all clients in the target organization. Specifically, the target organization may be a company, an enterprise, a school, etc., wh...

Embodiment 2

[0120] Please see figure 2 , figure 2 It is a schematic structural diagram of a sensitive information leakage detection device provided in an embodiment of the present application. Such as figure 2 As shown, the sensitive information leakage detection device includes:

[0121] The interception unit 210 is configured to intercept all response data by monitoring the network traffic outlet of the target organization;

[0122] The first judging unit 220 is used to judge whether all the response data match the preset feature database;

[0123] An extraction unit 230, configured to extract sensitive information and access information associated with the sensitive information from the response data when it is judged that all the response data match the feature database;

[0124] The second judging unit 240 is used to judge whether the access situation information matches the preset cloud intelligence library;

[0125] The path acquisition unit 250 is used to acquire the leaka...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present application provide a sensitive information leakage detection method and device, which relate to the field of data security technology. The sensitive information leakage detection method includes: intercepting all response data by monitoring the network traffic outlet of the target organization; Whether it matches the set feature database; if yes, extract sensitive information and access information associated with the sensitive information from the response data; then judge whether the access information matches the preset cloud intelligence library; if yes, then Obtain the leakage path of sensitive information, and output an alarm message including the leakage path to indicate that sensitive information has been maliciously accessed, and can quickly and accurately detect sensitive information leakage, with high flexibility and comprehensive coverage, and can monitor the entire traffic exit of the target organization At the same time, it can also conduct path tracking analysis on the leakage of sensitive information to maintain data security in a timely manner.

Description

technical field [0001] The present application relates to the technical field of data security, in particular, to a sensitive information leakage detection method and device. Background technique [0002] With the development of Internet technology, accessing and storing user information on the Internet has become a common way. When a user browses the web, the client and the server make requests and receive the returned content from the server. Due to improper handling, sensitive information involving user privacy or that needs to be kept secret is easily leaked. In the existing sensitive information leakage detection method, usually after the client initiates a request, the server returns the data, and the back-end module judges whether there is sensitive information in the return according to the keyword matching. alarm. [0003] For sensitive information leakage detection methods, there are other methods, such as Comparative Document 1: CN201710452471.X A data leakage d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F16/2455
CPCH04L63/1416H04L63/1441G06F16/24564
Inventor 王卫新赵林林童兆丰薛锋
Owner 北京微步在线科技有限公司