Endpoint file security check result information uploading method and device, equipment and medium

A security inspection and result information technology, applied in the security field, can solve problems such as leakage of sensitive information, and achieve the effect of reducing leakage and uploading to the management center

Pending Publication Date: 2022-08-05
HARBIN ANTIY TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the problem of sensitive information leakage in the prior art, the embodiment of the present invention provides a method, device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Endpoint file security check result information uploading method and device, equipment and medium
  • Endpoint file security check result information uploading method and device, equipment and medium
  • Endpoint file security check result information uploading method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work are protected by the present invention. scope.

[0054] As mentioned above, after the security inspection of the endpoint, the inspection results and the checked suspicious files are generally uploaded to the management center. However, there may be sensitive information in the suspicious files, and the suspicious files are directly uploaded to the management center. It will lead to the leakag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an endpoint file security check result information uploading method, apparatus and device, and a medium. The method comprises the steps of obtaining to-be-uploaded information obtained after endpoint security software performs security check on an endpoint; the information to be uploaded comprises a suspicious file and a file path of the suspicious file; acquiring an uploading strategy determined by a user based on the scene condition of the endpoint; performing desensitization processing on the to-be-uploaded information based on the uploading strategy to obtain desensitized information; and uploading the desensitization information to a management center. According to the scheme, the information to be uploaded is desensitized by using the uploading strategy, so that the desensitized information contains sensitive information as little as possible, and then the desensitized information is uploaded to the management center, so that the sensitive information uploaded to the management center can be reduced, and the leakage of the sensitive information is reduced.

Description

technical field [0001] Embodiments of the present invention relate to the field of security technologies, and in particular, to a method, device, device and medium for uploading endpoint file security check result information. Background technique [0002] Endpoint security protection software is generally installed on endpoint devices to implement functions such as virus detection, real-time monitoring, and media management and control on endpoints. The endpoint security protection software includes antivirus software, EDR, EPP, etc. and dispose of infected malicious code. [0003] Currently, endpoint security software needs to collect malicious code files and suspected malicious files on endpoint devices based on scanning and monitoring triggers, and upload these files to the management center for storage to support analysis and identification through manual, sandbox, and other security mechanisms. . In addition, in order to realize the identification of the endpoint sof...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L67/06H04L9/40H04L67/30G06F21/62
CPCH04L67/06H04L63/145H04L67/30G06F21/6254
Inventor 肖新光徐菲孙洪伟
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products