CN104506545B - Leakage prevention method and device - Google Patents
Leakage prevention method and device Download PDFInfo
- Publication number
- CN104506545B CN104506545B CN201410844357.8A CN201410844357A CN104506545B CN 104506545 B CN104506545 B CN 104506545B CN 201410844357 A CN201410844357 A CN 201410844357A CN 104506545 B CN104506545 B CN 104506545B
- Authority
- CN
- China
- Prior art keywords
- data
- data content
- server
- sensitive data
- control strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 218
- 230000002265 prevention Effects 0.000 title claims abstract description 90
- 230000008569 process Effects 0.000 claims abstract description 153
- 238000011217 control strategy Methods 0.000 claims abstract description 104
- 230000005540 biological transmission Effects 0.000 claims abstract description 34
- 239000013598 vector Substances 0.000 claims description 103
- 238000007639 printing Methods 0.000 claims description 22
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 10
- 230000035945 sensitivity Effects 0.000 claims description 9
- 238000011112 process operation Methods 0.000 claims description 6
- 238000004886 process control Methods 0.000 claims description 4
- 230000001012 protector Effects 0.000 claims description 4
- 230000006399 behavior Effects 0.000 description 69
- 238000005516 engineering process Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000020509 sex determination Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 235000016936 Dendrocalamus strictus Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
- 238000003012 network analysis Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000012954 risk control Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (26)
- A kind of 1. leakage prevention device, it is characterised in that including:Data content acquiring unit, for obtaining the operation behavior of specified process, intercept and capture in terminal from the specified process Network package, the data content of required transmission is parsed from the network package, includes instant messaging inside the data Chat message, and/or, picture/document of instant messaging transmission;Judging unit, for judging whether include sensitive data in current data content;Control strategy acquiring unit, for determining that the data content includes the sensitive data in the judging unit When, obtain control strategy corresponding with the specified process;Control unit, for the network package and/or described being specified according to control strategy corresponding with the specified process The operation behavior of process is controlled.
- 2. device according to claim 1, it is characterised in that described device also includes:Receiving unit, at least one judgment rule that before judging unit, the reception server is sent;Correspondingly, the judging unit, specifically for being judged to be in current data content according at least one judgment rule It is no including sensitive data.
- 3. device according to claim 2, it is characterised in that the judgment rule is:Regular expression, or pattern With rule;Or the judgment rule is the keyword match rule that the server trains that default sensitive data obtains.
- 4. device according to claim 1, it is characterised in that control strategy acquiring unit, be specifically used forThe control strategy that the specified process is sent to server is asked;Receive server control strategy according to corresponding to the specified process that control strategy request is sent.
- 5. device according to any one of claims 1 to 4, it is characterised in that described device also includes:Transmitting element, recorded for uploading the operation behavior cached in the terminal to server so that the server according to The operation behavior record determines the path of the sensitive data transmission.
- 6. device according to claim 5, it is characterised in that described device also includes:Transmitting element, during for not including sensitive data in judging current data content in judging unit, by the data Hold and send server, so that the server determines whether include sensitive data in the data content;Receiving unit, for when the server determines that the data content includes sensitive data, receiving the service The data content that device is sent includes the information of sensitive data;Correspondingly, control strategy acquiring unit, it is additionally operable to after the receiving unit receives described information, obtains and the finger Determine control strategy corresponding to process.
- 7. device according to claim 6, it is characterised in that the judging unit, be specifically used forThe data content is sent into server, so that the server determines whether include sensitiveness number in the data content According to, andWhether receive includes the information of sensitive data in the data content that the server is sent.
- 8. device according to claim 7, it is characterised in that described control unit, be specifically used forIt is printing in the operation behavior of the specified process, and when control strategy corresponding to the process is non-print, prohibits Only current printing, and the prompt message for forbidding the specified process to carry out printing is shown in the terminal interface;OrOperated in the operation behavior of the specified process to send, and when control strategy be mess code character string sending strategy, use The field of mark mess code replaces part/full detail in the data content for needing to transmit corresponding to the specified process.
- A kind of 9. server, it is characterised in that including:Receiving unit, for data content corresponding to the operation behavior for the specified process for receiving the transmission of leakage prevention device;Judging unit, for determining whether include sensitive data in the data content according to similarity mode rule;Transmitting element, for when judging unit determines that the data content includes sensitive data, to the leaking data Protector, which sends the data content, includes the information of sensitive data, so that the leakage prevention device is receiving After the information, control strategy corresponding with the specified process is obtained, using the control strategy to the specified process Operation behavior and/or the data content are controlled.
- 10. server according to claim 9, it is characterised in that the transmitting element, be additionally operable toBefore or after the receiving unit receives the data content, at least one is sent to the leakage prevention device Individual judgment rule;And/orThe receiving unit, before or after the data content is received, receive what the leakage prevention device was sent The control strategy request for the process of specifying;The transmitting element, be additionally operable to according to the control strategy ask, to the leakage prevention device send specify into Control strategy corresponding to journey.
- 11. server according to claim 9, it is characterised in that the server also includes:Rule establishes unit, for judging whether include sensitiveness number in data content according to default sensitive data, foundation According to similarity mode rule.
- 12. according to any described server of claim 9 to 11, it is characterised in that the judging unit, be specifically used forObtain the keyword in the data content, the Feature Words in the sensitive data, the keyword is described in characterizing The notional word of data content Chinese version implication, the Feature Words are the notional word for characterizing the sensitive data Chinese version implication;The crucial term vector that the keyword corresponds to each data in the data content is established, the Feature Words correspond to the sensitivity The feature term vector of property data;Obtain the similarity of each crucial term vector and the feature term vector in the data content;According to the similarity of all crucial term vectors, it is similar to the sensitive data to obtain each data in the data content Degree;When the similarity of partial data and the sensitive data is more than predetermined threshold value in the data content, the number is determined Include sensitive data according to content.
- 13. server according to claim 12, it is characterised in that the judging unit, be specifically used forThe crucial term vector that keyword corresponds to the data content is established using word frequency TF modes, institute is established using word frequency TF modes State the feature term vector that Feature Words correspond to the sensitive data;Obtain the similarity of each crucial term vector and the feature term vector in the data content;According to the similarity of all crucial term vectors, it is similar to the sensitive data to obtain each data in the data content Degree;When the similarity of partial data and the sensitive data is more than predetermined threshold value in the data content, the number is determined Include sensitive data according to content.
- A kind of 14. leakage prevention method, it is characterised in that including:The operation behavior for the process of specifying is obtained, intercepts and captures the network package from the specified process in terminal;The data content of transmission, the data content include needed for being parsed from the network package:The chat of instant messaging Information, and/or, picture/document of instant messaging transmission;Judge whether include sensitive data in current data content;If the data content includes the sensitive data, control strategy corresponding with the specified process is obtained, The operation behavior of the network package and/or the specified process is carried out according to control strategy corresponding with the specified process Control.
- 15. according to the method for claim 14, it is characterised in that described to judge whether include sensitivity in current data content Before property data, methods described also includes:At least one judgment rule that the reception server is sent;Correspondingly, judge whether include sensitive data in current data content, including:Judge whether include sensitive data in current data content according at least one judgment rule.
- 16. according to the method for claim 15, it is characterised in that the judgment rule is:Regular expression, or pattern Matched rule;Or the judgment rule is the keyword match rule that the server trains that default sensitive data obtains.
- 17. according to the method for claim 14, it is characterised in that the acquisition is corresponding with the specified process to control plan Omit, including:The control strategy that the specified process is sent to server is asked;Receive server control strategy according to corresponding to the specified process that control strategy request is sent.
- 18. according to any described method of claim 14 to 17, it is characterised in that methods described also includes:Upload the operation behavior cached in the terminal to server to record, so that the server is remembered according to the operation behavior Record determines the path of the sensitive data transmission.
- 19. according to the method for claim 18, it is characterised in that described to judge whether include sensitivity in current data content After property data, methods described also includes:If not including sensitive data in the data content, the data content is sent into server, so that the clothes Business device determines whether include sensitive data in the data content,When the server determines that the data content includes sensitive data, the number that the server is sent is received The step of including the information of sensitive data according to content, and performing acquisition corresponding with specified process control strategy.
- 20. according to the method for claim 19, it is characterised in that described to judge whether include sensitivity in current data content Property data, including:The data content is sent into server, so that the server determines whether include sensitiveness number in the data content According to, andWhether receive includes the information of sensitive data in the data content that the server is sent.
- 21. according to the method for claim 20, it is characterised in thatIt is printing in the operation behavior of the specified process, and when control strategy corresponding to the process is non-print, institute State and the operation behavior of the network package and/or the specified process is controlled according to control strategy corresponding with specified process System, including:Forbid current printing, and the prompting letter for forbidding the specified process to carry out printing is shown in the terminal interface Breath;OrOperated in the operation behavior of the specified process to send, and when control strategy is mess code character string sending strategy, it is described The operation behavior of the network package and/or the specified process is controlled according to control strategy corresponding with specified process System, including:Part/whole letter in the data content for needing to transmit corresponding to the specified process is replaced using the field of mark mess code Breath.
- A kind of 22. leakage prevention method, it is characterised in that including:Receive data content corresponding to the operation behavior for the specified process that leakage prevention device is sent;Determine whether include sensitive data in the data content according to similarity mode rule;If it is determined that the data content includes sensitive data, then the data are sent to the leakage prevention device Content includes the information of sensitive data, so that the leakage prevention device is after receiving this information, acquisition and institute Control strategy corresponding to specified process is stated, using operation behavior of the control strategy to the specified process and/or the number It is controlled according to content.
- 23. according to the method for claim 22, it is characterised in that described to receive specifying for leakage prevention device transmission Before or after data content corresponding to the operation behavior of process, methods described also includes:At least one judgment rule is sent to the leakage prevention device;And/orThe control strategy request for the specified process that the leakage prevention device is sent is received, please according to the control strategy Ask, control strategy corresponding to the process of specifying is sent to the leakage prevention device.
- 24. according to the method for claim 23, it is characterised in that described to receive specifying for leakage prevention device transmission Before data content corresponding to the operation behavior of process, methods described also includes:According to default sensitive data, establish the similarity mode for judging whether to include in data content sensitive data and advise Then.
- 25. according to any described method of claim 22 to 24, it is characterised in that according to determining similarity mode rule Whether sensitive data is included in data content, including:Obtain the keyword in the data content, the Feature Words in the sensitive data, the keyword is described in characterizing The notional word of data content Chinese version implication, the Feature Words are the notional word for characterizing the sensitive data Chinese version implication;The crucial term vector that the keyword corresponds to each data in the data content is established, the Feature Words correspond to the sensitivity The feature term vector of property data;Obtain the similarity of each crucial term vector and the feature term vector in the data content;According to the similarity of all crucial term vectors, it is similar to the sensitive data to obtain each data in the data content Degree;If the similarity of partial data and the sensitive data is more than predetermined threshold value in the data content, it is determined that described Data content includes sensitive data.
- 26. according to the method for claim 25, it is characterised in that described to establish the keyword and correspond to the data content In each data crucial term vector, including:The crucial term vector that the keyword corresponds to each data in the data content is established using word frequency TF modes;The feature term vector that the Feature Words correspond to the sensitive data is established, including:The feature term vector that the Feature Words correspond to the sensitive data is established using word frequency TF modes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410844357.8A CN104506545B (en) | 2014-12-30 | 2014-12-30 | Leakage prevention method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410844357.8A CN104506545B (en) | 2014-12-30 | 2014-12-30 | Leakage prevention method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104506545A CN104506545A (en) | 2015-04-08 |
CN104506545B true CN104506545B (en) | 2017-12-22 |
Family
ID=52948260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410844357.8A Active CN104506545B (en) | 2014-12-30 | 2014-12-30 | Leakage prevention method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104506545B (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488428A (en) * | 2015-11-24 | 2016-04-13 | 北京华夏威科软件技术有限公司 | Operation behavior recording method and system applied to operation behavior auditing system |
CN107229873B (en) * | 2016-03-24 | 2020-07-17 | 阿里巴巴集团控股有限公司 | Picture processing method and equipment |
CN105844118B (en) * | 2016-04-15 | 2020-02-21 | 量子创新(北京)信息技术有限公司 | Method and system for data leakage protection |
CN105893859B (en) * | 2016-04-15 | 2019-05-03 | 宝利九章(北京)数据技术有限公司 | Method and system for leakage prevention |
CN105956482B (en) * | 2016-04-15 | 2019-06-04 | 宝利九章(北京)数据技术有限公司 | Method and system for leakage prevention |
CN105955978B (en) * | 2016-04-15 | 2019-07-02 | 宝利九章(北京)数据技术有限公司 | Method and system for leakage prevention |
CN106453366A (en) * | 2016-10-27 | 2017-02-22 | 北京锐安科技有限公司 | Information transmission method and system, sending terminal and receiving terminal |
CN108024005B (en) * | 2016-11-04 | 2020-08-21 | 北京搜狗科技发展有限公司 | Information processing method and device, intelligent terminal, server and system |
CN108270735A (en) * | 2016-12-31 | 2018-07-10 | ***通信集团陕西有限公司 | A kind of data leakage prevention method and equipment |
CN107391671B (en) * | 2017-07-21 | 2019-11-26 | 华中科技大学 | A kind of document leakage detection method and system |
CN108011809A (en) * | 2017-12-04 | 2018-05-08 | 北京明朝万达科技股份有限公司 | Anti-data-leakage analysis method and system based on user behavior and document content |
CN108566358B (en) * | 2017-12-22 | 2021-03-26 | 广州赛意信息科技股份有限公司 | iOS system network communication interception method and system based on iPhone mobile phone |
CN109214206A (en) * | 2018-08-01 | 2019-01-15 | 武汉普利商用机器有限公司 | cloud backup storage system and method |
CN110222170B (en) * | 2019-04-25 | 2024-05-24 | 平安科技(深圳)有限公司 | Method, device, storage medium and computer equipment for identifying sensitive data |
CN110135128A (en) * | 2019-05-22 | 2019-08-16 | 北京明朝万达科技股份有限公司 | A kind of document handling method and device |
CN110399485B (en) * | 2019-07-01 | 2022-04-08 | 上海交通大学 | Data tracing method and system based on word vector and machine learning |
CN111241565B (en) * | 2020-01-14 | 2022-10-18 | 中移(杭州)信息技术有限公司 | File control method and device, electronic equipment and storage medium |
CN111629027B (en) * | 2020-04-10 | 2023-06-23 | 云南电网有限责任公司信息中心 | Method for storing and processing trusted file based on blockchain |
CN111858094B (en) * | 2020-07-14 | 2021-05-18 | 北京海泰方圆科技股份有限公司 | Data copying and pasting method and system and electronic equipment |
CN112613031A (en) * | 2020-11-26 | 2021-04-06 | 新华三技术有限公司 | Data stream detection method and device |
CN112839077A (en) * | 2020-12-29 | 2021-05-25 | 北京安华金和科技有限公司 | Sensitive data determination method and device |
CN113342288B (en) * | 2021-06-29 | 2024-03-22 | 北京天空卫士网络安全技术有限公司 | Data protection method, client, server and system |
CN113342449A (en) * | 2021-06-29 | 2021-09-03 | 北京天空卫士网络安全技术有限公司 | Data protection method and device |
CN113449350A (en) * | 2021-06-30 | 2021-09-28 | 中国工商银行股份有限公司 | Management method, device, equipment and medium for USB outgoing sensitive information |
CN117290659B (en) * | 2023-11-24 | 2024-04-02 | 华信咨询设计研究院有限公司 | Data tracing method based on regression analysis |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827102A (en) * | 2010-04-20 | 2010-09-08 | 中国人民解放军理工大学指挥自动化学院 | Data prevention method based on content filtering |
CN101984603A (en) * | 2010-11-11 | 2011-03-09 | 湖北电力信息通信中心 | Power sensitive information detection method based on e-mail interception |
CN102624699A (en) * | 2012-01-19 | 2012-08-01 | 歌尔声学股份有限公司 | Method and system for protecting data |
CN103209174A (en) * | 2013-03-12 | 2013-07-17 | 华为技术有限公司 | Data protection method, device and system |
CN103327183A (en) * | 2013-06-13 | 2013-09-25 | 中国科学院信息工程研究所 | Black box protecting method and system for private data of Android user based on tag |
CN103916233A (en) * | 2014-03-28 | 2014-07-09 | 小米科技有限责任公司 | Information encryption method and device |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050172234A1 (en) * | 2004-02-03 | 2005-08-04 | Chuchla Jonathan E. | Video display system |
CN101098224B (en) * | 2006-06-28 | 2010-08-25 | 中色科技股份有限公司 | Method for encrypting/deciphering dynamically data file |
US8446607B2 (en) * | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
CN101520833B (en) * | 2009-04-10 | 2010-12-01 | 武汉大学 | Anti-data-leakage system and method based on virtual machine |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | ***通信集团河北有限公司 | Safety monitoring method and system |
CN102143158B (en) * | 2011-01-13 | 2013-10-09 | 北京邮电大学 | Data anti-leakage method based on trusted platform module (TPM) |
US8800031B2 (en) * | 2011-02-03 | 2014-08-05 | International Business Machines Corporation | Controlling access to sensitive data based on changes in information classification |
CN103336927A (en) * | 2013-06-07 | 2013-10-02 | 杭州世平信息科技有限公司 | Data classification based data leakage prevention method and system |
-
2014
- 2014-12-30 CN CN201410844357.8A patent/CN104506545B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827102A (en) * | 2010-04-20 | 2010-09-08 | 中国人民解放军理工大学指挥自动化学院 | Data prevention method based on content filtering |
CN101984603A (en) * | 2010-11-11 | 2011-03-09 | 湖北电力信息通信中心 | Power sensitive information detection method based on e-mail interception |
CN102624699A (en) * | 2012-01-19 | 2012-08-01 | 歌尔声学股份有限公司 | Method and system for protecting data |
CN103209174A (en) * | 2013-03-12 | 2013-07-17 | 华为技术有限公司 | Data protection method, device and system |
CN103327183A (en) * | 2013-06-13 | 2013-09-25 | 中国科学院信息工程研究所 | Black box protecting method and system for private data of Android user based on tag |
CN103916233A (en) * | 2014-03-28 | 2014-07-09 | 小米科技有限责任公司 | Information encryption method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104506545A (en) | 2015-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104506545B (en) | Leakage prevention method and device | |
US20200285741A1 (en) | Endpoint Detection and Response Utilizing Machine Learning | |
Joo et al. | S-Detector: an enhanced security model for detecting Smishing attack for mobile computing | |
EP3756124B1 (en) | Data-defined architecture for network data management | |
US10079854B1 (en) | Client-side protective script to mitigate server loading | |
US8787567B2 (en) | System and method for decrypting files | |
US9219752B2 (en) | Data leak prevention systems and methods | |
US8688601B2 (en) | Systems and methods for generating machine learning-based classifiers for detecting specific categories of sensitive information | |
US9652597B2 (en) | Systems and methods for detecting information leakage by an organizational insider | |
US8612594B1 (en) | Systems and methods for preventing data loss from files sent from endpoints | |
GB2555192A (en) | Methods and apparatus for detecting and identifying malware by mapping feature data into a semantic space | |
US20130312092A1 (en) | System and method for forensic cyber adversary profiling, attribution and attack identification | |
US11381587B2 (en) | Data segmentation | |
WO2018076697A1 (en) | Method and apparatus for detecting zombie feature | |
EP3987728A1 (en) | Dynamically controlling access to linked content in electronic communications | |
CN111182060A (en) | Message detection method and device | |
US9245132B1 (en) | Systems and methods for data loss prevention | |
Moh et al. | Efficient semantic search over encrypted data in cloud computing | |
Cable et al. | Stratosphere: Finding vulnerable cloud storage buckets | |
US9253214B1 (en) | Systems and methods for optimizing data loss prevention systems | |
Chapman | {SAD}{THUG}: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics | |
Alhindi et al. | Preventing Data Loss by Harnessing Semantic Similarity and Relevance. | |
Shu et al. | Rapid screening of big data against inadvertent leaks | |
Prabhu et al. | Malicious Firmware Injection Detection on Wireless Networks Using Deep Learning TF-IDF Normalization (MFI-IDF) | |
de Sousa | XS-Leaks Crutch: Assisted Detection & Exploitation of Cross-Site Leaks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170117 Address after: 100015 Chaoyang District Road, Jiuxianqiao, No. 10, building No. 3, floor 15, floor 17, 1701-26, Applicant after: BEIJING QIANXIN TECHNOLOGY Co.,Ltd. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Applicant before: Qizhi software (Beijing) Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Patentee after: QAX Technology Group Inc. Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing. Patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201225 Address after: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing Patentee after: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc. Patentee after: QAX Technology Group Inc. Address before: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Patentee before: QAX Technology Group Inc. |
|
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing Patentee after: Qianxin Wangshen information technology (Beijing) Co.,Ltd. Patentee after: QAX Technology Group Inc. Address before: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing Patentee before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc. Patentee before: QAX Technology Group Inc. |