CN105337988A - Method and system for preventing sensitive information from leakage - Google Patents

Method and system for preventing sensitive information from leakage Download PDF

Info

Publication number
CN105337988A
CN105337988A CN201510812412.XA CN201510812412A CN105337988A CN 105337988 A CN105337988 A CN 105337988A CN 201510812412 A CN201510812412 A CN 201510812412A CN 105337988 A CN105337988 A CN 105337988A
Authority
CN
China
Prior art keywords
sensitive information
daily record
mentioned
application program
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510812412.XA
Other languages
Chinese (zh)
Inventor
刘奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510812412.XA priority Critical patent/CN105337988A/en
Publication of CN105337988A publication Critical patent/CN105337988A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention relates to a method for preventing sensitive information from leakage. The method comprises the following steps: before operating an application program at a client, enabling a client user to activate a log tool of the application program; after the client activates the log tool of the application program, determining whether a log confusion function of the log tool is started or not by the client; if determining that the log confusion function is started, when operating the application program, confusing original sensitive information in a generated log when the log confusion function generates the log; matching the confused log information with the original sensitive information in the log and storing the original sensitive information to a local dictionary; when the client user determines that the application program has faults according to the confused log information, finding out the original sensitive information from the local dictionary; and debugging the application program according to the original sensitive information. The invention further provides a system for preventing the sensitive information from leakage.

Description

A kind of method and system preventing sensitive information leakage
Technical field
The present invention relates to information security field, be specifically related to a kind of method and system preventing sensitive information leakage.
Background technology
Along with the development of technology, various application becomes and became increasingly complex than in the past.As a rule, under the system environments of a lot of company, run a more than application program, these application programs all operate in the system of company.If any application makes a mistake, then daily record or record is all needed to debug and profiling error.Such as, but have a lot of responsive and/or security information in the application program under Corporation system environment, the username and password of login system, the IP address of connection and port information etc., be all recorded in daily record.If log information is exposed to other people, bring huge risk just will to the IT system of company.Hackers (hackers) also can utilize these information to attack the system of company.Therefore, for the IT system of most of company, how to protect the log information generated to be a large problem.In addition, a lot of company, all from third part purchase software, if therefore run into any problem in use procedure, all needs to contact to software provider and all necessary daily record/records relevant with problem is supplied to third party.If but in daily record, comprised any sensitive information, this also will increase the risk of information leakage.
At present, the solution that most of company adopts signs an agreement with third company to guarantee that third party only uses these daily record/records to carry out the determination of problem.But this is only the regulation of agreement.If run into daily record reveal problem, then require a great deal of time and energy search and be confirmed whether it is that third party has revealed log information.
Also the software that some software vendor are for they is had to provide daily record to encrypt.Adopt in this way, all journal files are all encrypted and it must be decrypted before use.This method is equally also inconvenient, because be that the daily record of encryption or the method for deciphering daily record all need to share with third party.And in daily record, all sensitive informations equally also can be exposed after deciphering.
The scheme adopting the mode of anonymization to solve daily record exposure is also there is in prior art.In this scenario, daily record generates according to common mode, and after daily record generates, these journal files are sent in a server and carry out anonymization.Adopt this scheme, still likely by daily record, sensitive information is exposed to other people, reason is, generates the method for daily record or common mode and is need daily record to be stored into some positions.The mode of anonymization is exactly similar " searches and substitute " simultaneously, although user oneself can define the rule of " search and substitute ".If but the form of daily record changes along with the change of version, define different rules and just bring very large inconvenience.In addition, user must very understand the daily record generated to adopt the program to require, can be like this just the rule that log definition is suitable.Because most of user not to understand substantially for the format and content of daily record and in most cases journal file is very huge, therefore this mode is infeasible substantially.Like this, after anonymization, still a lot of sensitive information can be there is in journal file.
Therefore how to prevent daily record reveal sensitive information from then becoming problem demanding prompt solution.
Summary of the invention
In view of the above problems, the invention provides a kind of method and system preventing sensitive information leakage, thus solve above-mentioned needs the Log Sender comprising sensitive information is increased the problem of daily record disclosure risk to third party.
The invention provides a kind of method preventing sensitive information leakage, the method comprises the steps:
Before client runs application, activated the logging tools of this application program by client user;
Activate the logging tools of described application program in client after, determine whether that function is obscured in the daily record starting described logging tools by client user;
If determine that starting above-mentioned daily record obscures function, when operationally stating application program, above-mentioned daily record is obscured function and is obscured by the original sensitive information in the daily record of generation when generating daily record;
By above-mentioned obscure after log information and original sensitive information in above-mentioned daily record match and original sensitive information be stored in local dictionary;
When client user according to above-mentioned obscure after log information determine above-mentioned application program exist mistake time, from the original sensitive information of local dictionary lookup;
Above-mentioned application program is debugged according to original sensitive information.
Alternatively, described local dictionary is the list structure of unidirectional coupling, and described unidirectional coupling refers to that user only can search the original sensitive information of above-mentioned daily record by the log information after obscuring.
Alternatively, described local dictionaries store is in above-mentioned client.
Alternatively, above-mentioned obscure after log information identical with the form of the original sensitive information in above-mentioned daily record.
Alternatively, it is one or more that the original sensitive information in described daily record comprises in user name, password, ip address, link address.
Alternatively, described daily record is obscured function and is realized by one or more Obfuscating Algorithms.
Alternatively, described Obfuscating Algorithms obscures based on the random number of user's input.
Alternatively, different random numbers can produce different obscure after log information.
Alternatively, described Obfuscating Algorithms makes the original sensitive information in all log informations of described application program obscure self-consistentency.
The invention allows for a kind of system preventing sensitive information leakage, this system comprises:
Active module, for before client runs application, is activated the logging tools of this application program by client user;
Start module, for activate described application program in client logging tools after, determine whether that function is obscured in the daily record starting described logging tools by client user;
Obscure module, for when determining that starting above-mentioned daily record obscures function, when above-mentioned application program is run, above-mentioned daily record is obscured function and is obscured by the original sensitive information in the daily record of generation when generating daily record;
Matching module, for by above-mentioned obscure after log information and original sensitive information in above-mentioned daily record match and original sensitive information be stored in local dictionary;
Search module, for when client user according to above-mentioned obscure after log information determine above-mentioned application program exist mistake time, from the original sensitive information of local dictionary lookup;
Debugging module, for debugging above-mentioned application program according to original sensitive information.
Beneficial effect of the present invention:
The present invention be different from of the prior art daily record generate after the mode such as anonymity or encryption is carried out to daily record, but selected voluntarily whether to obscure daily record by user during daily record generation, thus neither require that user understands the structure of daily record and content, it also avoid and sensitive information transfer is prevented the leakage of sensitive information to third party, adopt above-mentioned Obfuscating Algorithms, even if log information is passed to third party, the basis of the log information of third party after obscuring carries out debugging/testing, due to the sensitive information form after obscuring with obscure before sensitive information form identical, therefore, do not affect third party debugging and can not reveal sensitive information.
Accompanying drawing explanation
Fig. 1 shows the flow chart preventing the method for information leakage of the present invention;
Fig. 2 shows the structural representation preventing the system of information leakage of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in more detail.But those skilled in the art know, the present invention is not limited to accompanying drawing and following examples.
Fig. 1 is the flow chart carrying out the method that daily record is obscured according to the embodiment of the present invention.
Step 101, before client terminal runs application, is activated the logging tools of this application program by terminal use.
In this step, the application program of installing on the client comprises Application Program Interface, when user needs to run certain application program, this application program is selected also to show the Application Program Interface of this application program on a terminal screen, Application Program Interface is provided with the button of logging tools alternatively, user clicks this button, starting log instrument.
By terminal use, step 102, after activating the logging tools of described application program, determines whether that function is obscured in the daily record starting described logging tools in client.
In this step, after step 101 starting log instrument, described Application Program Interface continues show log and obscures function, alternatively, can be the button on interface, and user selects whether activate this daily record and obscures function.If function is obscured in non-selected daily record, then this application program carrys out log according to not obscuring the mode generating daily record in sensitive information and prior art.
Step 103, if determine that starting above-mentioned daily record obscures function, when operationally stating application program, above-mentioned daily record is obscured function and is obscured by the sensitive information in the daily record of generation when generating daily record.
In this step, if user selects Activation Log to obscure function in a step 102, when then operationally stating application program, this daily record is obscured function and is obscured by the sensitive information in the daily record generated when running this application program, wherein, sensitive information can be, but not limited to comprise the user name that user logs in this application program, password, the ip address of user etc. sensitive information, when wherein the sensitive information in daily record being obscured, be different from encryption technology of the prior art and sensitive information can be become insignificant character string, make to be no matter that third party or hacker are when obtaining such character string, can be appreciated that such information is encrypted information, thus can consider how it to be decrypted and to increase the risk of sensitive information leakage, in the present invention, sensitive information is obscured to the form not changing sensitive information, i.e. user name, the information of the string formats such as password is still the form of character string after obscuring, ip address after obscuring is still ip address format, like this, can not reveal sensitive information even hacker intercepts and captures such information.Simultaneously, above-mentioned obscure function can according to user input random number obscure, alternatively, when function is obscured in user's activation, Application Program Interface display reminding frame prompting user can input random number as the seed obscured, the random number of different application inputs can be the same or different, random number according to input is obscured sensitive information, such as, in user name or password, numeral or letter carry out moving to left or moving to right according to the random number of input, upper and lower case letter exchanges according to the numeral of input, ip address carries out being shifted or adding and subtracting according to the numeral of input, carry out obscuring ip address in the scope that guarantee is still ip address, certainly the mode obscured is not limited to example above.
Step 104, by above-mentioned obscure after log information and original sensitive information in above-mentioned daily record match and be stored in local dictionary.
Step 105, state the log information after obscuring determine above-mentioned application program exist mistake time, according to the sensitive information of local dictionary lookup original log.
In above-mentioned steps, when user wishes to improve according to the result application programs of third-party testing or debugging, need to carry out association store to the log information after obscuring and original sensitive information, corresponding relation is stored in local dictionary, alternatively, user only finds original sensitive information by the log information after obscuring, and can not reverse find, alternatively, local dictionary can be the form stored in the local database.Like this, when such as described third party is relevant to user sensitive information according to institute's produced problem of the daily record determination application program after obscuring, now user needs the content determining real sensitive information, at this moment just needs to inquire about above-mentioned local dictionary.
Step 106, debugs above-mentioned application program according to the sensitive information of original log.
In this step, after user determines original sensitive information according to the lookup result in step 105, the test result that namely can return according to such as third party adjusts corresponding information, and then application program is normally run.
In order to technical scheme of the present invention is clearly described, below exemplary description is carried out to the present invention.
User is when certain application program of client terminal start-up, start corresponding application tool and logging tools log.record, then this application interface can continue to occur whether starting the prompting obscuring function, if user selects "No", then carry out log according to common mode, as log.record (" Connectionhasbeenmadeto "+IPaddress), " IPaddress (ip address) " wherein then for connect ip address and do not obscure through any, such as initial ip address is 10.90.252.11, if user selects "Yes", then starting log obscures application, i.e. Log.obfuscated_record (" Connectionhasbeenmadeto%%IPaddress%% ", IPaddress, Passphrase), above-mentionedly application is obscured by enabling, the IP address that user connects then is confused with a new IP address, wherein parameter " passphrase " is then inputted from terminal by user, the blending parameter that different application inputs can be the same or different, after user inputs blending parameter, the ip address information such as, recorded in daily record is then 163.76.82.209, as can be seen here, although above-mentioned ip address is still the form of ip address, but they are completely different from initial ip address, when third party debugs according to above-mentioned daily record, then can not produce the risk of sensitive information leakage, do not need to be decrypted third party simultaneously, and then also can not affect and debug accordingly according to daily record.
Fig. 2 shows the illustrated structural representation carrying out the system that daily record is obscured, and this system comprises:
Active module 201, for before client terminal runs application, is activated the logging tools of this application program by terminal use;
Start module 202, for activate described application program in client logging tools after, determine whether that function is obscured in the daily record starting described logging tools by terminal use;
Obscure module 203, if for determining that starting above-mentioned daily record obscures function, when operationally stating application program, above-mentioned daily record is obscured function and is obscured by the sensitive information in the daily record of generation when generating daily record;
Matching module 204, for by above-mentioned obscure after log information and original sensitive information in above-mentioned daily record match and be stored in local dictionary;
Search module 205, for when user according to above-mentioned obscure after log information determine above-mentioned application program exist mistake time, according to the sensitive information of local dictionary lookup original log;
Debugging module 206, for adjusting above-mentioned application program according to the sensitive information of original log.
Above, embodiments of the present invention are illustrated.But the present invention is not limited to above-mentioned execution mode.Within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. prevent a method for sensitive information leakage, it is characterized in that, the method comprises the steps:
Before client runs application, activated the logging tools of this application program by client user;
Activate the logging tools of described application program in client after, determine whether that function is obscured in the daily record starting described logging tools by client user;
If determine that starting above-mentioned daily record obscures function, when operationally stating application program, above-mentioned daily record is obscured function and is obscured by the original sensitive information in the daily record of generation when generating daily record;
By above-mentioned obscure after log information and original sensitive information in above-mentioned daily record match and original sensitive information be stored in local dictionary;
When client user according to above-mentioned obscure after log information determine above-mentioned application program exist mistake time, from the original sensitive information of local dictionary lookup;
Above-mentioned application program is debugged according to original sensitive information.
2. method according to claim 1, is characterized in that, described local dictionary is the list structure of unidirectional coupling, and described unidirectional coupling refers to that user only can search the original sensitive information of above-mentioned daily record by the log information after obscuring.
3. method according to claim 1, is characterized in that, described local dictionaries store is in above-mentioned client.
4. method according to claim 1, is characterized in that, above-mentioned obscure after log information identical with the form of the original sensitive information in above-mentioned daily record.
5. method according to claim 1, is characterized in that, it is one or more that the original sensitive information in described daily record comprises in user name, password, ip address, link address.
6. method according to claim 1, is characterized in that, described daily record is obscured function and realized by one or more Obfuscating Algorithms.
7. method according to claim 6, is characterized in that, described Obfuscating Algorithms obscures based on the random number of user's input.
8. method according to claim 7, is characterized in that, different random numbers can produce different obscure after log information.
9. method according to claim 6, is characterized in that, described Obfuscating Algorithms makes the original sensitive information in all log informations of described application program obscure self-consistentency.
10. prevent a system for sensitive information leakage, it is characterized in that, this system comprises:
Active module, for before client runs application, is activated the logging tools of this application program by client user;
Start module, for activate described application program in client logging tools after, determine whether that function is obscured in the daily record starting described logging tools by client user;
Obscure module, for when determining that starting above-mentioned daily record obscures function, when above-mentioned application program is run, above-mentioned daily record is obscured function and is obscured by the original sensitive information in the daily record of generation when generating daily record;
Matching module, for by above-mentioned obscure after log information and original sensitive information in above-mentioned daily record match and original sensitive information be stored in local dictionary;
Search module, for when client user according to above-mentioned obscure after log information determine above-mentioned application program exist mistake time, from the original sensitive information of local dictionary lookup;
Debugging module, for debugging above-mentioned application program according to original sensitive information.
CN201510812412.XA 2015-11-20 2015-11-20 Method and system for preventing sensitive information from leakage Pending CN105337988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510812412.XA CN105337988A (en) 2015-11-20 2015-11-20 Method and system for preventing sensitive information from leakage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510812412.XA CN105337988A (en) 2015-11-20 2015-11-20 Method and system for preventing sensitive information from leakage

Publications (1)

Publication Number Publication Date
CN105337988A true CN105337988A (en) 2016-02-17

Family

ID=55288271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510812412.XA Pending CN105337988A (en) 2015-11-20 2015-11-20 Method and system for preventing sensitive information from leakage

Country Status (1)

Country Link
CN (1) CN105337988A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147557A (en) * 2016-10-25 2017-09-08 北京小米移动软件有限公司 Change the method and device of session information
CN107862214A (en) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 Prevent the method, apparatus and storage medium of sensitive information leakage
CN111651781A (en) * 2020-06-05 2020-09-11 腾讯科技(深圳)有限公司 Log content protection method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737190A (en) * 2012-07-04 2012-10-17 复旦大学 Detection method for information leakage hidden trouble in Android application log based on static state analysis
CN103778377A (en) * 2014-01-28 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Terminal and method for preventing sensitive information leakage
CN103984900A (en) * 2014-05-19 2014-08-13 南京赛宁信息技术有限公司 Android application vulnerability detection method and Android application vulnerability detection system
CN104065651A (en) * 2014-06-09 2014-09-24 上海交通大学 Information flow dependability guarantee mechanism for cloud computation
US9298878B2 (en) * 2010-07-29 2016-03-29 Oracle International Corporation System and method for real-time transactional data obfuscation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9298878B2 (en) * 2010-07-29 2016-03-29 Oracle International Corporation System and method for real-time transactional data obfuscation
CN102737190A (en) * 2012-07-04 2012-10-17 复旦大学 Detection method for information leakage hidden trouble in Android application log based on static state analysis
CN103778377A (en) * 2014-01-28 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Terminal and method for preventing sensitive information leakage
CN103984900A (en) * 2014-05-19 2014-08-13 南京赛宁信息技术有限公司 Android application vulnerability detection method and Android application vulnerability detection system
CN104065651A (en) * 2014-06-09 2014-09-24 上海交通大学 Information flow dependability guarantee mechanism for cloud computation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YANG PAN等: "A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining", 《2013 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING》 *
杨书思: "一种可配置的网络报警日志匿名工具的设计与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147557A (en) * 2016-10-25 2017-09-08 北京小米移动软件有限公司 Change the method and device of session information
CN107147557B (en) * 2016-10-25 2021-01-15 北京小米移动软件有限公司 Method and device for modifying session information
CN107862214A (en) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 Prevent the method, apparatus and storage medium of sensitive information leakage
CN111651781A (en) * 2020-06-05 2020-09-11 腾讯科技(深圳)有限公司 Log content protection method and device, computer equipment and storage medium
CN111651781B (en) * 2020-06-05 2024-07-09 腾讯科技(深圳)有限公司 Log content protection method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
Zuo et al. Why does your data leak? uncovering the data leakage in cloud from mobile apps
Akbanov et al. WannaCry ransomware: Analysis of infection, persistence, recovery prevention and propagation mechanisms
US8166313B2 (en) Method and apparatus for dump and log anonymization (DALA)
CN108628743B (en) Application program testing method, device, equipment and storage medium
US9830478B1 (en) Logging from obfuscated code
Do et al. Enhancing user privacy on android mobile devices via permissions removal
Cook et al. A survey on industrial control system digital forensics: challenges, advances and future directions
WO2023053101A1 (en) Systems and methods for malicious code neutralization in execution environments
Serketzis et al. Actionable threat intelligence for digital forensics readiness
US12010249B1 (en) Method and device for zero-trust fusion computation of multi-party data
CN103812862A (en) Dependable security cloud computing composition method
CN105337988A (en) Method and system for preventing sensitive information from leakage
CN105354485B (en) A kind of portable set data processing method
WO2019134276A1 (en) Method and system for protecting web page code, storage medium, and electronic device
CN106203141A (en) The data processing method of a kind of application and device
CN108170753A (en) A kind of method of Key-Value data base encryptions and Safety query in shared cloud
Pistoia et al. Labyrinth: Visually configurable data-leakage detection in mobile applications
Cho et al. Vulnerabilities of android data sharing and malicious application to leaking private information
Liu et al. Android mobile OS snooping by Samsung, Xiaomi, Huawei and Realme handsets
US11138319B2 (en) Light-weight context tracking and repair for preventing integrity and confidentiality violations
Wichmann et al. Web cryptography API: Prevalence and possible developer mistakes
US10503929B2 (en) Visually configurable privacy enforcement
Gadient et al. Security Smells Pervade Mobile App Servers
Samarin et al. The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services
US11263328B2 (en) Encrypted log aggregation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160217

RJ01 Rejection of invention patent application after publication