CN106933880B - 一种标签数据泄漏渠道检测方法及装置 - Google Patents

一种标签数据泄漏渠道检测方法及装置 Download PDF

Info

Publication number
CN106933880B
CN106933880B CN201511028180.5A CN201511028180A CN106933880B CN 106933880 B CN106933880 B CN 106933880B CN 201511028180 A CN201511028180 A CN 201511028180A CN 106933880 B CN106933880 B CN 106933880B
Authority
CN
China
Prior art keywords
user
channel
label
detection
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511028180.5A
Other languages
English (en)
Chinese (zh)
Other versions
CN106933880A (zh
Inventor
文镇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201511028180.5A priority Critical patent/CN106933880B/zh
Priority to PCT/CN2016/110714 priority patent/WO2017114209A1/zh
Priority to JP2018532787A priority patent/JP6895972B2/ja
Publication of CN106933880A publication Critical patent/CN106933880A/zh
Priority to US16/020,872 priority patent/US10678946B2/en
Priority to US16/874,012 priority patent/US11080427B2/en
Application granted granted Critical
Publication of CN106933880B publication Critical patent/CN106933880B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
CN201511028180.5A 2015-12-31 2015-12-31 一种标签数据泄漏渠道检测方法及装置 Active CN106933880B (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201511028180.5A CN106933880B (zh) 2015-12-31 2015-12-31 一种标签数据泄漏渠道检测方法及装置
PCT/CN2016/110714 WO2017114209A1 (zh) 2015-12-31 2016-12-19 一种标签数据泄漏渠道检测方法及装置
JP2018532787A JP6895972B2 (ja) 2015-12-31 2016-12-19 ラベルデータ漏洩チャネル検出方法および装置
US16/020,872 US10678946B2 (en) 2015-12-31 2018-06-27 Method and apparatus for detecting label data leakage channel
US16/874,012 US11080427B2 (en) 2015-12-31 2020-05-14 Method and apparatus for detecting label data leakage channel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511028180.5A CN106933880B (zh) 2015-12-31 2015-12-31 一种标签数据泄漏渠道检测方法及装置

Publications (2)

Publication Number Publication Date
CN106933880A CN106933880A (zh) 2017-07-07
CN106933880B true CN106933880B (zh) 2020-08-11

Family

ID=59225617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511028180.5A Active CN106933880B (zh) 2015-12-31 2015-12-31 一种标签数据泄漏渠道检测方法及装置

Country Status (4)

Country Link
US (2) US10678946B2 (enExample)
JP (1) JP6895972B2 (enExample)
CN (1) CN106933880B (enExample)
WO (1) WO2017114209A1 (enExample)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933880B (zh) 2015-12-31 2020-08-11 阿里巴巴集团控股有限公司 一种标签数据泄漏渠道检测方法及装置
WO2020009861A1 (en) 2018-07-02 2020-01-09 Walmart Apollo, Llc Systems and methods for detecting exposed data
CN109739889B (zh) * 2018-12-27 2020-12-08 北京三未信安科技发展有限公司 一种基于数据映射的数据泄漏溯源判定方法及系统
CN117528154B (zh) * 2024-01-04 2024-03-29 湖南快乐阳光互动娱乐传媒有限公司 一种视频投放方法、装置、电子设备及存储介质

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237018A (zh) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 一种客户端匹配方法、服务器及通信系统
CN103281403A (zh) * 2013-06-19 2013-09-04 浙江工商大学 一种在网络销售渠道中提高个人信息安全的云保护系统
CN103581190A (zh) * 2013-11-07 2014-02-12 江南大学 一种基于云计算技术的文件安全访问控制方法
CN103581883A (zh) * 2013-10-31 2014-02-12 宇龙计算机通信科技(深圳)有限公司 通信终端及其应用数据的获取方法
CN103593465A (zh) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 用于诊断应用推广渠道异常的方法和设备
CN103870000A (zh) * 2012-12-11 2014-06-18 百度国际科技(深圳)有限公司 一种对输入法所产生的候选项进行排序的方法及装置
CN104133837A (zh) * 2014-06-24 2014-11-05 上海交通大学 一种基于分布式计算的互联网信息投放渠道优化系统
WO2015030856A1 (en) * 2013-08-28 2015-03-05 Intuit Inc. Method and system for providing efficient feedback regarding captured optical image quality

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005149126A (ja) * 2003-11-14 2005-06-09 Sony Corp 情報取得システム、情報取得方法、及び情報処理プログラム
JP2005222135A (ja) * 2004-02-03 2005-08-18 Internatl Business Mach Corp <Ibm> データベースアクセス監視装置、情報流出元特定システム、データベースアクセス監視方法、情報流出元特定方法、およびプログラム
US7668821B1 (en) * 2005-11-17 2010-02-23 Amazon Technologies, Inc. Recommendations based on item tagging activities of users
US8893300B2 (en) * 2010-09-20 2014-11-18 Georgia Tech Research Corporation Security systems and methods to reduce data leaks in enterprise networks
JP2012150652A (ja) * 2011-01-19 2012-08-09 Kddi Corp インフルエンサー抽出装置、インフルエンサー抽出方法およびプログラム
US8799227B2 (en) * 2011-11-11 2014-08-05 Blackberry Limited Presenting metadata from multiple perimeters
JP5572646B2 (ja) * 2012-02-10 2014-08-13 ヤフー株式会社 情報提供装置、情報提供方法および情報提供プログラム
US9349015B1 (en) * 2012-06-12 2016-05-24 Galois, Inc. Programmatically detecting collusion-based security policy violations
CN103581863B (zh) 2012-08-08 2018-06-22 中兴通讯股份有限公司 扣费方法及装置
WO2014024959A1 (ja) * 2012-08-09 2014-02-13 日本電信電話株式会社 トレースセンタ装置、コンテンツをトレース可能にする方法
US9444719B2 (en) * 2013-03-05 2016-09-13 Comcast Cable Communications, Llc Remote detection and measurement of data signal leakage
JP6001781B2 (ja) * 2013-07-05 2016-10-05 日本電信電話株式会社 不正アクセス検知システム及び不正アクセス検知方法
US10108918B2 (en) * 2013-09-19 2018-10-23 Acxiom Corporation Method and system for inferring risk of data leakage from third-party tags
US9256727B1 (en) * 2014-02-20 2016-02-09 Symantec Corporation Systems and methods for detecting data leaks
JP6215095B2 (ja) * 2014-03-14 2017-10-18 株式会社日立製作所 情報システム
CN104778419A (zh) * 2015-04-15 2015-07-15 华中科技大学 云环境下基于动态数据流跟踪的用户隐私数据保护方法
CN104965890B (zh) * 2015-06-17 2017-05-31 深圳市腾讯计算机系统有限公司 广告推荐的方法和装置
CN106933880B (zh) * 2015-12-31 2020-08-11 阿里巴巴集团控股有限公司 一种标签数据泄漏渠道检测方法及装置

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870000A (zh) * 2012-12-11 2014-06-18 百度国际科技(深圳)有限公司 一种对输入法所产生的候选项进行排序的方法及装置
CN103237018A (zh) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 一种客户端匹配方法、服务器及通信系统
CN103281403A (zh) * 2013-06-19 2013-09-04 浙江工商大学 一种在网络销售渠道中提高个人信息安全的云保护系统
WO2015030856A1 (en) * 2013-08-28 2015-03-05 Intuit Inc. Method and system for providing efficient feedback regarding captured optical image quality
CN103581883A (zh) * 2013-10-31 2014-02-12 宇龙计算机通信科技(深圳)有限公司 通信终端及其应用数据的获取方法
CN103581190A (zh) * 2013-11-07 2014-02-12 江南大学 一种基于云计算技术的文件安全访问控制方法
CN103593465A (zh) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 用于诊断应用推广渠道异常的方法和设备
CN104133837A (zh) * 2014-06-24 2014-11-05 上海交通大学 一种基于分布式计算的互联网信息投放渠道优化系统

Also Published As

Publication number Publication date
US10678946B2 (en) 2020-06-09
US20200272765A1 (en) 2020-08-27
US20180314856A1 (en) 2018-11-01
WO2017114209A1 (zh) 2017-07-06
JP2019508779A (ja) 2019-03-28
CN106933880A (zh) 2017-07-07
US11080427B2 (en) 2021-08-03
JP6895972B2 (ja) 2021-06-30

Similar Documents

Publication Publication Date Title
US20220122097A1 (en) Method and system for providing business intelligence based on user behavior
US11080427B2 (en) Method and apparatus for detecting label data leakage channel
GB2555801A (en) Identifying fraudulent and malicious websites, domain and subdomain names
Agarwal et al. Stop tracking me bro! differential tracking of user demographics on hyper-partisan websites
CN111104579A (zh) 一种公网资产的识别方法、装置及存储介质
US20200005170A1 (en) Digital mdr (managed detection and response) analysis
Abrol et al. Tweethood: Agglomerative clustering on fuzzy k-closest friends with variable depth for location mining
CN103399855B (zh) 基于多数据源的行为意图确定方法及装置
CN103605715A (zh) 用于多个数据源的数据整合处理方法和装置
Han et al. CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis
He et al. Mobile app identification for encrypted network flows by traffic correlation
Westlake et al. Using file and folder naming and structuring to improve automated detection of child sexual abuse images on the Dark Web
Bo et al. Tom: A threat operating model for early warning of cyber security threats
US20240297897A1 (en) Systems and methods for mapping a networked environment with cross account clustering to monitoring and/or detect fraudulent entity networks
CN114186029A (zh) 信息泄露行为的分析方法、相关装置及计算机存储介质
Smith Review of cookie synchronization detection methods
CN109831472B (zh) 一种信息推送、信息显示方法和系统
Alnajjar et al. Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment
Geeta et al. Big data analytics for detection of frauds in matrimonial websites
Vlachos A social network analysis tool for uncovering cybersecurity threats
US20220038892A1 (en) Mathematical Summaries of Telecommunications Data for Data Analytics
Chen et al. A study on security trend based on news analysis
US12052281B2 (en) Automated social media-related brand protection
US11962618B2 (en) Systems and methods for protection against theft of user credentials by email phishing attacks
Cheong et al. Large-scale socio-demographic pattern discovery on microblog metadata

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant