CN107392028A - The detection method and its detection means of sensitive information, storage medium, electronic equipment - Google Patents

The detection method and its detection means of sensitive information, storage medium, electronic equipment Download PDF

Info

Publication number
CN107392028A
CN107392028A CN201710600182.XA CN201710600182A CN107392028A CN 107392028 A CN107392028 A CN 107392028A CN 201710600182 A CN201710600182 A CN 201710600182A CN 107392028 A CN107392028 A CN 107392028A
Authority
CN
China
Prior art keywords
sensitive information
uniform resource
web site
resource locator
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710600182.XA
Other languages
Chinese (zh)
Inventor
高敏
王润辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Ctrip Business Co Ltd
Original Assignee
Shanghai Ctrip Business Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Ctrip Business Co Ltd filed Critical Shanghai Ctrip Business Co Ltd
Priority to CN201710600182.XA priority Critical patent/CN107392028A/en
Publication of CN107392028A publication Critical patent/CN107392028A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of detection method and its detection means, storage medium, electronic equipment of sensitive information.The detection method of the sensitive information comprises the following steps:Obtain the access log of enterprise web site;The uniform resource locator link corresponding to all http requests that user can be accessed as the enterprise web site is extracted from the access log of enterprise web site;The http request of simulation is sent to the uniform resource locator link extracted, and obtains the feedback information responded for the http request of the simulation;Sensitive information canonical matching is carried out to the feedback information, judges whether include the sensitive information in the feedback information;If including the sensitive information in the feedback information, corresponding uniform resource locator chained record is put on record, and is repaired.The detection method and its device of the sensitive information can prevent sensitive information from further illegally being spread, utilized with the safety of effective guarantee individual subscriber sensitive information, the safety coefficient at lifting user's access enterprise networks station.

Description

The detection method and its detection means of sensitive information, storage medium, electronic equipment
Technical field
The present invention relates to field of information security technology, more particularly to a kind of access log analysis based on to enterprise web site The detection method and its detection means of sensitive information, storage medium, electronic equipment.
Background technology
With the continuous development of internet industry, the personal sensitive information protection of user is faced with increasingly serious challenge. All there is the problems such as user's sequence information leakage in many B2C Internet firms, such as travel network, shopping website, these users order The sensitive informations such as a large number of users phone number, contact address, E-mail address are contained in single information, result in the personal quick of user Feel the severe leakage of information, and then trigger the prevailing of black industry.
Most of user sensitive information leakage, is due to that Website development has security breaches mostly, causes malicious persons can Using network station leakage, directly or indirectly to obtain user sensitive information.However, individual subscriber sensitive information is ensured, not only Web developers are needed to strictly observe code security development process, it is also desirable to aid in testing mechanism, leakage detection is filled a vacancy, and is accessed user Web site url carry out individual subscriber sensitive information detection, judge whether information leakage.At present, lack for webpage in itself Sensitive information detection correlation technique.
The content of the invention
For in the prior art the defects of, it is an object of the invention to provide a kind of access log point based on to enterprise web site The detection method and its detection means of the sensitive information of analysis, storage medium, electronic equipment.The detection method of the sensitive information and its Detection means can effectively ensure the safety of individual subscriber sensitive information, prevent that these sensitive informations from further illegally being expanded Dissipate, utilize, further lift the safety coefficient at user's access enterprise networks station.
A kind of detection method of sensitive information, the detection method of the sensitive information are provided according to an aspect of the present invention Comprise the following steps:S10:Obtain the access log of enterprise web site;S20:Extracting user from the access log of enterprise web site can Uniform resource locator link corresponding to all http requests accessed as the enterprise web site;S30:To the unified money extracted Source locator link sends the http request of simulation, and obtains the feedback information responded for the http request of the simulation; S40:Sensitive information canonical matching is carried out to the feedback information, whether judged in the feedback information comprising the sensitive letter Breath;S50:If including the sensitive information in the feedback information, corresponding uniform resource locator chained record is put on record, And repaired.
Preferably, in the step S10 it is the access log that obtains the enterprise web site in real time.
Preferably, after the step S20, before the step S30, also comprise the following steps:S80:By to system The link of one resource localizer carries out keyword canonical matching, filters out the unified resource with the keyword in http request and determines Position device link.
Preferably, the keyword includes at least one in order, order number, Orderid or comment.
Preferably, after step slo, before the step S20, also comprise the following steps:S60:To the enterprise network The access log stood is analyzed in real time.
Preferably, after step S20, before the step S30, also comprise the following steps:S70:The use that will be extracted Family can be as the uniform resource locator link storage corresponding to the http request that the enterprise web site accesses to database.
Preferably, the sensitive information includes at least one in identification card number, phone number, contact address or E-mail address It is individual.
According to another aspect of the present invention, a kind of detection means of sensitive information, the inspection of the sensitive information are also provided Surveying device includes:Access log acquisition module, for obtaining the access log of enterprise web site;Extraction module is linked, for from enterprise The unified resource corresponding to all http requests that user can be accessed as the enterprise web site is extracted in the access log of industry website to determine Position device link;Http request module is simulated, for sending the http request of simulation to the uniform resource locator link extracted, And obtain the feedback information responded for the http request of the simulation;Sensitive information matching module, for the feedback letter Breath carries out sensitive information canonical matching, judges whether include the sensitive information in the feedback information;Repair module, for working as When the sensitive information is included in the feedback information, corresponding uniform resource locator chained record is put on record, and is repaiied It is multiple.
Preferably, the detection means of the sensitive information also includes screening module, for being linked to uniform resource locator Keyword canonical matching is carried out, the uniform resource locator with the keyword in http request is filtered out and links.
Preferably, the detection means of the sensitive information also includes analysis module, for the access to the enterprise web site Daily record is analyzed in real time.
Preferably, the detection means of the sensitive information also includes storage module, for can be by this by the user extracted Uniform resource locator link corresponding to the http request that enterprise web site accesses is deposited to database.
According to a further aspect of the invention, a kind of computer-readable recording medium is also provided, is stored thereon with computer Program, the program realizes the detection method of above-mentioned sensitive information when being executed by processor the step of.
According to a further aspect of the invention, a kind of electronic equipment is also provided, including:Processor;And memory, it is used for Store the executable instruction of the processor;Wherein, the processor is configured to perform via the executable instruction is performed The step of detection method of above-mentioned sensitive information.
Compared to prior art, the detection method and detection means of sensitive information provided in an embodiment of the present invention and deposit Access log based on the enterprise web site got in storage media, the system corresponding to all http requests of extraction user-accessible One resource localizer links, and sends the http request of simulation to the uniform resource locator link extracted, obtains response Feedback information, by the feedback information carry out sensitive information canonical matching, come detect uniform resource locator link return Whether sensitive information is included in the feedback information returned, so as to carry out follow-up processing work.The detection side of the sensitive information Method effectively ensures the safety of the personal sensitive information of user, prevents these sensitive informations by illegal diffusion, utilizes, further carries Rise the safety coefficient at user's access enterprise networks station.
Brief description of the drawings
The detailed description made by reading with reference to the following drawings to non-limiting example, further feature of the invention, Objects and advantages will become more apparent upon:
Fig. 1 is a kind of flow chart of the detection method of sensitive information of one embodiment of the present of invention;
Fig. 2 is a kind of flow chart of the detection method of sensitive information of an alternative embodiment of the invention;
Fig. 3 discloses a kind of computer-readable recording medium schematic diagram in exemplary embodiment for the present invention;And
Fig. 4 discloses a kind of electronic equipment schematic diagram in exemplary embodiment for the present invention.
Embodiment
Example embodiment is described more fully with referring now to accompanying drawing.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to embodiment set forth herein;On the contrary, these embodiments are provided so that the present invention will Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Identical is attached in figure Icon note represents same or similar structure, thus will omit repetition thereof.
Described feature, structure or characteristic can be incorporated in one or more embodiments in any suitable manner In.In the following description, there is provided many details fully understand so as to provide to embodiments of the present invention.However, One of ordinary skill in the art would recognize that without one or more in specific detail, or using other methods, constituent element, material Material etc., can also put into practice technical scheme.In some cases, be not shown in detail or describe known features, material or Person's operation is fuzzy of the invention to avoid.
In addition, accompanying drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical accompanying drawing mark in figure Note represents same or similar part, thus will omit repetition thereof.Some block diagrams shown in accompanying drawing are work( Can entity, not necessarily must be corresponding with physically or logically independent entity.These work(can be realized using software form Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place These functional entitys are realized in reason device device and/or microcontroller device.
According to the purport design of the present invention, a kind of detection method of sensitive information of the invention comprises the following steps:Obtain The access log of enterprise web site;All http that user can be accessed by the enterprise web site are extracted from the access log of enterprise web site The corresponding uniform resource locator link of request;The http that simulation is sent to the uniform resource locator link extracted please Ask, and obtain the feedback information responded for the http request of the simulation;Sensitive information canonical is carried out to the feedback information Matching, judges whether include the sensitive information in the feedback information;If including the sensitive information in the feedback information, Then corresponding uniform resource locator chained record is put on record, and repaired.
The technology contents of the present invention are described further with reference to the accompanying drawings and examples.
Fig. 1 is referred to, it illustrates a kind of flow chart of the detection method of sensitive information of one embodiment of the present of invention. Specifically, the detection method of sensitive information of the invention is mainly used in preventing user's sensitive letter during using enterprise web site The leakage of breath.As shown in figure 1, in an embodiment of the present invention, the detection method of the sensitive information comprises the following steps:
Step S10:Obtain the access log of enterprise web site.Specifically, in this step, it is optionally to obtain in real time and is somebody's turn to do The access log of enterprise web site., can be useful to institute in the enterprise web site by obtaining the access log of the enterprise web site in real time The request that family accesses analyze and monitor in real time, and then, http request (web site url) progress to user-accessible is comprehensive Covering, make the detection method detection coverage rate of the sensitive information more extensive.
Step S20:All http that user is extracted from the access log of enterprise web site to be accessed by the enterprise web site are asked Corresponding uniform resource locator is asked to link.Specifically, in the embodiment shown in fig. 1, on above-mentioned steps S10 basis On, in uniform resource locator (URL) link corresponding to all http requests that extraction user can be accessed as the enterprise web site The step of (i.e. step S20) before, in addition to step S60:The access log of the enterprise web site is analyzed in real time.And then Asked by carrying out analysis in real time to the access log of enterprise web site to extract all http that user can be accessed by the enterprise web site Corresponding uniform resource locator (URL) is asked to link.For example, the real-time analysis of above-mentioned access log can mainly include Following steps:The daily record of enterprise web site server is collected using Logstash, and daily record is stored in ElasticSearch clusters In, finally carry out collecting and analyzing for daily record using Kibana.Accessed enterprise daily record is parsed into the finger that user can intuitively access Data format is determined, to carry out the extraction of http request link.
Further, in the embodiment shown in fig. 1, all http that can be accessed in extraction user by the enterprise web site please After the step of asking corresponding uniform resource locator (URL) to link (i.e. step S20), in addition to step S70:It will extract User can be as uniform resource locator (URL) the link storage corresponding to the http request that the enterprise web site accesses to data Storehouse.
Step S30:The http request of simulation is sent to the uniform resource locator link extracted, and obtains and is directed to the mould The feedback information that the http request of plan is responded.Specifically, in this step, that is, it is the detection side by realizing the sensitive information All uniform resource locators (URL) link that the detection means of the sensitive information of method actively extracts into above-mentioned steps S20 The http request of simulation is sent, in other words, all URL links that as analog subscriber extracts into above-mentioned steps S20 are sent Http request.After sending the http request of simulation, URL link can return to a feedback information, obtain the feedback that URL link is returned Information, detected for follow-up sensitive information.
Step S40:Sensitive information canonical matching is carried out to the feedback information, judges whether included in the feedback information The sensitive information.Specifically, examined for the above-mentioned steps S30 feedback informations returned by all URL links obtained Survey, by carrying out sensitive information canonical matching to each feedback information, to judge whether include sensitive information in the feedback information. Wherein, canonical matching is to be matched using regular expression.Sensitive information can carry out flexible configuration, for example, in the present invention Alternative embodiment in, sensitive information can include in the information such as identification card number, phone number, contact address or E-mail address It is at least one.If after canonical matches, identification card number, cell-phone number are included in the feedback information as a result returned for some URL link The information such as code, contact address or E-mail address then, then judge to include sensitive information (i.e. its corresponding URL chain in the feedback information Connect the risk that the sensitive information of user may be made leakage to be present).
Step S50:If including the sensitive information in the feedback information, corresponding uniform resource locator is linked Record is put on record, and is repaired.Specifically, if the judged result in above-mentioned steps S40 is affirmative, this is included into sensitivity Uniform resource locator (URL) link corresponding to the feedback information of information carries out record and put on record, and is repaired.Wherein, Repairing can contact the corresponding Website development personnel of the uniform resource locator (URL) link to carry out rectification reparation.Or In further embodiments, it is if whole not yet after contacting the corresponding Website development personnel of the uniform resource locator (URL) link Rebuild multiple, user can also be forbidden to send from enterprise web site and link corresponding http with the uniform resource locator (URL) Request (as deleted the peer link in enterprise web site), user is avoided with this.Sent to the uniform resource locator (URL) link Http request.
It is based on obtaining from above-mentioned embodiment illustrated in fig. 1, in the detection method of sensitive information provided in an embodiment of the present invention Uniform resource locator chain corresponding to the access log for the enterprise web site got, all http requests of extraction user-accessible Connect, and send the http request of simulation to the uniform resource locator link extracted, obtain the feedback information of response, pass through Sensitive information canonical matching is carried out to the feedback information, is to detect in the feedback information of uniform resource locator link return It is no to include sensitive information, so as to carry out follow-up processing work.The detection method of the sensitive information effectively ensures user Personal sensitive information safety, prevent these sensitive informations by illegal diffusion, utilize, further lift user's access enterprise networks The safety coefficient stood.
Further, the present invention also provides a kind of detection means of sensitive information, for realizing the sensitivity shown in above-mentioned Fig. 1 The detection method of information.Specifically, the detection means of the sensitive information mainly includes:Access log acquisition module, link Extraction module, simulation http request module, sensitive information matching module and repair module.
Specifically, access log acquisition module (is performed in above-mentioned Fig. 1 for obtaining the access log of enterprise web site Step S10).
Link extraction module can be connected with access log acquisition module, for being carried from the access log of enterprise web site Take the link of the uniform resource locator corresponding to all http requests that family can be accessed as the enterprise web site and (perform above-mentioned figure Step S20 in 1).
Further, in the embodiment of the present invention, the detection means of the sensitive information also includes analysis module.Point Analysis module can be respectively with access log acquisition module and linking extraction module and being connected, for entering to the access log of enterprise web site Row analysis (performing the step S60 in above-mentioned Fig. 1) in real time.Wherein, link extraction module passes through analysis module and access log Acquisition module is connected.
Simulation http request module can be connected with linking extraction module, for the uniform resource locator extracted Link sends the http request of simulation, and obtains the feedback information responded for the http request of the simulation and (perform above-mentioned Step S30 in Fig. 1).
Sensitive information matching module can be connected with simulation http request module, for carrying out sensitive letter to feedback information Canonical matching is ceased, judges whether include the sensitive information (performing the step S40 in above-mentioned Fig. 1) in the feedback information.
Repair module can be connected with sensitive information matching module, for when including sensitive information in feedback information, Then corresponding uniform resource locator chained record is put on record, and is repaired and (performs the step S50 in above-mentioned Fig. 1).
Further, in an embodiment of the present invention, the detection means of the sensitive information also includes storage module.Storage Module can be connected with linking extraction module, for can be by http request institute that the enterprise web site accesses by the user extracted Corresponding uniform resource locator link is deposited to database (performing the step S70 in above-mentioned Fig. 1).
Further, Fig. 2 is referred to, it illustrates the detection method stream of the sensitive information of an alternative embodiment of the invention Cheng Tu, can be by http request institute that the enterprise web site accesses in the extraction user unlike above-mentioned embodiment illustrated in fig. 1 After the step of corresponding uniform resource locator link (i.e. step S20), in addition to step S80:By determining unified resource Position device link carries out keyword canonical matching, filters out the uniform resource locator chain that the keyword is carried in http request Connect.
Specifically, in this step, the unified resource corresponding to all http requests as extracted in step S20 In locator link, (as entered by linking progress keyword canonical matching to uniform resource locator using regular expression Row matching), filter out the uniform resource locator with above-mentioned keyword in http request and link, i.e., more precisely filter out The uniform resource locator for needing to detect, which links, (reveals the larger uniform resource locator of the possibility of the sensitive information of user Link).Wherein, keyword can carry out flexible configuration, alternatively, the keyword include order, order number, Orderid or At least one in comment, the uniform resource locator link thus filtered out can be the link of user's order, user comment chain Connect, and then, carry out follow-up detection for these uniform resource locator links filtered out.Therefore, in this embodiment, Correspondingly, in subsequent step S30, i.e., for screening after uniform resource locator link send simulation http request, Obtain the feedback information for response.
Therefore step S80 can pass through key to all uniform resource locator links extracted in step S20 Word carries out further Accurate Analysis, makes follow-up detecting step more targeted, without to all unified resources extracted Locator link is detected, and corresponding detecting step and detection time are saved with this.
Further, in order to realize the step S80 in above-mentioned Fig. 2, in an embodiment of the present invention, the sensitive information Detection means also includes screening module.Screening module can be connected with linking extraction module and simulation http request module respectively Connect, carry out keyword canonical matching for being linked to uniform resource locator, filter out and the keyword is carried in http request Uniform resource locator link.Wherein, the uniform resource locator link of extraction module extraction is linked by screening module Simulation http request module is transferred to after screening.
The embodiment can realize the effect similar with above-mentioned embodiment illustrated in fig. 1, and thus uniform resource locator Link have passed through screening, therefore, make follow-up detecting step more targeted, without being positioned to all unified resources extracted Device link is detected, and the detecting step and detection time that can more save, will not be described here.
In an exemplary embodiment of the disclosure, a kind of computer-readable recording medium is additionally provided, is stored thereon with meter Calculation machine program, the inspection of sensitive information described in any one above-mentioned embodiment can be realized when the program is by such as computing device The step of survey method.In some possible embodiments, various aspects of the invention are also implemented as a kind of program product Form, it includes program code, and when described program product is run on the terminal device, described program code is used to making described Terminal device perform described in the detection method part of the sensitive information shown in this specification above-mentioned Fig. 1 or Fig. 2 according to this hair The step of bright various illustrative embodiments.
With reference to shown in figure 3, the program product for being used to realize the above method according to the embodiment of the present invention is described 300, it can use portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as run on PC.However, the program product not limited to this of the present invention, in this document, readable storage medium storing program for executing can be with Be it is any include or the tangible medium of storage program, the program can be commanded execution system, device either device use or It is in connection.
Described program product can use any combination of one or more computer-readable recording mediums.Computer-readable recording medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any combination above.The more specifically example of readable storage medium storing program for executing is (non exhaustive List) include:It is electrical connection, portable disc, hard disk, random access memory (RAM) with one or more wires, read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer-readable recording medium can include believing in a base band or as the data that a carrier wave part is propagated Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any beyond readable storage medium storing program for executing Computer-readable recording medium, the computer-readable recording medium can send, propagate either transmit for being used by instruction execution system, device or device or Person's program in connection.The program code included on readable storage medium storing program for executing can be transmitted with any appropriate medium, bag Include but be not limited to wireless, wired, optical cable, RF etc., or above-mentioned any appropriate combination.
Can being combined to write the program operated for performing the present invention with one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., include routine Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user Perform on computing device, partly perform on a user device, the software kit independent as one performs, is partly calculated in user Its upper side point is performed or performed completely in remote computing device or server on a remote computing.It is remote being related to In the situation of journey computing device, remote computing device can pass through the network of any kind, including LAN (LAN) or wide area network (WAN) user calculating equipment, is connected to, or, it may be connected to external computing device (such as utilize ISP To pass through Internet connection).
In an exemplary embodiment of the disclosure, a kind of electronic equipment is also provided, the electronic equipment can include processor, And the memory of the executable instruction for storing the processor.Wherein, the processor is configured to via described in execution The step of executable instruction is to perform the detection method of sensitive information described in any one above-mentioned embodiment.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be implemented as following form, i.e.,:It is complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.), or hardware and software, can unite here Referred to as " circuit ", " module " or " system ".
The electronic equipment 600 according to the embodiment of the invention is described referring to Fig. 4.The electronics that Fig. 4 is shown Equipment 600 is only an example, should not bring any restrictions to the function and use range of the embodiment of the present invention.
As shown in figure 4, electronic equipment 600 is showed in the form of universal computing device.The component of electronic equipment 600 can wrap Include but be not limited to:At least one processing unit 610, at least one memory cell 620, (including the storage of connection different system component Unit 620 and processing unit 610) bus 630, display unit 640 etc..
Wherein, the memory cell is had program stored therein code, and described program code can be held by the processing unit 610 OK so that the processing unit 610 perform described in the detection method part of the above-mentioned sensitive information of this specification according to this hair The step of bright various illustrative embodiments.For example, the processing unit 610 can perform step as illustrated in fig. 1 or fig. 2 Suddenly.
The memory cell 620 can include the computer-readable recording medium of volatile memory cell form, such as random access memory Unit (RAM) 6201 and/or cache memory unit 6202, it can further include read-only memory unit (ROM) 6203.
The memory cell 620 can also include program/practical work with one group of (at least one) program module 6205 Tool 6204, such program module 6205 includes but is not limited to:Operating system, one or more application program, other programs Module and routine data, the realization of network environment may be included in each or certain combination in these examples.
Bus 630 can be to represent the one or more in a few class bus structures, including memory cell bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 600 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, the equipment communication interacted with the electronic equipment 600 can be also enabled a user to one or more, and/or with causing Any equipment that the electronic equipment 600 can be communicated with one or more of the other computing device (such as router, modulation /demodulation Device etc.) communication.This communication can be carried out by input/output (I/O) interface 650.Also, electronic equipment 600 can be with By network adapter 660 and one or more network (such as LAN (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 660 can be communicated by bus 630 with other modules of electronic equipment 600.Should Understand, although not shown in the drawings, can combine electronic equipment 600 uses other hardware and/or software module, including it is but unlimited In:Microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can be realized by software, can also be realized by way of software combines necessary hardware.Therefore, according to the disclosure The technical scheme of embodiment can be embodied in the form of software product, the software product can be stored in one it is non-volatile Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are to cause a calculating Equipment (can be personal computer, server or network equipment etc.) performs the above-mentioned sensitivity according to disclosure embodiment The detection method of information.
In summary, the detection method of sensitive information provided in an embodiment of the present invention and detection means, storage medium, electricity Access log based on the enterprise web site got in sub- equipment, the system corresponding to all http requests of extraction user-accessible One resource localizer links, and sends the http request of simulation to the uniform resource locator link extracted, obtains response Feedback information, by the feedback information carry out sensitive information canonical matching, come detect uniform resource locator link return Whether sensitive information is included in the feedback information returned, so as to carry out follow-up processing work.The detection side of the sensitive information Method effectively ensures the safety of the personal sensitive information of user, prevents these sensitive informations by illegal diffusion, utilizes, further carries Rise the safety coefficient at user's access enterprise networks station.
Although the present invention is disclosed as above with alternative embodiment, but it is not limited to the present invention.Belonging to the present invention Those skilled in the art, without departing from the spirit and scope of the present invention, when various change and modification can be made.Therefore, Protection scope of the present invention is worked as to be defined depending on the scope that claims are defined.

Claims (13)

1. a kind of detection method of sensitive information, it is characterised in that the detection method of the sensitive information comprises the following steps:
S10:Obtain the access log of enterprise web site;
S20:Extracted from the access log of enterprise web site corresponding to all http requests that user can be accessed as the enterprise web site Uniform resource locator link;
S30:The http request of simulation is sent to the uniform resource locator link extracted, and obtains the http for the simulation The responded feedback information of request;
S40:Sensitive information canonical matching is carried out to the feedback information, judges whether include the sensitivity in the feedback information Information;
S50:It is if including the sensitive information in the feedback information, corresponding uniform resource locator chained record is standby Case, and repaired.
2. the detection method of sensitive information as claimed in claim 1, it is characterised in that in the step S10 be to obtain in real time Take the access log of the enterprise web site.
3. the detection method of sensitive information as claimed in claim 1, it is characterised in that after the step S20, the step Before rapid S30, also comprise the following steps:
S80:Keyword canonical matching is carried out by being linked to uniform resource locator, filters out and the pass is carried in http request The uniform resource locator link of keyword.
4. the detection method of sensitive information as claimed in claim 3, it is characterised in that the keyword includes order, order Number, Orderid or comment in it is at least one.
5. the detection method of sensitive information as claimed in claim 1, it is characterised in that after step slo, the step Before S20, also comprise the following steps:
S60:The access log of the enterprise web site is analyzed in real time.
6. the detection method of sensitive information as claimed in claim 1, it is characterised in that after step S20, the step Before S30, also comprise the following steps:
S70:The user extracted can be linked as the uniform resource locator corresponding to the http request that the enterprise web site accesses Deposit to database.
7. the detection method of sensitive information as claimed in claim 1, it is characterised in that the sensitive information includes identity card Number, it is phone number, at least one in contact address or E-mail address.
8. a kind of detection means of sensitive information, it is characterised in that the detection means of the sensitive information includes:
Access log acquisition module, for obtaining the access log of enterprise web site;
Link extraction module, for extracted from the access log of enterprise web site user can be accessed by the enterprise web site it is all Uniform resource locator link corresponding to http request;
Http request module is simulated, for sending the http request of simulation to the uniform resource locator link extracted, and is obtained Take the feedback information that the http request for the simulation is responded;
Sensitive information matching module, for carrying out sensitive information canonical matching to the feedback information, judge the feedback information In whether include the sensitive information;
Repair module, for when including the sensitive information in the feedback information, by corresponding uniform resource locator chain Connect record to put on record, and repaired.
9. the detection means of sensitive information as claimed in claim 8, it is characterised in that the detection means of the sensitive information is also Including screening module, keyword canonical matching is carried out for being linked to uniform resource locator, filters out in http request and carries The uniform resource locator link of the keyword.
10. the detection means of sensitive information as claimed in claim 8, it is characterised in that the detection means of the sensitive information Also include analysis module, analyzed in real time for the access log to the enterprise web site.
11. the detection means of sensitive information as claimed in claim 8, it is characterised in that the detection means of the sensitive information Also include storage module, for can be as the unified resource corresponding to the http request that the enterprise web site accesses by the user extracted Locator link is deposited to database.
12. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The step of detection method of the sensitive information any one of claim 1 to 7 is realized during execution.
13. a kind of electronic equipment, it is characterised in that including:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to come any one of perform claim requirement 1 to 7 via the execution executable instruction Sensitive information detection method the step of.
CN201710600182.XA 2017-07-21 2017-07-21 The detection method and its detection means of sensitive information, storage medium, electronic equipment Pending CN107392028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710600182.XA CN107392028A (en) 2017-07-21 2017-07-21 The detection method and its detection means of sensitive information, storage medium, electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710600182.XA CN107392028A (en) 2017-07-21 2017-07-21 The detection method and its detection means of sensitive information, storage medium, electronic equipment

Publications (1)

Publication Number Publication Date
CN107392028A true CN107392028A (en) 2017-11-24

Family

ID=60336540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710600182.XA Pending CN107392028A (en) 2017-07-21 2017-07-21 The detection method and its detection means of sensitive information, storage medium, electronic equipment

Country Status (1)

Country Link
CN (1) CN107392028A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109167797A (en) * 2018-10-12 2019-01-08 北京百度网讯科技有限公司 Analysis of Network Attack method and apparatus
CN109409836A (en) * 2018-10-23 2019-03-01 网易(杭州)网络有限公司 Data application processing method and device, electronic equipment, storage medium
CN109862074A (en) * 2018-12-29 2019-06-07 医渡云(北京)技术有限公司 A kind of collecting method, device, readable medium and electronic equipment
CN110399554A (en) * 2019-07-12 2019-11-01 苏州浪潮智能科技有限公司 A kind of detection method, device and the storage system of web site contents specific information
CN111031035A (en) * 2019-12-12 2020-04-17 支付宝(杭州)信息技术有限公司 Sensitive data access behavior monitoring method and device
CN112787992A (en) * 2020-12-17 2021-05-11 福建新大陆软件工程有限公司 Method, device, equipment and medium for detecting and protecting sensitive data
CN112925881A (en) * 2021-02-01 2021-06-08 大箴(杭州)科技有限公司 Sensitive barrage detection method and device, computer equipment and storage medium
CN113792334A (en) * 2021-09-06 2021-12-14 杭州安恒信息安全技术有限公司 Sensitive information data hiding method, system, computer and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546618A (en) * 2011-12-29 2012-07-04 北京神州绿盟信息安全科技股份有限公司 Method, device, system and website for detecting fishing website
CN106326734A (en) * 2015-06-30 2017-01-11 阿里巴巴集团控股有限公司 Method and device for detecting sensitive information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546618A (en) * 2011-12-29 2012-07-04 北京神州绿盟信息安全科技股份有限公司 Method, device, system and website for detecting fishing website
CN106326734A (en) * 2015-06-30 2017-01-11 阿里巴巴集团控股有限公司 Method and device for detecting sensitive information

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109167797A (en) * 2018-10-12 2019-01-08 北京百度网讯科技有限公司 Analysis of Network Attack method and apparatus
US11233819B2 (en) 2018-10-12 2022-01-25 Beijing Baidu Netcom Science And Technology Co., Ltd. Method and apparatus for analyzing cyberattack
CN109167797B (en) * 2018-10-12 2022-03-01 北京百度网讯科技有限公司 Network attack analysis method and device
CN109409836A (en) * 2018-10-23 2019-03-01 网易(杭州)网络有限公司 Data application processing method and device, electronic equipment, storage medium
CN109862074A (en) * 2018-12-29 2019-06-07 医渡云(北京)技术有限公司 A kind of collecting method, device, readable medium and electronic equipment
CN109862074B (en) * 2018-12-29 2022-03-25 医渡云(北京)技术有限公司 Data acquisition method and device, readable medium and electronic equipment
CN110399554A (en) * 2019-07-12 2019-11-01 苏州浪潮智能科技有限公司 A kind of detection method, device and the storage system of web site contents specific information
CN111031035A (en) * 2019-12-12 2020-04-17 支付宝(杭州)信息技术有限公司 Sensitive data access behavior monitoring method and device
CN111031035B (en) * 2019-12-12 2022-04-19 支付宝(杭州)信息技术有限公司 Sensitive data access behavior monitoring method and device
CN112787992A (en) * 2020-12-17 2021-05-11 福建新大陆软件工程有限公司 Method, device, equipment and medium for detecting and protecting sensitive data
CN112925881A (en) * 2021-02-01 2021-06-08 大箴(杭州)科技有限公司 Sensitive barrage detection method and device, computer equipment and storage medium
CN113792334A (en) * 2021-09-06 2021-12-14 杭州安恒信息安全技术有限公司 Sensitive information data hiding method, system, computer and readable storage medium

Similar Documents

Publication Publication Date Title
CN107392028A (en) The detection method and its detection means of sensitive information, storage medium, electronic equipment
EP3561708B1 (en) Method and device for classifying uniform resource locators based on content in corresponding websites
CN104685510B (en) Recognition application whether be rogue program method, system and storage medium
US10121009B2 (en) Computer system for discovery of vulnerabilities in applications including guided tester paths based on application coverage measures
CN103632100B (en) A kind of website vulnerability detection method and device
US11336673B2 (en) Systems and methods for third party risk assessment
CN107918733A (en) The system and method for detecting the malicious element of webpage
CN106709346B (en) Document handling method and device
CN105164691B (en) A kind of method and system for calculation machine software application
CN107171894A (en) The method of terminal device, distributed high in the clouds detecting system and pattern detection
CN109726601A (en) The recognition methods of unlawful practice and device, storage medium, computer equipment
CN112019401A (en) Internet of vehicles application safety testing method, device and system and electronic equipment
CN114205216B (en) Root cause positioning method and device for micro service fault, electronic equipment and medium
CN108848276A (en) Telephone number method for detecting availability, system, equipment and storage medium
Koch et al. The {OK} is not enough: A large scale study of consent dialogs in smartphone applications
KR20160090566A (en) Apparatus and method for detecting APK malware filter using valid market data
CN114398465A (en) Exception handling method and device of Internet service platform and computer equipment
KR101648349B1 (en) Apparatus and method for calculating risk of web site
US20180198813A1 (en) Methods and systems for discovering network security gaps
CN103095714A (en) Trojan horse detection method based on Trojan horse virus type classification modeling
CN116932381A (en) Automatic evaluation method for security risk of applet and related equipment
CN108874462A (en) A kind of browser behavior acquisition methods, device, storage medium and electronic equipment
JP6258189B2 (en) Specific apparatus, specific method, and specific program
Vuokko et al. Typology-based analysis of covid-19 mobile applications: implications for patient empowerment
KR101624276B1 (en) Method and apparatus for detecting icon spoofing of mobile application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124

RJ01 Rejection of invention patent application after publication