CN108491458A - A kind of sensitive document detection method, medium and equipment - Google Patents

A kind of sensitive document detection method, medium and equipment Download PDF

Info

Publication number
CN108491458A
CN108491458A CN201810176061.1A CN201810176061A CN108491458A CN 108491458 A CN108491458 A CN 108491458A CN 201810176061 A CN201810176061 A CN 201810176061A CN 108491458 A CN108491458 A CN 108491458A
Authority
CN
China
Prior art keywords
detected
cryptographic hash
file
sensitive document
sensitive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810176061.1A
Other languages
Chinese (zh)
Inventor
曾琛
孟昭宇
于健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen United Soft Polytron Technologies Inc
Original Assignee
Shenzhen United Soft Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen United Soft Polytron Technologies Inc filed Critical Shenzhen United Soft Polytron Technologies Inc
Priority to CN201810176061.1A priority Critical patent/CN108491458A/en
Publication of CN108491458A publication Critical patent/CN108491458A/en
Pending legal-status Critical Current

Links

Abstract

A kind of sensitive document detection method of offer, medium and the equipment of the present invention.The method, by using simhash algorithms, according to comparison cryptographic Hash and cryptographic Hash to be detected, judge whether file to be detected is sensitive document, compared to traditional key word detection method, MD5/SHA1 matching detection methods, the present invention can not only improve the speed of detection sensitive document, and, in the case where file to be detected has compared with small modifications, testing result can't be influenced;Meanwhile the present invention uses simhash algorithms, is that file to be detected is judged according to cryptographic Hash, does not need to read file, resource occupation is smaller.

Description

A kind of sensitive document detection method, medium and equipment
Technical field
The present invention relates to technical field of data security, and in particular to a kind of sensitive document detection method, medium and equipment.
Background technology
With the development of IT application in enterprises, more and more information turn digitizations, the identification of sensitive information is also from artificial Turn to automation.
In the prior art, generally use sensitive keys word detection method or MD5/SHA1 matching detection methods, to detect Sensitive document, time-consuming for both methods detection, also, is easy to cause when distorting keyword after detection and fails, using effect compared with Difference.
Invention content
For the defects in the prior art, the present invention provides a kind of sensitive document detection method, can not only improve detection The speed of sensitive document can't influence testing result moreover, in the case where file to be detected has compared with small modifications.
In a first aspect, the present invention provides a kind of sensitive document detection methods, including:
The file to be detected that client uploads is obtained, and calculates the cryptographic Hash to be detected of the file to be detected;
It is obtained from preset sensitive document library and compares cryptographic Hash;The comparison cryptographic Hash refers to the corresponding Kazakhstan of sensitive document Uncommon value;
The text to be detected is judged according to the comparison cryptographic Hash and the cryptographic Hash to be detected based on simhash algorithms Whether part is sensitive document.
Optionally, the cryptographic Hash to be detected of the file to be detected is calculated, including:
Calculate the cryptographic Hash to be detected of the partial content of the file to be detected.
Optionally, the different clients corresponds to the different sensitive document libraries;
Described obtained from preset sensitive document library compares cryptographic Hash, including:
According to the mark of the client, is obtained from corresponding default sensitive document library and compare cryptographic Hash.
Optionally, the cryptographic Hash of at least one sensitive document is stored in the sensitive document library.
Optionally, described to be based on simhash algorithms, according to the comparison cryptographic Hash and the cryptographic Hash to be detected, judge Whether the file to be detected is sensitive document, including:
The cryptographic Hash to be detected described compared cryptographic Hash and compared one by one at least one;
If identical as the cryptographic Hash to be detected there are one the comparison cryptographic Hash, the cryptographic Hash pair to be detected is judged The file to be detected answered is sensitive document;
If the cryptographic Hash to be detected is different from at least one cryptographic Hash that compares, the Kazakhstan to be detected is calculated Uncommon value compares the corresponding Hamming distance of cryptographic Hash with described;
Judge whether the Hamming distance is more than distance threshold;
If more than then judging that the file to be detected is not sensitive document;
If being not more than, judge the file to be detected for sensitive document.
Optionally, further include:
If judging result is that the file to be detected is sensitive document, cryptographic Hash is compared according to corresponding, is rearranged Putting in order for cryptographic Hash is compared in the sensitive document library.
Optionally, further include:
The judging result that the file to be detected is sensitive document is fed back into the client.
Optionally, further include:
The file to be detected is sent to examination & approval end for the judging result of sensitive document and the file to be detected;
Receive the control instruction that the examination & approval end is sent;
According to the control instruction, the file to be detected is let pass or prevented.
Second aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the program Above-mentioned sensitive document detection method is realized when being executed by processor.
The third aspect, the present invention provide a kind of computer equipment, including:Memory, processor and storage are on a memory And the computer program that can be run on a processor, the processor realize above-mentioned sensitive document detection side when executing described program Method.
A kind of sensitive document detection method of offer of the present invention, by using simhash algorithms, according to compare cryptographic Hash and Cryptographic Hash to be detected judges whether file to be detected is sensitive document, compared to traditional key word detection method, MD5/SHA1 Matching detection method, the present invention can not only improve the speed of detection sensitive document, moreover, having compared with small modifications in file to be detected In the case of, testing result can't be influenced;Meanwhile the present invention use simhash algorithms, be judged according to cryptographic Hash it is to be checked File is surveyed, does not need to read file, resource occupation is smaller.
A kind of computer readable storage medium provided by the invention and a kind of computer equipment, with a kind of above-mentioned sensitive document Detection method is for identical inventive concept, advantageous effect having the same.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element Or part is generally identified by similar reference numeral.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is a kind of flow chart of sensitive document detection method provided by the invention.
Specific implementation mode
The embodiment of technical solution of the present invention is described in detail below in conjunction with attached drawing.Following embodiment is only used for Clearly illustrate technical scheme of the present invention, therefore be intended only as example, and the protection of the present invention cannot be limited with this Range.
It should be noted that unless otherwise indicated, technical term or scientific terminology used in this application should be this hair The ordinary meaning that bright one of ordinary skill in the art are understood.
The present invention provides a kind of sensitive document detection method, medium and equipment.Below in conjunction with the accompanying drawings to the reality of the present invention Example is applied to illustrate.
Referring to FIG. 1, Fig. 1 is a kind of flow chart for sensitive document detection method that the specific embodiment of the invention provides, this A kind of sensitive document detection method that embodiment provides, including:
Step S101:The file to be detected that client uploads is obtained, and calculates the Hash to be detected of the file to be detected Value.
Step S102:It is obtained from preset sensitive document library and compares cryptographic Hash;The comparison cryptographic Hash refers to sensitive text The corresponding cryptographic Hash of part.
Step S103:Institute is judged according to the comparison cryptographic Hash and the cryptographic Hash to be detected based on simhash algorithms State whether file to be detected is sensitive document.
Wherein, file to be detected refers to that the needs that client uploads detect whether the file destination for sensitive document.It is sensitive Library refers to the library for the cryptographic Hash for being stored with specified sensitive document.At least one sensitivity can be stored in sensitive document library The cryptographic Hash of file.The cryptographic Hash of the sensitive document stored in sensitive document library is to compare cryptographic Hash.
Before implementing the present invention, it is thus necessary to determine that the sensitive document compared, and the cryptographic Hash of sensitive document is calculated, then should Cryptographic Hash is stored to sensitive document library.
By using simhash algorithms, according to cryptographic Hash and cryptographic Hash to be detected is compared, judge file to be detected whether be Sensitive document, compared to traditional key word detection method, MD5/SHA1 matching detection methods, the present invention can not only improve inspection Testing result can't be influenced moreover, in the case where file to be detected has compared with small modifications by surveying the speed of sensitive document;Meanwhile The present invention uses simhash algorithms, is that file to be detected is judged according to cryptographic Hash, does not need to read file, resource occupation It is smaller.
The present invention is suitable for the scene of any detection sensitive document, and executive agent of the invention is server.
In a specific embodiment provided by the invention, the cryptographic Hash to be detected of the file to be detected is calculated, including: Calculate the cryptographic Hash to be detected of the partial content of the file to be detected.
When calculating the cryptographic Hash to be detected of file to be detected, a part for file can be selected at random, carry out simhash Algorithm detects.For example, file includes 100 information, wherein page 30 or 20 are selected to be calculated.Judging file to be detected When whether being sensitive document, only using the cryptographic Hash to be detected of the contents of the section of calculating and it can also compare cryptographic Hash and carry out pair Than judging whether file to be detected is sensitive document.
In such manner, it is possible to reduce calculation amount, the speed for calculating cryptographic Hash to be detected is improved, whether raising judges file to be detected For the speed of sensitive document.
In a specific embodiment provided by the invention, the different clients corresponds to the different sensitive documents Library;Described obtained from preset sensitive document library compares cryptographic Hash, including:According to the mark of the client, from corresponding It is obtained in default sensitive document library and compares cryptographic Hash.
In the present invention, different clients can be corresponding with different sensitive document libraries.
For example, the comparison cryptographic Hash in the sensitive document library of boss is with regard to fewer, in the sensitive document library of general employee It is relatively more to compare cryptographic Hash.In this way, when detecting the file to be detected that boss uploads, detection speed can be improved, reduces boss The sensitive amount of the file to be detected uploaded.When detecting the file to be detected that employee uploads, text to be detected can be more detected Part avoids the transmission of sensitive information.
When different clients correspond to different sensitive document libraries, is obtained from preset sensitive document library and compare cryptographic Hash When, it can be identified according to the mark of client, be obtained from corresponding sensitive document library and correctly compare cryptographic Hash.
For example, the file to be detected that boss's client uploads is identified with boss, it is corresponding quick from boss according to the mark Corresponding comparison cryptographic Hash is transferred in sense library.
In a specific embodiment provided by the invention, at least one sensitive document is stored in the sensitive document library Cryptographic Hash.
It can be stored with the cryptographic Hash of multiple sensitive documents in sensitive document library, that is, multiple comparisons can be stored with and breathed out Uncommon value.This is all within the scope of the present invention.
It is described to be based on simhash algorithms in a specific embodiment provided by the invention, according to the comparison cryptographic Hash With the cryptographic Hash to be detected, judge whether the file to be detected is sensitive document, including:By the cryptographic Hash to be detected with At least one comparison cryptographic Hash is compared one by one;If there are one the comparison cryptographic Hash and the cryptographic Hash phases to be detected Together, then judge the corresponding file to be detected of the cryptographic Hash to be detected for sensitive document;If the cryptographic Hash to be detected at least One comparison cryptographic Hash is different from, then calculates the cryptographic Hash to be detected and compare the corresponding Hamming distance of cryptographic Hash with described From;Judge whether the Hamming distance is more than distance threshold;If more than then judging that the file to be detected is not sensitive document; If being not more than, judge the file to be detected for sensitive document.
Simhash algorithms are being utilized, are judging whether file to be detected is that the process of sensitive document is:
By cryptographic Hash to be detected with compare cryptographic Hash and compare one by one, can be random and sensitive document in comparison Comparison cryptographic Hash in library is compared;Can also be to be carried out in sequence with the comparison cryptographic Hash in sensitive document library pair Than, wherein the comparison cryptographic Hash in sensitive document library arranges in sequence, and comparison Hash is being transferred from sensitive document library It when value, can one by one transfer according to putting in order, and be compared one by one by described put in order with cryptographic Hash to be detected.
If identical with cryptographic Hash to be detected there are one in multiple comparison cryptographic Hash, judge that cryptographic Hash to be detected corresponds to File to be detected be sensitive document;If cryptographic Hash to be detected is all different with multiple cryptographic Hash that compare, calculate separately to be checked It surveys cryptographic Hash and compares the corresponding Hamming distance of cryptographic Hash with multiple, can respectively be counted according to putting in order in sensitive document library It calculates, can also calculate at random, this is all within the scope of the present invention.
After a Hamming distance has been calculated every time, which is compared with distance threshold, if Hamming distance More than distance threshold, then it is sensitive document to judge file to be detected not;If being not more than, judge file to be detected for sensitive text Part.
For example, there is 10 comparison cryptographic Hash in sensitive document library, then after comparing, 10 compare cryptographic Hash and Hash to be detected Value is all different, then calculates corresponding 10 Hamming distances, if distance threshold is 3, then when the Hamming distance of calculating is less than or equal to 3 When, then show that the file to be detected is sensitive document;When if more than 3, then show that the file to be detected is non-sensitive file.
In a specific embodiment provided by the invention, after obtaining judging result, further include:If judging result is institute It is sensitive document to state file to be detected, then compares cryptographic Hash according to corresponding, rearranges to compare in the sensitive document library and breathe out Uncommon value puts in order.
It is sensitive document when judging result is file to be detected, then calculates the number that the comparison cryptographic Hash hit is hit, According to number is hit, rearranges and compare putting in order for cryptographic Hash in sensitive document library.For example, according to the slave height for hitting number It is ranked up to low.
Wherein, it refers to after file to be detected is compared with the comparison cryptographic Hash hit to hit, and judging result is text to be detected Part is sensitive document.
By the ranking replacement to comparing cryptographic Hash, the higher comparison cryptographic Hash of number will be hit and mention front, Neng Gouti The efficiency of high detection.
In a specific embodiment provided by the invention, after the completion of judgement, further include:It is by the file to be detected The judging result of sensitive document feeds back to the client.
By will determine that result feeds back to client, the file to be detected that oneself upload is understood in client is allowed users to Whether it is sensitive document.
In a specific embodiment provided by the invention, after the completion of judgement, further include:It is by the file to be detected The judging result of sensitive document and the file to be detected are sent to examination & approval end;Receive the control instruction that the examination & approval end is sent; According to the control instruction, the file to be detected is let pass or prevented.
In the present invention, by the way that the file to be detected that testing result is sensitive document is sent to examination & approval end, approving person File to be detected can artificially be examined, and to server send control instruction, server can according to the control instruction, Let pass or prevent file to be detected to pass through.In such manner, it is possible to support artificially to examine, more hommization.
Present invention may apply to files to upload preservation process.For example, client uploads file to be detected, server-side receives After the file to be detected uploaded to client, file to be detected is detected using the step of the present invention, judges that this is to be detected Whether file is sensitive document, if so, will determine that result and the file to be detected are sent to examination & approval end, this is waited in examination & approval end Detection file is examined, and after examination & approval pass through, preserves the file to be detected;If the file to be detected is not sensitive document, directly It connects and preserves file to be detected.
When the upper transmitting file of boss, due to being compared in the corresponding sensitive document library of boss, cryptographic Hash is less, and most files can It is more convenient directly to preserve;When the upper transmitting file of employee, due to compared in the corresponding sensitive document library of employee cryptographic Hash compared with More, most files need to examine, in such manner, it is possible to improve the quality of storage file.
More than, it is a kind of sensitive document detection method provided by the invention.
Second embodiment:
In above-mentioned first embodiment, a kind of sensitive document detection method is provided, in conjunction with above-mentioned first embodiment, originally Invention second embodiment provides a kind of computer readable storage medium, is stored thereon with computer program, the program is by processor A kind of sensitive document detection method that above-mentioned first embodiment provides is realized when execution.
As shown from the above technical solution, computer readable storage medium provided in this embodiment, can be in the control of processor Under system, using simhash algorithms, according to cryptographic Hash and cryptographic Hash to be detected is compared, judge whether file to be detected is sensitive text Part, compared to traditional key word detection method, MD5/SHA1 matching detection methods, it is sensitive that the present invention can not only improve detection The speed of file can't influence testing result moreover, in the case where file to be detected has compared with small modifications;Meanwhile the present invention It is to judge file to be detected according to cryptographic Hash using simhash algorithms, does not need to read file, resource occupation is smaller.
3rd embodiment:
In conjunction with a kind of sensitive document detection method that first embodiment provides, the present invention also provides a kind of computer equipment, Including:Memory, processor and storage are on a memory and the computer program that can run on a processor, the processor are held A kind of sensitive document detection method that above-mentioned first embodiment provides is realized when row described program.
As shown from the above technical solution, computer equipment provided in this embodiment, by using simhash algorithms, according to Cryptographic Hash and cryptographic Hash to be detected are compared, judges whether file to be detected is sensitive document, compared to traditional keyword search Method, MD5/SHA1 matching detection methods, the present invention can not only improve the speed of detection sensitive document, moreover, to be detected In the case that file has compared with small modifications, testing result can't be influenced;Meanwhile the present invention uses simhash algorithms, is according to Kazakhstan Uncommon value judges file to be detected, does not need to read file, resource occupation is smaller.
In the specification of the present invention, numerous specific details are set forth.It is to be appreciated, however, that the embodiment of the present invention can be with It puts into practice without these specific details.In some instances, well known method, structure and skill is not been shown in detail Art, so as not to obscure the understanding of this description.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover in the claim of the present invention and the range of specification.

Claims (10)

1. a kind of sensitive document detection method, which is characterized in that including:
The file to be detected that client uploads is obtained, and calculates the cryptographic Hash to be detected of the file to be detected;
It is obtained from preset sensitive document library and compares cryptographic Hash;The comparison cryptographic Hash refers to the corresponding Hash of sensitive document Value;
Based on simhash algorithms, according to the comparison cryptographic Hash and the cryptographic Hash to be detected, judge that the file to be detected is No is sensitive document.
2. according to the method described in claim 1, it is characterized in that, the cryptographic Hash to be detected of the calculating file to be detected, packet It includes:
Calculate the cryptographic Hash to be detected of the partial content of the file to be detected.
3. according to the method described in claim 1, it is characterized in that, the different clients corresponds to the different sensitive texts Part library;
Described obtained from preset sensitive document library compares cryptographic Hash, including:
According to the mark of the client, is obtained from corresponding default sensitive document library and compare cryptographic Hash.
4. according to the method described in claim 1, it is characterized in that, being stored at least one sensitive text in the sensitive document library The cryptographic Hash of part.
5. according to the method described in claim 4, it is characterized in that, described be based on simhash algorithms, according to the comparison Hash Value and the cryptographic Hash to be detected, judge whether the file to be detected is sensitive document, including:
The cryptographic Hash to be detected described compared cryptographic Hash and compared one by one at least one;
If identical as the cryptographic Hash to be detected there are one the comparison cryptographic Hash, judge that the cryptographic Hash to be detected is corresponding File to be detected is sensitive document;
If the cryptographic Hash to be detected is different from at least one cryptographic Hash that compares, the cryptographic Hash to be detected is calculated The corresponding Hamming distance of cryptographic Hash is compared with described;
Judge whether the Hamming distance is more than distance threshold;
If more than then judging that the file to be detected is not sensitive document;
If being not more than, judge the file to be detected for sensitive document.
6. according to the method described in claim 4, it is characterized in that, further including:
If judging result is that the file to be detected is sensitive document, cryptographic Hash is compared according to corresponding, is rearranged described Putting in order for cryptographic Hash is compared in sensitive document library.
7. according to the method described in claim 1, it is characterized in that, further including:
The judging result that the file to be detected is sensitive document is fed back into the client.
8. according to the method described in claim 1, it is characterized in that, further including:
The file to be detected is sent to examination & approval end for the judging result of sensitive document and the file to be detected;
Receive the control instruction that the examination & approval end is sent;
According to the control instruction, the file to be detected is let pass or prevented.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The method described in one of claim 1-8 is realized when row.
10. a kind of computer equipment, including:Memory, processor and storage can be run on a memory and on a processor Computer program, which is characterized in that the processor realizes the method described in one of claim 1-8 when executing described program.
CN201810176061.1A 2018-03-02 2018-03-02 A kind of sensitive document detection method, medium and equipment Pending CN108491458A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810176061.1A CN108491458A (en) 2018-03-02 2018-03-02 A kind of sensitive document detection method, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810176061.1A CN108491458A (en) 2018-03-02 2018-03-02 A kind of sensitive document detection method, medium and equipment

Publications (1)

Publication Number Publication Date
CN108491458A true CN108491458A (en) 2018-09-04

Family

ID=63341326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810176061.1A Pending CN108491458A (en) 2018-03-02 2018-03-02 A kind of sensitive document detection method, medium and equipment

Country Status (1)

Country Link
CN (1) CN108491458A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647747A (en) * 2019-09-05 2020-01-03 四川大学 False mobile application detection method based on multi-dimensional similarity

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102156689A (en) * 2011-03-31 2011-08-17 百度在线网络技术(北京)有限公司 Method and device for detecting document
CN104657665A (en) * 2015-03-12 2015-05-27 四川神琥科技有限公司 File processing method
CN105138918A (en) * 2015-09-01 2015-12-09 百度在线网络技术(北京)有限公司 Recognition method and device for secure file
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN106874253A (en) * 2015-12-11 2017-06-20 腾讯科技(深圳)有限公司 Recognize the method and device of sensitive information
US20170193230A1 (en) * 2015-05-03 2017-07-06 Microsoft Technology Licensing, Llc Representing and comparing files based on segmented similarity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102156689A (en) * 2011-03-31 2011-08-17 百度在线网络技术(北京)有限公司 Method and device for detecting document
CN104657665A (en) * 2015-03-12 2015-05-27 四川神琥科技有限公司 File processing method
US20170193230A1 (en) * 2015-05-03 2017-07-06 Microsoft Technology Licensing, Llc Representing and comparing files based on segmented similarity
CN105138918A (en) * 2015-09-01 2015-12-09 百度在线网络技术(北京)有限公司 Recognition method and device for secure file
CN106874253A (en) * 2015-12-11 2017-06-20 腾讯科技(深圳)有限公司 Recognize the method and device of sensitive information
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647747A (en) * 2019-09-05 2020-01-03 四川大学 False mobile application detection method based on multi-dimensional similarity

Similar Documents

Publication Publication Date Title
WO2019232549A1 (en) Blockchain-universal document identification
US9141796B2 (en) System and method for detecting malware in file based on genetic map of file
CN103631904B (en) System and method for selecting synchronous or asynchronous file access method during antivirus analysis
US20130086556A1 (en) System for ensuring comprehensiveness of requirements testing of software applications
CN106355092B (en) System and method for optimizing anti-virus measurement
US20190014100A1 (en) Secure token passing via hash chains
CN103220352B (en) Terminal, server, file storage system and file storage method
Fry et al. A dataset and an approach for identity resolution of 38 million author ids extracted from 2b git commits
US20210004583A1 (en) Revealing Content Reuse Using Coarse Analysis
CN107729227A (en) Application testing range determining method, system, server and storage medium
US20150064684A1 (en) Assessment of curated content
CN109416625A (en) Text is carried out in the feeding of database table, text file and data to add salt
CN109492118A (en) A kind of data detection method and detection device
CN109446837A (en) Text checking method, equipment and readable storage medium storing program for executing based on sensitive information
Liu et al. Automatic, highly accurate app permission recommendation
CN109492399A (en) Risk file test method, device and computer equipment
US9760842B2 (en) Operation target management apparatus and non-transitory computer readable medium
CN108491458A (en) A kind of sensitive document detection method, medium and equipment
US9292698B1 (en) Method and system for remote forensic data collection
Simon Stratification and partial ascertainment of biomarker value in biomarker-driven clinical trials
KR101850650B1 (en) Portable storage device perfoming a ransomeware detection and method for the same
JP2009230257A (en) Approval system and approval program
CN108021951A (en) A kind of method of document detection, server and computer-readable recording medium
Baker The summary test tradeoff: a new measure of the value of an additional risk prediction marker
Alamilla et al. Seismicity assessment using earthquake catalogues with uncertain and incomplete data: probabilistic formulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180904

RJ01 Rejection of invention patent application after publication