CN113139186A - Personal information security audit evaluation system - Google Patents

Personal information security audit evaluation system Download PDF

Info

Publication number
CN113139186A
CN113139186A CN202110399125.6A CN202110399125A CN113139186A CN 113139186 A CN113139186 A CN 113139186A CN 202110399125 A CN202110399125 A CN 202110399125A CN 113139186 A CN113139186 A CN 113139186A
Authority
CN
China
Prior art keywords
module
information
item
detection
app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110399125.6A
Other languages
Chinese (zh)
Inventor
李刚
杨海龙
霍海龙
刘哲
李亮
董柏希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kaiyuan Huachuang Information Technology Co ltd
Original Assignee
Beijing Kaiyuan Huachuang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kaiyuan Huachuang Information Technology Co ltd filed Critical Beijing Kaiyuan Huachuang Information Technology Co ltd
Priority to CN202110399125.6A priority Critical patent/CN113139186A/en
Publication of CN113139186A publication Critical patent/CN113139186A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Virology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The utility model provides a personal information security audit evaluation system, the basic information who inputs privacy policy text and treat APP that detects in advance to the APP is treated to the filling, includes: a system information initialization module: the system is used for objectifying input information and mounting detection items to detect the information item by personnel to be detected; and (4) a strip-by-strip auditing module: the system information initialization module is in communication connection with a system information initialization module so as to prepare for a detector to open detection items one by one and detect the detection items; a report output module: and the audit module is in communication connection with the item-by-item audit module and is used for exporting the detection result according to a specified report format for the user to use after all the detection items are audited. The invention adopts the algorithm of keyword hit and keyword association, quickly finds the content indicated by the specified item, is convenient for detection personnel to more accurately judge whether the personal information violation condition exists or not, and finally arranges the content into a detection report for the correction of an owner unit.

Description

Personal information security audit evaluation system
Technical Field
The invention relates to the technical field of information security assessment, in particular to a personal information security audit assessment system.
Background
In recent years, the phenomenon of mobile application security and illegal collection of personal information is not optimistic, and the personal information security is always a focus of people's attention and is an important part to be strengthened in the mobile application security work. In recent years, experience and law of personal information detection and evaluation work for APP illegal rule violation collection are provided, reference is provided for behaviors of monitoring and managing departments to determine that APP illegal rule violation collection uses personal information, and guidance is provided for APP operator self-checking and self-correction and netizen social supervision.
At present, a detection unit mainly carries out a personal information security assessment mode on APP by a manual 'naked eye' walk-through mode, and particularly sensitive information in privacy policies and messages. This method works inefficiently, and there is a certain probability of error evaluation. Especially, under the condition that the privacy policy and the message structure change, a certain amount of floating can occur in the probability of manual error.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background technology, the invention provides a personal information security audit evaluation system, which adopts an algorithm of keyword hit and keyword association, quickly finds the content indicated by an appointed item, is convenient for detection personnel to more accurately judge whether the personal information illegal condition exists, and finally arranges the content into a detection report for the adjustment of an owner unit.
(II) technical scheme
The invention provides a personal information security audit evaluation system, which inputs a privacy policy text and basic information of an APP to be detected in advance, and fills the APP to be detected, and comprises the following steps:
a system information initialization module: the system is used for objectifying input information and mounting detection items to detect the information item by personnel to be detected;
and (4) a strip-by-strip auditing module: the system information initialization module is in communication connection with a system information initialization module so as to prepare for a detector to open detection items one by one and detect the detection items;
a report output module: and the audit module is in communication connection with the item-by-item audit module and is used for exporting the detection result according to a specified report format for the user to use after all the detection items are audited.
Preferably, the system information initialization module comprises an input information objectification module, a detection item mounting module and an APK plug-in pull-up module.
Preferably, the item-by-item auditing module comprises an item-by-item record auditing module and an APP filling module.
Preferably, the report output module comprises a data sorting module and a report export module.
Preferably, when the privacy policy text is detected, an algorithm of 'hit of the privacy policy keywords and surrounding of the keywords in association' is called to prompt a user that the information is covered; when the project of the message needs to be detected, trying to pull up the APP to be detected and a message viewing tool for auditing; and when detecting whether the SDK is contained, pulling up the SDK viewing tool, and auditing by detection personnel.
Compared with the prior art, the technical scheme of the invention has the following beneficial technical effects: .
Drawings
Fig. 1 is a system block diagram of a personal information security audit evaluation system according to the present invention.
Fig. 2 is a structural block diagram of a system information initialization module in the personal information security audit evaluation system according to the present invention.
Fig. 3 is a block diagram of a structure of a piece-by-piece audit module in the personal information security audit evaluation system provided by the present invention.
FIG. 4 is a block diagram of a report output module in a personal information security audit evaluation system according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1 to 4, the system for auditing and evaluating personal information security according to the present invention inputs a privacy policy text and basic information of an APP to be detected in advance, and fills the APP to be detected, including:
a system information initialization module: the system is used for objectifying input information and mounting detection items to detect the information item by personnel to be detected;
and (4) a strip-by-strip auditing module: the system information initialization module is in communication connection with a system information initialization module so as to prepare for a detector to open detection items one by one and detect the detection items;
a report output module: and the audit module is in communication connection with the item-by-item audit module and is used for exporting the detection result according to a specified report format for the user to use after all the detection items are audited.
In an optional embodiment, the system information initialization module comprises an input information objectification module, a detection item mounting module and an APK plug-in pull-up module.
In an optional embodiment, the item-by-item audit module includes an item-by-item record audit module and an APP filling module, and the APP filling module is used for filling the APP to be detected.
In an alternative embodiment, the report output module includes a data marshalling module and a report derivation module.
The data sorting module sorts the data, and the sorted data is exported by the report export module.
In an optional embodiment, when the privacy policy text is detected, an algorithm of 'privacy policy keyword hit and keyword association surrounding' is called to prompt a user that the piece of information is covered; when the project of the message needs to be detected, trying to pull up the APP to be detected and a message viewing tool for auditing; and when detecting whether the SDK is contained, pulling up the SDK viewing tool, and auditing by detection personnel.
The invention adopts the algorithm of keyword hit and keyword association, quickly finds the content indicated by the specified item, is convenient for detection personnel to more accurately judge whether the personal information violation condition exists or not, and finally arranges the content into a detection report for the correction of an owner unit.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (5)

1. The utility model provides a personal information security audit evaluation system which characterized in that, inputs privacy policy text and the basic information who waits to detect APP in advance to the APP is waited to the filling includes:
a system information initialization module: the system is used for objectifying input information and mounting detection items to detect the information item by personnel to be detected;
and (4) a strip-by-strip auditing module: the system information initialization module is in communication connection with a system information initialization module so as to prepare for a detector to open detection items one by one and detect the detection items;
a report output module: and the audit module is in communication connection with the item-by-item audit module and is used for exporting the detection result according to a specified report format for the user to use after all the detection items are audited.
2. The system of claim 1, wherein the system information initialization module comprises an input information objectification module, a test item mounting module and an APK plug-in pull-up module.
3. The system of claim 2, wherein the audit module includes a log audit module and an APP filing module.
4. The system of claim 3, wherein the report output module comprises a data marshalling module and a report export module.
5. The system of claim 1, wherein when detecting a privacy policy document, an algorithm of "privacy policy keyword hit and keyword association surround" is called to prompt a user that the piece of information is covered; when the project of the message needs to be detected, trying to pull up the APP to be detected and a message viewing tool for auditing; and when detecting whether the SDK is contained, pulling up the SDK viewing tool, and auditing by detection personnel.
CN202110399125.6A 2021-04-14 2021-04-14 Personal information security audit evaluation system Pending CN113139186A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110399125.6A CN113139186A (en) 2021-04-14 2021-04-14 Personal information security audit evaluation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110399125.6A CN113139186A (en) 2021-04-14 2021-04-14 Personal information security audit evaluation system

Publications (1)

Publication Number Publication Date
CN113139186A true CN113139186A (en) 2021-07-20

Family

ID=76812480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110399125.6A Pending CN113139186A (en) 2021-04-14 2021-04-14 Personal information security audit evaluation system

Country Status (1)

Country Link
CN (1) CN113139186A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344657A (en) * 2018-12-07 2019-02-15 百度在线网络技术(北京)有限公司 Privacy risk appraisal procedure and device
CN109598127A (en) * 2018-12-07 2019-04-09 百度在线网络技术(北京)有限公司 Privacy risk appraisal procedure and device
CN109739748A (en) * 2018-12-13 2019-05-10 北京小米移动软件有限公司 Close rule detection method and device
CN110414241A (en) * 2019-08-05 2019-11-05 深圳市网安计算机安全检测技术有限公司 Privacy policy detection method, device, computer equipment and storage medium
CN111753322A (en) * 2020-07-03 2020-10-09 烟台中科网络技术研究所 Automatic verification method and system for mobile App permission list
CN111835756A (en) * 2020-07-10 2020-10-27 深圳市网安计算机安全检测技术有限公司 APP privacy compliance detection method and device, computer equipment and storage medium
CN112199506A (en) * 2020-11-10 2021-01-08 支付宝(杭州)信息技术有限公司 Information detection method, device and equipment for application program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344657A (en) * 2018-12-07 2019-02-15 百度在线网络技术(北京)有限公司 Privacy risk appraisal procedure and device
CN109598127A (en) * 2018-12-07 2019-04-09 百度在线网络技术(北京)有限公司 Privacy risk appraisal procedure and device
CN109739748A (en) * 2018-12-13 2019-05-10 北京小米移动软件有限公司 Close rule detection method and device
CN110414241A (en) * 2019-08-05 2019-11-05 深圳市网安计算机安全检测技术有限公司 Privacy policy detection method, device, computer equipment and storage medium
CN111753322A (en) * 2020-07-03 2020-10-09 烟台中科网络技术研究所 Automatic verification method and system for mobile App permission list
CN111835756A (en) * 2020-07-10 2020-10-27 深圳市网安计算机安全检测技术有限公司 APP privacy compliance detection method and device, computer equipment and storage medium
CN112199506A (en) * 2020-11-10 2021-01-08 支付宝(杭州)信息技术有限公司 Information detection method, device and equipment for application program

Similar Documents

Publication Publication Date Title
CN107577939B (en) Data leakage prevention method based on keyword technology
CA2900527C (en) Identifying and preventing leaks of sensitive information
CN108011809A (en) Anti-data-leakage analysis method and system based on user behavior and document content
CN110990836B (en) Code leakage detection system and method based on natural language processing technology
CN103957205A (en) Trojan horse detection method based on terminal traffic
US20150113651A1 (en) Spammer group extraction apparatus and method
CN110851872A (en) Risk assessment method and device for private data leakage
CN106027520A (en) Method and device for detecting and processing stealing of website accounts
CN105528558B (en) A kind of detection method and device of private communication channel communication
CN110866108A (en) Sensitive data detection system and detection method thereof
CN103365963B (en) Database audit system compliance method for quickly detecting
CN106127459A (en) A kind of intelligence seal and measure of supervision thereof
CN111915331A (en) Enterprise credit investigation data management method and system based on block chain
CN109684863A (en) Data leakage prevention method, device, equipment and storage medium
CN110337107A (en) A kind of fraud text message intelligent monitoring alarm device
CN110020161B (en) Data processing method, log processing method and terminal
CN105763555A (en) Website risk control server and method and client
CN117592092A (en) Secret checking method and system for database content
CN113139186A (en) Personal information security audit evaluation system
CN103699828A (en) Information security management method
CN106780254A (en) Traffic safety analysis method and terminal device
CN102571723A (en) Data transmission method and system approved by third party
CN202404694U (en) Adaptive disturbance signal identification module of distributing type optical fiber sensing application system
CN109873786A (en) For the safety situation evaluation system of multi-source heterogeneous information cloud platform
CN102024104A (en) Computer safety inspecting and scoring method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 202, floor 2, No. 18, Jianshe Road, Kaixuan street, Liangxiang, Fangshan District, Beijing 102400

Applicant after: Kaiyuan Huachuang Technology (Group) Co.,Ltd.

Address before: No.0697, building a, Daxing airport area, pilot Free Trade Zone, No.1 Qianping Road, Lixian Town, Daxing District, Beijing, 102604

Applicant before: Beijing Kaiyuan Huachuang Information Technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210720