Method and device for providing and tracking sensitive information

A sensitive information, the only technology, applied in computer security devices, instruments, electronic digital data processing, etc., can solve problems such as irreparable losses, insufficient internal threat, and difficult authority control

Active Publication Date: 2018-05-22
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the large number of internal personnel in e-commerce enterprises, authority control is relatively difficult. Once sensitive information leaks, it is often difficult to trace the source of the leak, resulting in insufficient internal threat and irreparable losses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for providing and tracking sensitive information
  • Method and device for providing and tracking sensitive information
  • Method and device for providing and tracking sensitive information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0026] figure 1 is a schematic diagram of main steps of the method for providing and tracking sensitive information according to an embodiment of the present invention.

[0027] The method for providing and tracking sensitive information in the embodiment of the present invention mainly includes the following steps S11 to S14.

[0028] Step S11: Receive a caller's call r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for providing and tracking sensitive information. Relevant information of a caller is added into the sensitive information, and the calling situation of the sensitive information by a relevant person can be tracked under the situation of not influencing the sensitive information, so that a leakage source can be tracked when a caller leaks the sensitiveinformation. The method for providing and tracking sensitive information comprises the following steps: receiving a calling request of the caller about the sensitive information, wherein the calling request carries identity authentication data of the caller; verifying the permission of the caller according to the identity authentication data, generating a unique serial number of the caller when the caller has corresponding permission, and determining an information text requested by the calling request; converting the information text, so that the unique serial number is included in the converted information text in a ciphertext form without influencing reading of the information text; and returning the converted information text to the caller, wherein the unique serial number of the corresponding caller can be extracted from the converted information text.

Description

technical field [0001] The invention relates to the technical field of computers and software thereof, in particular to a method and device for providing and tracking sensitive information. Background technique [0002] In the information age, the leakage of sensitive information has caused great information security risks to enterprise systems, so the management of sensitive information cannot be ignored. The so-called sensitive information refers to all information that will be detrimental to the implementation of national interests or government programs, or detrimental to the individual's legal right to privacy when it is lost, improperly used, or accessed or modified without authorization. [0003] For enterprise systems, such as e-commerce companies, sensitive information includes but is not limited to the following information: user name, user contact number, delivery address, order amount, etc. Since e-commerce companies usually have strict authority control over ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12G06F21/62
CPCH04L61/3015H04L63/0428H04L63/08G06F21/6218G06F21/6245H04L2101/365
Inventor 钟颖
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products