发明名称 Method and system for hiding sensitive data in log files
摘要 An approach for hiding sensitive data in log files is provided. The approach uses a background program embedded within an operating system. The background program intercepts a write operation of an application and, in response to determining that the write operation is for a log file, gets content of the write operation. The background program checks a knowledge base that comprises information for the sensitive data and identifies the sensitive data in the content of the write operation. The background program masks the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked. In the log file, the background program writes modified content in which the sensitive data is masked.
申请公布号 US9589146(B2) 申请公布日期 2017.03.07
申请号 US201414258294 申请日期 2014.04.22
申请人 International Business Machines Corporation 发明人 Averdunk Ingo J.;Della Corte Gianluca;Proietti Stefano;Sgro Antonio M.
分类号 G06F7/04;G06F11/30;G06F21/62 主分类号 G06F7/04
代理机构 代理人 Li Edward P.
主权项 1. A computer-implemented method for hiding sensitive data in log files, the method comprising: intercepting, by a log interceptor for hiding the sensitive data in the log files, a write operation of an application, wherein the log interceptor is embedded within an operating system and runs as a daemon in background, wherein the log interceptor comprises an analytics engine and the analytics engine provides a confidence index that determines whether patterns and information in message content of the write operation are sensitive; getting, by the log interceptor, content of the write operation, in response to determining that the write operation is for a log file; checking, by the log interceptor, a knowledge base, the knowledge base comprising information for the sensitive data, the information for the sensitive data including names of log files that applications write and customer sensitive information; identifying, by the log interceptor, the sensitive data in the content of the write operation, by using the confidence index; masking, by the log interceptor, the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked; writing, by the log interceptor, in the log file, modified content in which the sensitive data is masked; and updating, by the log interceptor, the knowledge base, by storing information of masking the sensitive data in the write operation.
地址 Armonk NY US