Information leakage source identifying method
First Claim
1. A database access monitoring apparatus, comprising:
- a search request acquiring section to search a database together with information identifying a search requester;
a search processing section for searching the database based on the search request acquired by the search request acquiring section as well as mixing dummy data into the search result;
a use history creating section for creating information indicating a relationship between the information identifying the search requester which has been acquired by the search request acquiring section and the dummy data mixed into the search result by the search processing section; and
a search result outputting section for outputting to the search requester the search result into which the dummy data has been mixed by the search processing section.
1 Assignment
0 Petitions
Accused Products
Abstract
A leakage source can be identified when personal information is leaked to unauthorized entities. A search request section acquires a request to search a database together with information to identify the search requester. A search processing section searches the database and mixes dummy data into the search result. A search result section outputs the search result into which the dummy data is mixed to the search requester. A use history creates information indicating a relationship between information identifying the search requester and the dummy data mixed into the search result. Another section controls the search result acquiring section, the search processing section, the search result outputting section and the use history creating section.
33 Citations
15 Claims
-
1. A database access monitoring apparatus, comprising:
-
a search request acquiring section to search a database together with information identifying a search requester;
a search processing section for searching the database based on the search request acquired by the search request acquiring section as well as mixing dummy data into the search result;
a use history creating section for creating information indicating a relationship between the information identifying the search requester which has been acquired by the search request acquiring section and the dummy data mixed into the search result by the search processing section; and
a search result outputting section for outputting to the search requester the search result into which the dummy data has been mixed by the search processing section. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A database access monitoring method for a computer to monitor access to a database, comprising the steps of:
-
acquiring a request to search the database together with information identifying a search requester;
searching the database based on said search request;
mixing dummy data into a result of searching the database;
storing information indicating a relationship between said information identifying said search requester and said dummy data mixed into the search result; and
outputting to said search requester said search result in which said dummy data is mixed.
-
-
11. A computer program product for causing a computer to realize functions of:
-
acquiring a request to search a database together with information identifying a search requester;
searching the database based on said acquired search request;
mixing dummy data into a search result; and
creating information indicating a relationship between said information identifying said search requester and said dummy data mixed into said search result. - View Dependent Claims (12, 13, 14, 15)
-
Specification