🗃️
PropScreen
  • PropScreen Overview
  • Introduction
    • The Problem
    • Problem Importance and Impact
    • Solution Overview
      • How Propscreen Addresses the Problem
      • Use Cases
      • User Personas
  • System Architecture
    • Core Components of Propscreen
      • PropScreen's Checks
      • Context Strings Database
      • Hashed Organizational Sensitive Information
      • Interdiction Log Database (Reports)
    • Architecture Overview
    • Sequence Diagrams by Use Case
      • Use Case 1 Sensitive Information Disclosure Interdiction
      • Use Case 2 Logging of Interdiction Events
  • Project Considerations
    • Threat Modeling
      • Key Threats
      • Key Threat 1
      • Key Threat 2
      • Key Threat 3
    • Secure by Design
    • Alternative Solutions
      • NER and Regex Based Scans
      • Traditional Data Loss Prevention
    • PropScreen's LLM Implementation
  • The Proof of Concept
    • Demo Video
    • Try the Proof of Concept
  • Going Forward...
    • SIEM Integration
    • Role Based Access Control Dependent Response Filtering
    • The Good, The Bad, and the Learning
Powered by GitBook
On this page
  1. System Architecture
  2. Core Components of Propscreen

Context Strings Database

The Context Strings Database's purpose is store the context strings that the organization has determined to use in the Context Strings Check. Since there is no sensitive information stored in this database, the data can be saved in the cleartext and if the database was compromised there would be no breach in confidentiality.

The schema for the Context Strings Database is simple, one table with only one column which stores the context strings. See the notional example below to better illustrate the schema, in this scenario the purpose of the context words is to help identify responses that could lead to the disclosure of client account numbers, which this organization has deemed to be sensitive information that should not be disclosed by their LLM:

context_string

account numbers

account

client numbers

client

client list

clients

client report

report

PreviousPropScreen's ChecksNextHashed Organizational Sensitive Information

Last updated 10 months ago