CN106407843A - Data desensitization method and data desensitization device - Google Patents

Data desensitization method and data desensitization device Download PDF

Info

Publication number
CN106407843A
CN106407843A CN201610902955.5A CN201610902955A CN106407843A CN 106407843 A CN106407843 A CN 106407843A CN 201610902955 A CN201610902955 A CN 201610902955A CN 106407843 A CN106407843 A CN 106407843A
Authority
CN
China
Prior art keywords
data
desensitization
access request
source
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610902955.5A
Other languages
Chinese (zh)
Inventor
林长家
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE ICT Technologies Co Ltd
Original Assignee
ZTE ICT Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE ICT Technologies Co Ltd filed Critical ZTE ICT Technologies Co Ltd
Priority to CN201610902955.5A priority Critical patent/CN106407843A/en
Publication of CN106407843A publication Critical patent/CN106407843A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data desensitization method and a data desensitization device. The data desensitization method comprises the steps of: receiving a data access request, the data access request including the identity of a visitor; determining a target data source to be visited according to the data access request, and determining a desensitization strategy for the target data source according to the identity included in the data access request; desensitizing the target data source according to the determined desensitization strategy; and responding to the data access request based on the desensitized data. The technical solution can automatically shield sensitive information in service data to guarantee data security, and can realize automation of the data calling process to improve the operating efficiency, thereby meeting the requirements of audit and supervision departments.

Description

Data desensitization method data desensitization device
Technical field
The present invention relates to technical field of data processing, take off in particular to a kind of data desensitization method and a kind of data Quick device.
Background technology
At present, data-privacy power has become one of many regulations by supervision industry, and meanwhile, protection sensitive data is also one Item business practice well.Especially under the scene of big data, how to realize the automation of data call process, with true Protect the sensitive information in automatic shield business datum, ensure data safety, lifting operation efficiency, meet audit and supervision department will Asking etc. becomes technical problem urgently to be resolved hurrily.
Content of the invention
The present invention is based at least one above-mentioned technical problem it is proposed that a kind of new data desensitisation regimens, can oneself Sensitive information in dynamic shielding business datum, has ensured data safety, and is capable of the automation of data call process, carries Rise operating efficiency, thus being conducive to meeting the requirement of audit and supervision department.
In view of this, according to the first aspect of the invention it is proposed that a kind of data desensitization method, including:Receiving data is visited Ask request, in described data access request, include the identity of visitor;According to described data access request, determine and wait to visit The target data source asked, and according to the identity comprising in described data access request, determine to described target data source Desensitization strategy;Desensitization strategy according to determining carries out desensitization process to described target data source;Based on the data after desensitization process, Respond described data access request.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off The quick application scenarios calling.
It is preferable that described desensitization strategy includes in technique scheme:With the body comprising in described data access request The corresponding sensitive data matching strategy of part mark, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user Sense Data Matching strategy can identical it is also possible to different.
It is preferable that being carried out at desensitization to described target data source according to the desensitization strategy determining in technique scheme The step of reason, specifically includes:According to the described sensitive data matching strategy comprising in described desensitization strategy, to described target data Data in source is mated, to determine the sensitive data in described target data source;According to comprise in described desensitization strategy Described desensitization algorithm, carries out desensitization process to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role, Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible Property.
It is preferable that described desensitization algorithm includes the following combination of any one or more in any of the above-described technical scheme:Right Sensitive data is replaced process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on random words Symbol displacement sensitive data, User Defined desensitization algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral, Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off Quick algorithm is user-defined other desensitization algorithm.
It is preferable that being carried out to described target data source according to the desensitization strategy determining in any of the above-described technical scheme After the step of desensitization process, also include:Generate the source of new data independent of described target data source;Described based on desensitization process Data afterwards, the step responding described data access request, specifically include:Based on described source of new data, respond described data and visit Ask request.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter And ensure that data in former data source unaffected it is ensured that data safety in former data source.
It is preferable that the step of described receiving data access request in any of the above-described technical scheme, specifically include:It is based on The described data access that the proxy gateway reception being deployed on back end is sent by data base query language and/or order line Request.
In this technical scheme, the data access request being sent by data base query language can be by JDBC The data access request that (Java Data Base Connectivity, Java database connects) mode sends.
The device it is also proposed that a kind of data desensitizes according to the second aspect of the invention, including:Receiving unit, for receiving Data access request, includes the identity of visitor in described data access request;Determining unit, for according to described number According to access request, determine target data source to be visited, and according to the identity comprising in described data access request, determine Desensitization strategy to described target data source;Processing unit, for the desensitization strategy that determined according to described determining unit to described Target data source carries out desensitization process;Response unit, please for based on the data after desensitization process, responding described data access Ask.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off The quick application scenarios calling.
It is preferable that described desensitization strategy includes in technique scheme:With the body comprising in described data access request The corresponding sensitive data matching strategy of part mark, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user Sense Data Matching strategy can identical it is also possible to different.
In technique scheme it is preferable that described processing unit specifically for:According to comprise in described desensitization strategy Described sensitive data matching strategy, mates to the data in described target data source, to determine in described target data source Sensitive data;According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role, Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible Property.
It is preferable that described desensitization algorithm includes the following combination of any one or more in any of the above-described technical scheme:Right Sensitive data is replaced process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on random words Symbol displacement sensitive data, User Defined desensitization algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral, Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off Quick algorithm is user-defined other desensitization algorithm.
It is preferable that described data desensitization device also includes in any of the above-described technical scheme:Signal generating unit, for After described processing unit carries out desensitization process according to the desensitization strategy determining to described target data source, generate independent of described The source of new data of target data source;Described response unit specifically for:Based on described source of new data, responding described data access please Ask.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter And ensure that data in former data source unaffected it is ensured that data safety in former data source.
In any of the above-described technical scheme it is preferable that described receiving unit specifically for:It is based on and be deployed on back end The proxy gateway described data access request that sent by data base query language and/or order line of reception.
In this technical scheme, the data access request being sent by data base query language can be by JDBC mode The data access request sending.
By above technical scheme, data safety can be ensured with the sensitive information in automatic shield business datum, and Be capable of the automation of data call process, improve operating efficiency, thus be conducive to meet audit and supervision department will Ask.
Brief description
Fig. 1 shows the schematic flow sheet of data desensitization method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of data desensitization device according to an embodiment of the invention;
Fig. 3 shows the interface schematic diagram disposing gateway A gent according to an embodiment of the invention;
Fig. 4 shows that the interface adding Hive Agent according to an embodiment of the invention in Hadoop cluster is illustrated Figure;
Fig. 5 shows the interface schematic diagram of configuration data desensitization strategy according to an embodiment of the invention;
Fig. 6 shows the schematic diagram accessing Hive database according to an embodiment of the invention by JDBC mode;
Fig. 7 shows the schematic diagram accessing Hive database according to an embodiment of the invention by command line mode;
Fig. 8 shows the schematic diagram data before non-according to an embodiment of the invention desensitization process;
Fig. 9 shows the signal according to an embodiment of the invention sensitive field in data being carried out after desensitization process Figure.
Specific embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specifically real Mode of applying is further described in detail to the present invention.It should be noted that in the case of not conflicting, the enforcement of the application Feature in example and embodiment can be mutually combined.
Elaborate a lot of details in the following description in order to fully understand the present invention, but, the present invention also may be used To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not described below Specific embodiment restriction.
Fig. 1 shows the schematic flow sheet of data desensitization method according to an embodiment of the invention.
As shown in figure 1, data desensitization method according to an embodiment of the invention, including:
Step S10, receiving data access request, include the identity of visitor in described data access request.
Step S12, according to described data access request, determines target data source to be visited, and is visited according to described data Ask the identity comprising in request, determine the desensitization strategy to described target data source.
Step S14, the desensitization strategy according to determining carries out desensitization process to described target data source.
Step S16, based on the data after desensitization process, responds described data access request.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off The quick application scenarios calling.
Further, described desensitization strategy includes:Corresponding with the identity comprising in described data access request Sensitive data matching strategy, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user Sense Data Matching strategy can identical it is also possible to different.
Further, above-mentioned steps S14 specifically include:According to the described sensitive data coupling comprising in described desensitization strategy Strategy, mates to the data in described target data source, to determine the sensitive data in described target data source;According to institute State the described desensitization algorithm comprising in desensitization strategy, desensitization process is carried out to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role, Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible Property.
Further, described desensitization algorithm includes the following combination of any one or more:Place is replaced to sensitive data Manage, sensitive data is encrypted, sensitive data being carried out with Fuzzy Processing, based on random character displacement sensitive data, use The self-defined desensitization in family algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral, Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off Quick algorithm is user-defined other desensitization algorithm.
Further, also include after above-mentioned steps S14:Generate the source of new data independent of described target data source; Step S16 specifically includes:Based on described source of new data, respond described data access request.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter And ensure that data in former data source unaffected it is ensured that data safety in former data source.
Further, step S10 specifically includes:Received based on the proxy gateway being deployed on back end and pass through database The described data access request that query language and/or order line send.
In this technical scheme, the data access request being sent by data base query language can be by JDBC mode The data access request sending.
Fig. 2 shows the schematic block diagram of data desensitization device according to an embodiment of the invention.
As shown in Fig. 2 according to an embodiment of the invention data desensitization device 200, including:Receiving unit 202, determination are single Unit 204, processing unit 206 and response unit 208.
Wherein, receiving unit 202 is used for receiving data access request, includes visitor's in described data access request Identity;Determining unit 204 is used for according to described data access request, determines target data source to be visited, and according to institute State the identity comprising in data access request, determine the desensitization strategy to described target data source;Processing unit 206 is used for Desensitization process is carried out to described target data source according to the desensitization strategy that described determining unit 204 determines;Response unit 208 is used for Based on the data after desensitization process, respond described data access request.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off The quick application scenarios calling.
Further, described desensitization strategy includes:Corresponding with the identity comprising in described data access request Sensitive data matching strategy, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user Sense Data Matching strategy can identical it is also possible to different.
Further, described processing unit 206 specifically for:According to the described sensitive data comprising in described desensitization strategy Matching strategy, mates to the data in described target data source, to determine the sensitive data in described target data source;Root According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role, Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible Property.
Further, described desensitization algorithm includes the following combination of any one or more:Place is replaced to sensitive data Manage, sensitive data is encrypted, sensitive data being carried out with Fuzzy Processing, based on random character displacement sensitive data, use The self-defined desensitization in family algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral, Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off Quick algorithm is user-defined other desensitization algorithm.
Further, described data desensitization device 200 also includes:Signal generating unit 210, in described processing unit After 206 carry out desensitization process according to the desensitization strategy determining to described target data source, generate independent of described target data The source of new data in source;Described response unit 208 specifically for:Based on described source of new data, respond described data access request.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter And ensure that data in former data source unaffected it is ensured that data safety in former data source.
Further, described receiving unit 202 specifically for:Received logical based on the proxy gateway being deployed on back end Cross the described data access request that data base query language and/or order line send.
In this technical scheme, the data access request being sent by data base query language can be by JDBC mode The data access request sending.
(the being a kind of distributed system architecture) node with back end as Hadoop below, and be used for accessing Hive Technical scheme is described in detail as a example (Tool for Data Warehouse based on Hadoop).
Technical scheme is mainly disposes proxy gateway on the Hadoop node that data (as big data) stores HiveAgent, for being intercepted and management and control to the access of back end.Specifically, technical scheme can be known Not different access users, and according to user come the strategy of configuration access data, desensitized based on the business object of integrality Operation is not it is ensured that destroy ambiguity and the business association of data.Wherein it is possible to be desensitized based on multiple desensitization algorithms Process, such as replacement, encryption, random character displacement, Fuzzy Processing, user-defined desensitization algorithm etc..Meanwhile, the skill of the present invention Art scheme also supports that extraction-type does not land desensitization (the transient data in internal memory or in network transmission being desensitized) and just 2 kinds of patterns of ground desensitization (the data after persistence process being desensitized).And survey can automatically be executed by scheduler Examination data pick-up and desensitization work, reduce Human disturbance it is achieved that perfect user authority management strategy, can be for difference Role, different user are carrying out priority assignation.
Specifically, mainly include the following steps that:
Step 1:Gateway A gent is disposed on the back end of Hadoop, after deployment gateway A gent, can control various Mode accesses the data storage of Hadoop cluster.Wherein, the interface schematic diagram of deployment gateway A gent is as shown in figure 3, disposing net Schematic diagram after the Agent of pass is as shown in figure 4, with the addition of Hive Agent in Hadoop cluster.
Step 2:Configure different data desensitization strategies according to user.Specifically, need to visit according to different user configurings Ask the Hive table of control and arrange into row constraint.As shown in Figure 5:Expression represents shielding policing rule;Description table Sample example;Select Table represents selection source Hive table;Columns represents the field that Hive table is affected.
Wherein, for different users, the data desensitization strategy of configuration can be different, that is, be directed to the need of different user configuration Want the Hive table of access control and the row can be different.
Step 3:Big data storage is accessed by different access modes, realizes different data desensitization strategies.
Wherein, access mode includes:
Mode one:As shown in fig. 6, Hive is accessed by JDBC mode.Wherein, the HiveJdbcUtil shown in Fig. 6 is Link queries Hive sample, links Hive database by this JDBC mode, through the Agent mode that desensitizes, execution The tableName table of involved inquiry during selectData method, can be parsed, correspond to set select in Fig. 5 Table table is corresponding with Columns field to carry out desensitization process.
Mode two:By command-line access Hive.It is illustrated in figure 7 by order line link queries Hive sample, pass through This command line mode links Hive database, through the Agent mode that desensitizes, during execution select*from hiveomm, can solve The tableName table of the involved inquiry of analysis, corresponds to set select Table table in Fig. 5 and Columns field phase Correspondence carries out desensitization process.
It can be seen that, in step 3, user can access Hive database by different access modes, and then gateway Agent can determine, according to the data desensitization strategy configuring for different user, the sensitive data needing desensitization process, and then Carry out desensitization process.Wherein, after the Table table that need desensitize and Columns row carry out desensitization process, can be by desensitization The result of reason exports in self-defined new table, it is to avoid clash with source table.
Data before being illustrated in figure 8 without desensitization process, after desensitization process, as shown in figure 9, can be right Sensitive field is desensitized, so can sensitive information in automatic shield business datum, ensured data safety.
Technical scheme is described in detail above in association with accompanying drawing, the present invention proposes a kind of new data desensitization side Case, can have been ensured data safety, and has been capable of data call process with the sensitive information in automatic shield business datum Automation, improves operating efficiency, thus being conducive to meeting the requirement of audit and supervision department.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (12)

1. a kind of data desensitization method is it is characterised in that include:
Receiving data access request, includes the identity of visitor in described data access request;
According to described data access request, determine target data source to be visited, and comprise according in described data access request Identity, determine desensitization strategy to described target data source;
Desensitization strategy according to determining carries out desensitization process to described target data source;
Based on the data after desensitization process, respond described data access request.
2. data desensitization method according to claim 1 is it is characterised in that described desensitization strategy includes:
The sensitive data matching strategy corresponding with the identity comprising in described data access request, and it is directed to described mesh The desensitization algorithm of the sensitive data in mark data source.
3. data desensitization method according to claim 2 it is characterised in that according to determine desensitization strategy to described target The step that data source carries out desensitization process, specifically includes:
According to the described sensitive data matching strategy comprising in described desensitization strategy, the data in described target data source is carried out Coupling, to determine the sensitive data in described target data source;
According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
4. data desensitization method according to claim 2 it is characterised in that described desensitization algorithm include following any one or Multiple combinations:
Sensitive data is replaced with process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on Random character displacement sensitive data, User Defined desensitization algorithm.
5. data desensitization method according to claim 1 it is characterised in that:
After the step of desensitization process is carried out to described target data source according to the desensitization strategy determining, also include:Generate solely Stand on the source of new data of described target data source;
The described step based on the data after desensitization process, responding described data access request, specifically includes:Based on described new number According to source, respond described data access request.
6. data desensitization method according to any one of claim 1 to 5 is it is characterised in that described receiving data accesses The step of request, specifically includes:
Received based on the proxy gateway that is deployed on back end described in being sent by data base query language and/or order line Data access request.
7. a kind of data desensitization device is it is characterised in that include:
Receiving unit, for receiving data access request, includes the identity of visitor in described data access request;
Determining unit, for according to described data access request, determining target data source to be visited, and visits according to described data Ask the identity comprising in request, determine the desensitization strategy to described target data source;
Processing unit, for carrying out desensitization process according to the desensitization strategy that described determining unit determines to described target data source;
Response unit, for based on the data after desensitization process, responding described data access request.
8. data desensitization device according to claim 7 is it is characterised in that described desensitization strategy includes:
The sensitive data matching strategy corresponding with the identity comprising in described data access request, and it is directed to described mesh The desensitization algorithm of the sensitive data in mark data source.
9. data according to claim 8 desensitization device it is characterised in that described processing unit specifically for:
According to the described sensitive data matching strategy comprising in described desensitization strategy, the data in described target data source is carried out Coupling, to determine the sensitive data in described target data source;
According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
10. data according to claim 8 desensitization device it is characterised in that described desensitization algorithm include following any one Or multiple combinations:
Sensitive data is replaced with process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on Random character displacement sensitive data, User Defined desensitization algorithm.
11. data desensitization devices according to claim 7 are it is characterised in that also include:
Signal generating unit, for carrying out desensitization process according to the desensitization strategy determining to described target data source in described processing unit Afterwards, generate the source of new data independent of described target data source;
Described response unit specifically for:Based on described source of new data, respond described data access request.
The 12. data desensitization devices according to any one of claim 7 to 11 are it is characterised in that described receiving unit has Body is used for:
Received based on the proxy gateway that is deployed on back end described in being sent by data base query language and/or order line Data access request.
CN201610902955.5A 2016-10-17 2016-10-17 Data desensitization method and data desensitization device Pending CN106407843A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610902955.5A CN106407843A (en) 2016-10-17 2016-10-17 Data desensitization method and data desensitization device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610902955.5A CN106407843A (en) 2016-10-17 2016-10-17 Data desensitization method and data desensitization device

Publications (1)

Publication Number Publication Date
CN106407843A true CN106407843A (en) 2017-02-15

Family

ID=58012128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610902955.5A Pending CN106407843A (en) 2016-10-17 2016-10-17 Data desensitization method and data desensitization device

Country Status (1)

Country Link
CN (1) CN106407843A (en)

Cited By (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107301349A (en) * 2017-05-20 2017-10-27 北京明朝万达科技股份有限公司 A kind of Access and control strategy of database method and system
CN107392051A (en) * 2017-07-28 2017-11-24 北京明朝万达科技股份有限公司 A kind of big data processing method and system
CN107403111A (en) * 2017-08-10 2017-11-28 中国民航信息网络股份有限公司 HIVE data desensitization method and device
CN107423632A (en) * 2017-04-20 2017-12-01 北京同余科技有限公司 Customizable sensitive data desensitization method and system
CN107507003A (en) * 2017-06-26 2017-12-22 阿里巴巴集团控股有限公司 A kind of method for processing business, equipment and system
CN107563218A (en) * 2017-08-23 2018-01-09 北京明朝万达科技股份有限公司 A kind of data desensitization method and Hbase desensitization process systems based on big data
CN107704770A (en) * 2017-09-28 2018-02-16 平安普惠企业管理有限公司 Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing
CN107871086A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 Sensitive information screen method, application server and computer-readable recording medium
CN108021822A (en) * 2017-11-30 2018-05-11 广州天鹏计算机科技有限公司 The desensitization method and system of data
CN108182208A (en) * 2017-12-18 2018-06-19 山东浪潮云服务信息科技有限公司 A kind of method for interchanging data and platform
CN108259491A (en) * 2018-01-15 2018-07-06 北京炼石网络技术有限公司 For the method, apparatus and its system of unstructured data safe handling
CN108288003A (en) * 2017-12-29 2018-07-17 上海上讯信息技术股份有限公司 A kind of Database Dynamic desensitization method and system based on more agency mechanisms
CN108418676A (en) * 2018-01-26 2018-08-17 山东超越数控电子股份有限公司 A kind of data desensitization method based on permission
CN108470128A (en) * 2017-02-23 2018-08-31 全球能源互联网研究院有限公司 A kind of online desensitization method and device of power load data
CN108537062A (en) * 2018-04-24 2018-09-14 山东华软金盾软件股份有限公司 A kind of method of database data dynamic encryption
CN108595978A (en) * 2018-03-30 2018-09-28 平安科技(深圳)有限公司 Information screen method, apparatus, terminal and computer readable storage medium
CN108681676A (en) * 2018-04-03 2018-10-19 北京市商汤科技开发有限公司 Data managing method and device, system, electronic equipment, program and storage medium
CN108809516A (en) * 2018-05-17 2018-11-13 杭州安恒信息技术股份有限公司 A kind of high security coding-decoding method of format data desensitization
CN108809913A (en) * 2017-05-04 2018-11-13 ***通信集团重庆有限公司 The method, apparatus and equipment of data desensitization
CN108875404A (en) * 2018-05-30 2018-11-23 中国联合网络通信集团有限公司 Data desensitization method, device and storage medium based on machine learning
CN108959964A (en) * 2018-06-29 2018-12-07 阿里巴巴集团控股有限公司 A kind of method, apparatus and computer equipment for message desensitization
CN109189675A (en) * 2018-08-20 2019-01-11 中国平安人寿保险股份有限公司 Big data Framework Software test method, device, computer equipment and storage medium
CN109271807A (en) * 2018-08-20 2019-01-25 深圳萨摩耶互联网金融服务有限公司 The data safety processing method and system of database
CN109299616A (en) * 2018-09-07 2019-02-01 北明软件有限公司 A kind of data safety managing and control system and method based on connection pool
CN109308258A (en) * 2018-08-21 2019-02-05 中国平安人寿保险股份有限公司 Building method, device, computer equipment and the storage medium of test data
CN109426725A (en) * 2017-08-22 2019-03-05 中兴通讯股份有限公司 Data desensitization method, equipment and computer readable storage medium
WO2019071892A1 (en) * 2017-10-13 2019-04-18 平安科技(深圳)有限公司 Method for transmitting masking rules for sensitive information, application server, and computer readable storage medium
CN109657496A (en) * 2018-12-20 2019-04-19 中国电子科技网络信息安全有限公司 A kind of big data static database desensitization system and method for the full mirror image of zero-copy
WO2019091102A1 (en) * 2017-11-07 2019-05-16 平安科技(深圳)有限公司 Desensitization rule configuration method and program, application server and computer-readable storage medium
CN109960944A (en) * 2017-12-14 2019-07-02 中兴通讯股份有限公司 A kind of data desensitization method, server, terminal and computer readable storage medium
CN109977690A (en) * 2017-12-28 2019-07-05 ***通信集团陕西有限公司 A kind of data processing method, device and medium
CN110084065A (en) * 2019-04-29 2019-08-02 北京口袋时尚科技有限公司 Data desensitization method and device
CN110138792A (en) * 2019-05-21 2019-08-16 上海市疾病预防控制中心 A kind of public health geodata goes privacy processing method and system
CN110232290A (en) * 2018-03-05 2019-09-13 中兴通讯股份有限公司 Log desensitization method, server and storage medium
CN110262787A (en) * 2019-06-21 2019-09-20 北京搜房科技发展有限公司 Sentence replacement method, device and electronic equipment
CN110447035A (en) * 2017-03-23 2019-11-12 微软技术许可有限责任公司 User content is fuzzy in structuring subscriber data file
CN110489997A (en) * 2019-08-16 2019-11-22 北京计算机技术及应用研究所 A kind of sensitive information desensitization method based on pattern matching algorithm
CN110503455A (en) * 2019-07-10 2019-11-26 平安普惠企业管理有限公司 Product promotion method and relevant device based on information security
CN110516466A (en) * 2019-07-12 2019-11-29 苏州浪潮智能科技有限公司 A kind of data desensitization method and device
CN110516471A (en) * 2019-08-15 2019-11-29 平安普惠企业管理有限公司 Product promotion method and relevant device based on information security
CN111030997A (en) * 2019-11-12 2020-04-17 北京安天网络安全技术有限公司 Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN111083135A (en) * 2019-12-12 2020-04-28 深圳天源迪科信息技术股份有限公司 Method for processing data by gateway and security gateway
CN111241577A (en) * 2020-01-06 2020-06-05 上海孚厘金融信息服务有限公司 Method for desensitizing displayed data
CN111428141A (en) * 2020-04-23 2020-07-17 北京中安星云软件技术有限公司 Method and device for associating application and database access behavior based on driving agent
CN111740973A (en) * 2020-06-16 2020-10-02 深圳市迈科龙电子有限公司 Intelligent defense system and method for block chain service and application
CN111818036A (en) * 2020-06-30 2020-10-23 平安科技(深圳)有限公司 Sensitive information protection method and device, computing equipment and storage medium
CN112015651A (en) * 2020-08-28 2020-12-01 北京互金新融科技有限公司 Data processing method and device
CN112559825A (en) * 2020-12-28 2021-03-26 中国工商银行股份有限公司 Service processing method, device, computing equipment and medium
CN112613000A (en) * 2020-12-22 2021-04-06 中国建设银行股份有限公司 Sensitive information protection method and device, electronic equipment and readable storage medium
CN112800474A (en) * 2021-03-19 2021-05-14 北京安华金和科技有限公司 Data desensitization method and device, storage medium and electronic device
CN113051601A (en) * 2019-12-27 2021-06-29 中移动信息技术有限公司 Sensitive data identification method, device, equipment and medium
CN113065163A (en) * 2021-04-26 2021-07-02 好人生(上海)健康科技有限公司 Big data oriented security data desensitization output method
CN113343299A (en) * 2021-06-18 2021-09-03 浪潮云信息技术股份公司 Hive database dynamic desensitization system and implementation method
CN113392425A (en) * 2020-03-12 2021-09-14 中移物联网有限公司 Data desensitization processing method and device, edge computing node and server
CN113806808A (en) * 2021-09-24 2021-12-17 四川新网银行股份有限公司 Non-invasive data desensitization method and system in distributed environment
WO2022012669A1 (en) * 2020-07-16 2022-01-20 中兴通讯股份有限公司 Data access method and device, and storage medium and electronic device
CN114040404A (en) * 2021-11-08 2022-02-11 中国电信股份有限公司 Data distribution method, system, device and storage medium
CN114726605A (en) * 2022-03-30 2022-07-08 医渡云(北京)技术有限公司 Sensitive data filtering method, device and system and computer equipment
CN114040404B (en) * 2021-11-08 2024-06-07 中国电信股份有限公司 Data distribution method, system, equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013101723A1 (en) * 2011-12-27 2013-07-04 Wellpoint, Inc. Method and system for data pattern matching, masking and removal of sensitive data
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN104065750A (en) * 2014-07-11 2014-09-24 中国人民公安大学 Safety management method and system based on shared data
CN104270465A (en) * 2014-10-23 2015-01-07 成都双奥阳科技有限公司 Cloud storage protection system
CN104866775A (en) * 2015-06-12 2015-08-26 四川友联信息技术有限公司 Bleaching method for financial data
CN105653981A (en) * 2015-12-31 2016-06-08 中国电子科技网络信息安全有限公司 Sensitive data protection system and method of data circulation and transaction of big data platform
CN105956175A (en) * 2016-05-24 2016-09-21 考拉征信服务有限公司 Webpage content crawling method and device
CN105975870A (en) * 2016-05-19 2016-09-28 上海点荣金融信息服务有限责任公司 Data desensitization method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013101723A1 (en) * 2011-12-27 2013-07-04 Wellpoint, Inc. Method and system for data pattern matching, masking and removal of sensitive data
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN104065750A (en) * 2014-07-11 2014-09-24 中国人民公安大学 Safety management method and system based on shared data
CN104270465A (en) * 2014-10-23 2015-01-07 成都双奥阳科技有限公司 Cloud storage protection system
CN104866775A (en) * 2015-06-12 2015-08-26 四川友联信息技术有限公司 Bleaching method for financial data
CN105653981A (en) * 2015-12-31 2016-06-08 中国电子科技网络信息安全有限公司 Sensitive data protection system and method of data circulation and transaction of big data platform
CN105975870A (en) * 2016-05-19 2016-09-28 上海点荣金融信息服务有限责任公司 Data desensitization method and system
CN105956175A (en) * 2016-05-24 2016-09-21 考拉征信服务有限公司 Webpage content crawling method and device

Cited By (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108470128A (en) * 2017-02-23 2018-08-31 全球能源互联网研究院有限公司 A kind of online desensitization method and device of power load data
CN108470128B (en) * 2017-02-23 2021-12-03 全球能源互联网研究院有限公司 Online desensitization method and device for electric load data
CN110447035A (en) * 2017-03-23 2019-11-12 微软技术许可有限责任公司 User content is fuzzy in structuring subscriber data file
CN110447035B (en) * 2017-03-23 2023-08-29 微软技术许可有限责任公司 User content obfuscation in structured user data files
CN107423632A (en) * 2017-04-20 2017-12-01 北京同余科技有限公司 Customizable sensitive data desensitization method and system
CN107423632B (en) * 2017-04-20 2020-09-15 国网浙江省电力有限公司营销服务中心 Customizable sensitive data desensitization method and system
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN108809913A (en) * 2017-05-04 2018-11-13 ***通信集团重庆有限公司 The method, apparatus and equipment of data desensitization
CN107301349A (en) * 2017-05-20 2017-10-27 北京明朝万达科技股份有限公司 A kind of Access and control strategy of database method and system
CN107507003B (en) * 2017-06-26 2020-04-24 创新先进技术有限公司 Service processing method, device and system
CN111738729A (en) * 2017-06-26 2020-10-02 创新先进技术有限公司 Service processing method, device and system
CN107507003A (en) * 2017-06-26 2017-12-22 阿里巴巴集团控股有限公司 A kind of method for processing business, equipment and system
US11468445B2 (en) 2017-06-26 2022-10-11 Advanced New Technologies Co., Ltd. Service processing method, device, and system
US10984421B2 (en) 2017-06-26 2021-04-20 Advanced New Technologies Co., Ltd. Service processing method, device, and system
CN107392051A (en) * 2017-07-28 2017-11-24 北京明朝万达科技股份有限公司 A kind of big data processing method and system
CN107403111A (en) * 2017-08-10 2017-11-28 中国民航信息网络股份有限公司 HIVE data desensitization method and device
CN109426725A (en) * 2017-08-22 2019-03-05 中兴通讯股份有限公司 Data desensitization method, equipment and computer readable storage medium
CN107563218A (en) * 2017-08-23 2018-01-09 北京明朝万达科技股份有限公司 A kind of data desensitization method and Hbase desensitization process systems based on big data
CN107563218B (en) * 2017-08-23 2019-01-15 北京明朝万达科技股份有限公司 A kind of data desensitization method and Hbase desensitization process system based on big data
CN107704770A (en) * 2017-09-28 2018-02-16 平安普惠企业管理有限公司 Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing
CN107871086A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 Sensitive information screen method, application server and computer-readable recording medium
WO2019071892A1 (en) * 2017-10-13 2019-04-18 平安科技(深圳)有限公司 Method for transmitting masking rules for sensitive information, application server, and computer readable storage medium
WO2019091102A1 (en) * 2017-11-07 2019-05-16 平安科技(深圳)有限公司 Desensitization rule configuration method and program, application server and computer-readable storage medium
CN108021822A (en) * 2017-11-30 2018-05-11 广州天鹏计算机科技有限公司 The desensitization method and system of data
CN109960944A (en) * 2017-12-14 2019-07-02 中兴通讯股份有限公司 A kind of data desensitization method, server, terminal and computer readable storage medium
CN108182208A (en) * 2017-12-18 2018-06-19 山东浪潮云服务信息科技有限公司 A kind of method for interchanging data and platform
CN109977690A (en) * 2017-12-28 2019-07-05 ***通信集团陕西有限公司 A kind of data processing method, device and medium
CN108288003A (en) * 2017-12-29 2018-07-17 上海上讯信息技术股份有限公司 A kind of Database Dynamic desensitization method and system based on more agency mechanisms
CN108259491A (en) * 2018-01-15 2018-07-06 北京炼石网络技术有限公司 For the method, apparatus and its system of unstructured data safe handling
CN108259491B (en) * 2018-01-15 2021-07-16 北京炼石网络技术有限公司 Method, device and system for safely processing unstructured data
CN108418676A (en) * 2018-01-26 2018-08-17 山东超越数控电子股份有限公司 A kind of data desensitization method based on permission
CN110232290A (en) * 2018-03-05 2019-09-13 中兴通讯股份有限公司 Log desensitization method, server and storage medium
CN108595978A (en) * 2018-03-30 2018-09-28 平安科技(深圳)有限公司 Information screen method, apparatus, terminal and computer readable storage medium
CN108681676A (en) * 2018-04-03 2018-10-19 北京市商汤科技开发有限公司 Data managing method and device, system, electronic equipment, program and storage medium
CN108537062A (en) * 2018-04-24 2018-09-14 山东华软金盾软件股份有限公司 A kind of method of database data dynamic encryption
CN108537062B (en) * 2018-04-24 2022-03-22 山东华软金盾软件股份有限公司 Dynamic encryption method for database data
CN108809516B (en) * 2018-05-17 2020-12-11 杭州安恒信息技术股份有限公司 High-security coding and decoding method for desensitization of formatted data
CN108809516A (en) * 2018-05-17 2018-11-13 杭州安恒信息技术股份有限公司 A kind of high security coding-decoding method of format data desensitization
CN108875404B (en) * 2018-05-30 2022-05-20 中国联合网络通信集团有限公司 Data desensitization method and device based on machine learning and storage medium
CN108875404A (en) * 2018-05-30 2018-11-23 中国联合网络通信集团有限公司 Data desensitization method, device and storage medium based on machine learning
CN108959964A (en) * 2018-06-29 2018-12-07 阿里巴巴集团控股有限公司 A kind of method, apparatus and computer equipment for message desensitization
CN109189675A (en) * 2018-08-20 2019-01-11 中国平安人寿保险股份有限公司 Big data Framework Software test method, device, computer equipment and storage medium
CN109271807A (en) * 2018-08-20 2019-01-25 深圳萨摩耶互联网金融服务有限公司 The data safety processing method and system of database
CN109308258A (en) * 2018-08-21 2019-02-05 中国平安人寿保险股份有限公司 Building method, device, computer equipment and the storage medium of test data
CN109299616A (en) * 2018-09-07 2019-02-01 北明软件有限公司 A kind of data safety managing and control system and method based on connection pool
CN109657496A (en) * 2018-12-20 2019-04-19 中国电子科技网络信息安全有限公司 A kind of big data static database desensitization system and method for the full mirror image of zero-copy
CN110084065B (en) * 2019-04-29 2021-07-30 北京口袋时尚科技有限公司 Data desensitization method and device
CN110084065A (en) * 2019-04-29 2019-08-02 北京口袋时尚科技有限公司 Data desensitization method and device
CN110138792B (en) * 2019-05-21 2020-01-14 上海市疾病预防控制中心 Public health geographic data privacy removal processing method and system
CN110138792A (en) * 2019-05-21 2019-08-16 上海市疾病预防控制中心 A kind of public health geodata goes privacy processing method and system
CN110262787A (en) * 2019-06-21 2019-09-20 北京搜房科技发展有限公司 Sentence replacement method, device and electronic equipment
CN110503455A (en) * 2019-07-10 2019-11-26 平安普惠企业管理有限公司 Product promotion method and relevant device based on information security
CN110516466A (en) * 2019-07-12 2019-11-29 苏州浪潮智能科技有限公司 A kind of data desensitization method and device
CN110516471A (en) * 2019-08-15 2019-11-29 平安普惠企业管理有限公司 Product promotion method and relevant device based on information security
CN110516471B (en) * 2019-08-15 2022-05-17 平安普惠企业管理有限公司 Product promotion method based on information security and related equipment
CN110489997A (en) * 2019-08-16 2019-11-22 北京计算机技术及应用研究所 A kind of sensitive information desensitization method based on pattern matching algorithm
CN111030997A (en) * 2019-11-12 2020-04-17 北京安天网络安全技术有限公司 Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN111083135A (en) * 2019-12-12 2020-04-28 深圳天源迪科信息技术股份有限公司 Method for processing data by gateway and security gateway
CN113051601B (en) * 2019-12-27 2024-05-03 中移动信息技术有限公司 Sensitive data identification method, device, equipment and medium
CN113051601A (en) * 2019-12-27 2021-06-29 中移动信息技术有限公司 Sensitive data identification method, device, equipment and medium
CN111241577A (en) * 2020-01-06 2020-06-05 上海孚厘金融信息服务有限公司 Method for desensitizing displayed data
CN113392425A (en) * 2020-03-12 2021-09-14 中移物联网有限公司 Data desensitization processing method and device, edge computing node and server
CN111428141A (en) * 2020-04-23 2020-07-17 北京中安星云软件技术有限公司 Method and device for associating application and database access behavior based on driving agent
CN111740973A (en) * 2020-06-16 2020-10-02 深圳市迈科龙电子有限公司 Intelligent defense system and method for block chain service and application
CN111818036A (en) * 2020-06-30 2020-10-23 平安科技(深圳)有限公司 Sensitive information protection method and device, computing equipment and storage medium
CN111818036B (en) * 2020-06-30 2021-06-04 平安科技(深圳)有限公司 Sensitive information protection method and device, computing equipment and storage medium
WO2022012669A1 (en) * 2020-07-16 2022-01-20 中兴通讯股份有限公司 Data access method and device, and storage medium and electronic device
CN112015651A (en) * 2020-08-28 2020-12-01 北京互金新融科技有限公司 Data processing method and device
CN112015651B (en) * 2020-08-28 2023-10-27 北京互金新融科技有限公司 Data processing method and device
CN112613000A (en) * 2020-12-22 2021-04-06 中国建设银行股份有限公司 Sensitive information protection method and device, electronic equipment and readable storage medium
CN112559825B (en) * 2020-12-28 2024-02-23 中国工商银行股份有限公司 Service processing method, device, computing equipment and medium
CN112559825A (en) * 2020-12-28 2021-03-26 中国工商银行股份有限公司 Service processing method, device, computing equipment and medium
CN112800474A (en) * 2021-03-19 2021-05-14 北京安华金和科技有限公司 Data desensitization method and device, storage medium and electronic device
CN113065163A (en) * 2021-04-26 2021-07-02 好人生(上海)健康科技有限公司 Big data oriented security data desensitization output method
CN113343299A (en) * 2021-06-18 2021-09-03 浪潮云信息技术股份公司 Hive database dynamic desensitization system and implementation method
CN113806808A (en) * 2021-09-24 2021-12-17 四川新网银行股份有限公司 Non-invasive data desensitization method and system in distributed environment
CN114040404A (en) * 2021-11-08 2022-02-11 中国电信股份有限公司 Data distribution method, system, device and storage medium
CN114040404B (en) * 2021-11-08 2024-06-07 中国电信股份有限公司 Data distribution method, system, equipment and storage medium
CN114726605A (en) * 2022-03-30 2022-07-08 医渡云(北京)技术有限公司 Sensitive data filtering method, device and system and computer equipment

Similar Documents

Publication Publication Date Title
CN106407843A (en) Data desensitization method and data desensitization device
US20200285978A1 (en) Model training system and method, and storage medium
CN106599713B (en) A kind of database desensitization system and method based on big data
CN104125197B (en) A kind of security baseline system and its method for realizing safety inspection
CN107871083A (en) Desensitize regular collocation method, application server and computer-readable recording medium
CN110443059A (en) Data guard method and device
CN112383546A (en) Method for processing network attack behavior, related device and storage medium
CN105765901B (en) Intelligent firewall access rule
CN110851860A (en) Power consumption data desensitization algorithm model construction method based on anonymization privacy technology
CN109271807A (en) The data safety processing method and system of database
CN107426231A (en) A kind of method and device for identifying user behavior
CN108234426B (en) APT attack warning method and APT attack warning device
CN106055609A (en) nginx log monitoring method and apparatus, message distribution system and information processing apparatus
CN112000992B (en) Data leakage prevention protection method and device, computer readable medium and electronic equipment
US20190005252A1 (en) Device for self-defense security based on system environment and user behavior analysis, and operating method therefor
CN109299616A (en) A kind of data safety managing and control system and method based on connection pool
CN112035344A (en) Multi-scenario test method, device, equipment and computer readable storage medium
WO2021234464A2 (en) Systems and methods for device detection and registration
CN111190950B (en) Asset retrieval method and device
CN110798353A (en) Network behavior risk perception and defense method based on behavior characteristic big data analysis
CN105260378A (en) Database audit method and device
CN113794735B (en) Sensitive data security protection method in SAAS system scene
CN106959903A (en) Trap instruction Trap processing method and processing device
CN114826790A (en) Block chain monitoring method, device, equipment and storage medium
CN114840574A (en) Data query method, server, node and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170215

RJ01 Rejection of invention patent application after publication