CN106407843A - Data desensitization method and data desensitization device - Google Patents
Data desensitization method and data desensitization device Download PDFInfo
- Publication number
- CN106407843A CN106407843A CN201610902955.5A CN201610902955A CN106407843A CN 106407843 A CN106407843 A CN 106407843A CN 201610902955 A CN201610902955 A CN 201610902955A CN 106407843 A CN106407843 A CN 106407843A
- Authority
- CN
- China
- Prior art keywords
- data
- desensitization
- access request
- source
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data desensitization method and a data desensitization device. The data desensitization method comprises the steps of: receiving a data access request, the data access request including the identity of a visitor; determining a target data source to be visited according to the data access request, and determining a desensitization strategy for the target data source according to the identity included in the data access request; desensitizing the target data source according to the determined desensitization strategy; and responding to the data access request based on the desensitized data. The technical solution can automatically shield sensitive information in service data to guarantee data security, and can realize automation of the data calling process to improve the operating efficiency, thereby meeting the requirements of audit and supervision departments.
Description
Technical field
The present invention relates to technical field of data processing, take off in particular to a kind of data desensitization method and a kind of data
Quick device.
Background technology
At present, data-privacy power has become one of many regulations by supervision industry, and meanwhile, protection sensitive data is also one
Item business practice well.Especially under the scene of big data, how to realize the automation of data call process, with true
Protect the sensitive information in automatic shield business datum, ensure data safety, lifting operation efficiency, meet audit and supervision department will
Asking etc. becomes technical problem urgently to be resolved hurrily.
Content of the invention
The present invention is based at least one above-mentioned technical problem it is proposed that a kind of new data desensitisation regimens, can oneself
Sensitive information in dynamic shielding business datum, has ensured data safety, and is capable of the automation of data call process, carries
Rise operating efficiency, thus being conducive to meeting the requirement of audit and supervision department.
In view of this, according to the first aspect of the invention it is proposed that a kind of data desensitization method, including:Receiving data is visited
Ask request, in described data access request, include the identity of visitor;According to described data access request, determine and wait to visit
The target data source asked, and according to the identity comprising in described data access request, determine to described target data source
Desensitization strategy;Desensitization strategy according to determining carries out desensitization process to described target data source;Based on the data after desensitization process,
Respond described data access request.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data
The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target
Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield
Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour
Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off
The quick application scenarios calling.
It is preferable that described desensitization strategy includes in technique scheme:With the body comprising in described data access request
The corresponding sensitive data matching strategy of part mark, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and
And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user
Sense Data Matching strategy can identical it is also possible to different.
It is preferable that being carried out at desensitization to described target data source according to the desensitization strategy determining in technique scheme
The step of reason, specifically includes:According to the described sensitive data matching strategy comprising in described desensitization strategy, to described target data
Data in source is mated, to determine the sensitive data in described target data source;According to comprise in described desensitization strategy
Described desensitization algorithm, carries out desensitization process to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request
Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy
Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request
Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role,
Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible
Property.
It is preferable that described desensitization algorithm includes the following combination of any one or more in any of the above-described technical scheme:Right
Sensitive data is replaced process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on random words
Symbol displacement sensitive data, User Defined desensitization algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral,
Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing
Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing
State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off
Quick algorithm is user-defined other desensitization algorithm.
It is preferable that being carried out to described target data source according to the desensitization strategy determining in any of the above-described technical scheme
After the step of desensitization process, also include:Generate the source of new data independent of described target data source;Described based on desensitization process
Data afterwards, the step responding described data access request, specifically include:Based on described source of new data, respond described data and visit
Ask request.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data
After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter
And ensure that data in former data source unaffected it is ensured that data safety in former data source.
It is preferable that the step of described receiving data access request in any of the above-described technical scheme, specifically include:It is based on
The described data access that the proxy gateway reception being deployed on back end is sent by data base query language and/or order line
Request.
In this technical scheme, the data access request being sent by data base query language can be by JDBC
The data access request that (Java Data Base Connectivity, Java database connects) mode sends.
The device it is also proposed that a kind of data desensitizes according to the second aspect of the invention, including:Receiving unit, for receiving
Data access request, includes the identity of visitor in described data access request;Determining unit, for according to described number
According to access request, determine target data source to be visited, and according to the identity comprising in described data access request, determine
Desensitization strategy to described target data source;Processing unit, for the desensitization strategy that determined according to described determining unit to described
Target data source carries out desensitization process;Response unit, please for based on the data after desensitization process, responding described data access
Ask.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data
The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target
Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield
Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour
Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off
The quick application scenarios calling.
It is preferable that described desensitization strategy includes in technique scheme:With the body comprising in described data access request
The corresponding sensitive data matching strategy of part mark, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and
And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user
Sense Data Matching strategy can identical it is also possible to different.
In technique scheme it is preferable that described processing unit specifically for:According to comprise in described desensitization strategy
Described sensitive data matching strategy, mates to the data in described target data source, to determine in described target data source
Sensitive data;According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request
Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy
Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request
Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role,
Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible
Property.
It is preferable that described desensitization algorithm includes the following combination of any one or more in any of the above-described technical scheme:Right
Sensitive data is replaced process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on random words
Symbol displacement sensitive data, User Defined desensitization algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral,
Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing
Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing
State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off
Quick algorithm is user-defined other desensitization algorithm.
It is preferable that described data desensitization device also includes in any of the above-described technical scheme:Signal generating unit, for
After described processing unit carries out desensitization process according to the desensitization strategy determining to described target data source, generate independent of described
The source of new data of target data source;Described response unit specifically for:Based on described source of new data, responding described data access please
Ask.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data
After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter
And ensure that data in former data source unaffected it is ensured that data safety in former data source.
In any of the above-described technical scheme it is preferable that described receiving unit specifically for:It is based on and be deployed on back end
The proxy gateway described data access request that sent by data base query language and/or order line of reception.
In this technical scheme, the data access request being sent by data base query language can be by JDBC mode
The data access request sending.
By above technical scheme, data safety can be ensured with the sensitive information in automatic shield business datum, and
Be capable of the automation of data call process, improve operating efficiency, thus be conducive to meet audit and supervision department will
Ask.
Brief description
Fig. 1 shows the schematic flow sheet of data desensitization method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of data desensitization device according to an embodiment of the invention;
Fig. 3 shows the interface schematic diagram disposing gateway A gent according to an embodiment of the invention;
Fig. 4 shows that the interface adding Hive Agent according to an embodiment of the invention in Hadoop cluster is illustrated
Figure;
Fig. 5 shows the interface schematic diagram of configuration data desensitization strategy according to an embodiment of the invention;
Fig. 6 shows the schematic diagram accessing Hive database according to an embodiment of the invention by JDBC mode;
Fig. 7 shows the schematic diagram accessing Hive database according to an embodiment of the invention by command line mode;
Fig. 8 shows the schematic diagram data before non-according to an embodiment of the invention desensitization process;
Fig. 9 shows the signal according to an embodiment of the invention sensitive field in data being carried out after desensitization process
Figure.
Specific embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specifically real
Mode of applying is further described in detail to the present invention.It should be noted that in the case of not conflicting, the enforcement of the application
Feature in example and embodiment can be mutually combined.
Elaborate a lot of details in the following description in order to fully understand the present invention, but, the present invention also may be used
To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not described below
Specific embodiment restriction.
Fig. 1 shows the schematic flow sheet of data desensitization method according to an embodiment of the invention.
As shown in figure 1, data desensitization method according to an embodiment of the invention, including:
Step S10, receiving data access request, include the identity of visitor in described data access request.
Step S12, according to described data access request, determines target data source to be visited, and is visited according to described data
Ask the identity comprising in request, determine the desensitization strategy to described target data source.
Step S14, the desensitization strategy according to determining carries out desensitization process to described target data source.
Step S16, based on the data after desensitization process, responds described data access request.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data
The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target
Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield
Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour
Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off
The quick application scenarios calling.
Further, described desensitization strategy includes:Corresponding with the identity comprising in described data access request
Sensitive data matching strategy, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and
And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user
Sense Data Matching strategy can identical it is also possible to different.
Further, above-mentioned steps S14 specifically include:According to the described sensitive data coupling comprising in described desensitization strategy
Strategy, mates to the data in described target data source, to determine the sensitive data in described target data source;According to institute
State the described desensitization algorithm comprising in desensitization strategy, desensitization process is carried out to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request
Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy
Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request
Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role,
Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible
Property.
Further, described desensitization algorithm includes the following combination of any one or more:Place is replaced to sensitive data
Manage, sensitive data is encrypted, sensitive data being carried out with Fuzzy Processing, based on random character displacement sensitive data, use
The self-defined desensitization in family algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral,
Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing
Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing
State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off
Quick algorithm is user-defined other desensitization algorithm.
Further, also include after above-mentioned steps S14:Generate the source of new data independent of described target data source;
Step S16 specifically includes:Based on described source of new data, respond described data access request.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data
After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter
And ensure that data in former data source unaffected it is ensured that data safety in former data source.
Further, step S10 specifically includes:Received based on the proxy gateway being deployed on back end and pass through database
The described data access request that query language and/or order line send.
In this technical scheme, the data access request being sent by data base query language can be by JDBC mode
The data access request sending.
Fig. 2 shows the schematic block diagram of data desensitization device according to an embodiment of the invention.
As shown in Fig. 2 according to an embodiment of the invention data desensitization device 200, including:Receiving unit 202, determination are single
Unit 204, processing unit 206 and response unit 208.
Wherein, receiving unit 202 is used for receiving data access request, includes visitor's in described data access request
Identity;Determining unit 204 is used for according to described data access request, determines target data source to be visited, and according to institute
State the identity comprising in data access request, determine the desensitization strategy to described target data source;Processing unit 206 is used for
Desensitization process is carried out to described target data source according to the desensitization strategy that described determining unit 204 determines;Response unit 208 is used for
Based on the data after desensitization process, respond described data access request.
In this technical scheme, by target data source to be visited is determined according to data access request, and according to data
The identity that comprises in access request determines the desensitization strategy to target data source, with based on a determination that desensitization strategy to target
Data source carries out desensitization process, and then based on the data response data access request after desensitization process, enabling automatic shield
Sensitive information in business datum, has ensured data safety, and is capable of the automation of data call process, improves behaviour
Make efficiency, thus being conducive to meeting the requirement of audit and supervision department.Technical scheme is particularly suited for big data and takes off
The quick application scenarios calling.
Further, described desensitization strategy includes:Corresponding with the identity comprising in described data access request
Sensitive data matching strategy, and the desensitization algorithm for the sensitive data in described target data source.
In this technical scheme, sensitive data matching strategy is for mating sensitive data in target data source, and
And different identity identify corresponding sensitive data matching strategy can identical it is also possible to different, that is, correspond to the quick of different user
Sense Data Matching strategy can identical it is also possible to different.
Further, described processing unit 206 specifically for:According to the described sensitive data comprising in described desensitization strategy
Matching strategy, mates to the data in described target data source, to determine the sensitive data in described target data source;Root
According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
In this technical scheme, because sensitive data matching strategy is and the identity phase that comprises in data access request
Corresponding, therefore by being carried out to the data in target data source according to the sensitive data matching strategy comprising in desensitization strategy
Coupling, enabling to match corresponding sensitivity in target data source for the identity comprising in data access request
Data, and then desensitization process is carried out to the sensitive data matching.It can be seen that, this technical scheme be capable of for different role,
Different user (different role and different user to be distinguished by identity) carrying out priority assignation, has stronger flexible
Property.
Further, described desensitization algorithm includes the following combination of any one or more:Place is replaced to sensitive data
Manage, sensitive data is encrypted, sensitive data being carried out with Fuzzy Processing, based on random character displacement sensitive data, use
The self-defined desensitization in family algorithm.
In this technical scheme, sensitive data is replaced process be pass through predetermined character (as letter, numeral,
Symbol etc.) sensitive data is replaced;Can only be checked de- after sensitive data is encrypted by decryption processing
Sensitive data after quick process;Sensitive data is carried out with the fuzzy shape that sensitive data is as processed as being difficult to check by Fuzzy Processing
State;It is based on random character displacement sensitive data and line replacement is entered to sensitive data by random character;User Defined takes off
Quick algorithm is user-defined other desensitization algorithm.
Further, described data desensitization device 200 also includes:Signal generating unit 210, in described processing unit
After 206 carry out desensitization process according to the desensitization strategy determining to described target data source, generate independent of described target data
The source of new data in source;Described response unit 208 specifically for:Based on described source of new data, respond described data access request.
In this technical scheme, by generating the source of new data independent of target data source, to be rung based on source of new data
After answering data access request so that desensitization process is carried out to target data source, the data in former data source can not be changed, enter
And ensure that data in former data source unaffected it is ensured that data safety in former data source.
Further, described receiving unit 202 specifically for:Received logical based on the proxy gateway being deployed on back end
Cross the described data access request that data base query language and/or order line send.
In this technical scheme, the data access request being sent by data base query language can be by JDBC mode
The data access request sending.
(the being a kind of distributed system architecture) node with back end as Hadoop below, and be used for accessing Hive
Technical scheme is described in detail as a example (Tool for Data Warehouse based on Hadoop).
Technical scheme is mainly disposes proxy gateway on the Hadoop node that data (as big data) stores
HiveAgent, for being intercepted and management and control to the access of back end.Specifically, technical scheme can be known
Not different access users, and according to user come the strategy of configuration access data, desensitized based on the business object of integrality
Operation is not it is ensured that destroy ambiguity and the business association of data.Wherein it is possible to be desensitized based on multiple desensitization algorithms
Process, such as replacement, encryption, random character displacement, Fuzzy Processing, user-defined desensitization algorithm etc..Meanwhile, the skill of the present invention
Art scheme also supports that extraction-type does not land desensitization (the transient data in internal memory or in network transmission being desensitized) and just
2 kinds of patterns of ground desensitization (the data after persistence process being desensitized).And survey can automatically be executed by scheduler
Examination data pick-up and desensitization work, reduce Human disturbance it is achieved that perfect user authority management strategy, can be for difference
Role, different user are carrying out priority assignation.
Specifically, mainly include the following steps that:
Step 1:Gateway A gent is disposed on the back end of Hadoop, after deployment gateway A gent, can control various
Mode accesses the data storage of Hadoop cluster.Wherein, the interface schematic diagram of deployment gateway A gent is as shown in figure 3, disposing net
Schematic diagram after the Agent of pass is as shown in figure 4, with the addition of Hive Agent in Hadoop cluster.
Step 2:Configure different data desensitization strategies according to user.Specifically, need to visit according to different user configurings
Ask the Hive table of control and arrange into row constraint.As shown in Figure 5:Expression represents shielding policing rule;Description table
Sample example;Select Table represents selection source Hive table;Columns represents the field that Hive table is affected.
Wherein, for different users, the data desensitization strategy of configuration can be different, that is, be directed to the need of different user configuration
Want the Hive table of access control and the row can be different.
Step 3:Big data storage is accessed by different access modes, realizes different data desensitization strategies.
Wherein, access mode includes:
Mode one:As shown in fig. 6, Hive is accessed by JDBC mode.Wherein, the HiveJdbcUtil shown in Fig. 6 is
Link queries Hive sample, links Hive database by this JDBC mode, through the Agent mode that desensitizes, execution
The tableName table of involved inquiry during selectData method, can be parsed, correspond to set select in Fig. 5
Table table is corresponding with Columns field to carry out desensitization process.
Mode two:By command-line access Hive.It is illustrated in figure 7 by order line link queries Hive sample, pass through
This command line mode links Hive database, through the Agent mode that desensitizes, during execution select*from hiveomm, can solve
The tableName table of the involved inquiry of analysis, corresponds to set select Table table in Fig. 5 and Columns field phase
Correspondence carries out desensitization process.
It can be seen that, in step 3, user can access Hive database by different access modes, and then gateway
Agent can determine, according to the data desensitization strategy configuring for different user, the sensitive data needing desensitization process, and then
Carry out desensitization process.Wherein, after the Table table that need desensitize and Columns row carry out desensitization process, can be by desensitization
The result of reason exports in self-defined new table, it is to avoid clash with source table.
Data before being illustrated in figure 8 without desensitization process, after desensitization process, as shown in figure 9, can be right
Sensitive field is desensitized, so can sensitive information in automatic shield business datum, ensured data safety.
Technical scheme is described in detail above in association with accompanying drawing, the present invention proposes a kind of new data desensitization side
Case, can have been ensured data safety, and has been capable of data call process with the sensitive information in automatic shield business datum
Automation, improves operating efficiency, thus being conducive to meeting the requirement of audit and supervision department.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made any repair
Change, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (12)
1. a kind of data desensitization method is it is characterised in that include:
Receiving data access request, includes the identity of visitor in described data access request;
According to described data access request, determine target data source to be visited, and comprise according in described data access request
Identity, determine desensitization strategy to described target data source;
Desensitization strategy according to determining carries out desensitization process to described target data source;
Based on the data after desensitization process, respond described data access request.
2. data desensitization method according to claim 1 is it is characterised in that described desensitization strategy includes:
The sensitive data matching strategy corresponding with the identity comprising in described data access request, and it is directed to described mesh
The desensitization algorithm of the sensitive data in mark data source.
3. data desensitization method according to claim 2 it is characterised in that according to determine desensitization strategy to described target
The step that data source carries out desensitization process, specifically includes:
According to the described sensitive data matching strategy comprising in described desensitization strategy, the data in described target data source is carried out
Coupling, to determine the sensitive data in described target data source;
According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
4. data desensitization method according to claim 2 it is characterised in that described desensitization algorithm include following any one or
Multiple combinations:
Sensitive data is replaced with process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on
Random character displacement sensitive data, User Defined desensitization algorithm.
5. data desensitization method according to claim 1 it is characterised in that:
After the step of desensitization process is carried out to described target data source according to the desensitization strategy determining, also include:Generate solely
Stand on the source of new data of described target data source;
The described step based on the data after desensitization process, responding described data access request, specifically includes:Based on described new number
According to source, respond described data access request.
6. data desensitization method according to any one of claim 1 to 5 is it is characterised in that described receiving data accesses
The step of request, specifically includes:
Received based on the proxy gateway that is deployed on back end described in being sent by data base query language and/or order line
Data access request.
7. a kind of data desensitization device is it is characterised in that include:
Receiving unit, for receiving data access request, includes the identity of visitor in described data access request;
Determining unit, for according to described data access request, determining target data source to be visited, and visits according to described data
Ask the identity comprising in request, determine the desensitization strategy to described target data source;
Processing unit, for carrying out desensitization process according to the desensitization strategy that described determining unit determines to described target data source;
Response unit, for based on the data after desensitization process, responding described data access request.
8. data desensitization device according to claim 7 is it is characterised in that described desensitization strategy includes:
The sensitive data matching strategy corresponding with the identity comprising in described data access request, and it is directed to described mesh
The desensitization algorithm of the sensitive data in mark data source.
9. data according to claim 8 desensitization device it is characterised in that described processing unit specifically for:
According to the described sensitive data matching strategy comprising in described desensitization strategy, the data in described target data source is carried out
Coupling, to determine the sensitive data in described target data source;
According to the described desensitization algorithm comprising in described desensitization strategy, desensitization process is carried out to described sensitive data.
10. data according to claim 8 desensitization device it is characterised in that described desensitization algorithm include following any one
Or multiple combinations:
Sensitive data is replaced with process, sensitive data is encrypted, sensitive data is carried out with Fuzzy Processing, is based on
Random character displacement sensitive data, User Defined desensitization algorithm.
11. data desensitization devices according to claim 7 are it is characterised in that also include:
Signal generating unit, for carrying out desensitization process according to the desensitization strategy determining to described target data source in described processing unit
Afterwards, generate the source of new data independent of described target data source;
Described response unit specifically for:Based on described source of new data, respond described data access request.
The 12. data desensitization devices according to any one of claim 7 to 11 are it is characterised in that described receiving unit has
Body is used for:
Received based on the proxy gateway that is deployed on back end described in being sent by data base query language and/or order line
Data access request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610902955.5A CN106407843A (en) | 2016-10-17 | 2016-10-17 | Data desensitization method and data desensitization device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610902955.5A CN106407843A (en) | 2016-10-17 | 2016-10-17 | Data desensitization method and data desensitization device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106407843A true CN106407843A (en) | 2017-02-15 |
Family
ID=58012128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610902955.5A Pending CN106407843A (en) | 2016-10-17 | 2016-10-17 | Data desensitization method and data desensitization device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106407843A (en) |
Cited By (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107301349A (en) * | 2017-05-20 | 2017-10-27 | 北京明朝万达科技股份有限公司 | A kind of Access and control strategy of database method and system |
CN107392051A (en) * | 2017-07-28 | 2017-11-24 | 北京明朝万达科技股份有限公司 | A kind of big data processing method and system |
CN107403111A (en) * | 2017-08-10 | 2017-11-28 | 中国民航信息网络股份有限公司 | HIVE data desensitization method and device |
CN107423632A (en) * | 2017-04-20 | 2017-12-01 | 北京同余科技有限公司 | Customizable sensitive data desensitization method and system |
CN107507003A (en) * | 2017-06-26 | 2017-12-22 | 阿里巴巴集团控股有限公司 | A kind of method for processing business, equipment and system |
CN107563218A (en) * | 2017-08-23 | 2018-01-09 | 北京明朝万达科技股份有限公司 | A kind of data desensitization method and Hbase desensitization process systems based on big data |
CN107704770A (en) * | 2017-09-28 | 2018-02-16 | 平安普惠企业管理有限公司 | Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing |
CN107871086A (en) * | 2017-10-13 | 2018-04-03 | 平安科技(深圳)有限公司 | Sensitive information screen method, application server and computer-readable recording medium |
CN108021822A (en) * | 2017-11-30 | 2018-05-11 | 广州天鹏计算机科技有限公司 | The desensitization method and system of data |
CN108182208A (en) * | 2017-12-18 | 2018-06-19 | 山东浪潮云服务信息科技有限公司 | A kind of method for interchanging data and platform |
CN108259491A (en) * | 2018-01-15 | 2018-07-06 | 北京炼石网络技术有限公司 | For the method, apparatus and its system of unstructured data safe handling |
CN108288003A (en) * | 2017-12-29 | 2018-07-17 | 上海上讯信息技术股份有限公司 | A kind of Database Dynamic desensitization method and system based on more agency mechanisms |
CN108418676A (en) * | 2018-01-26 | 2018-08-17 | 山东超越数控电子股份有限公司 | A kind of data desensitization method based on permission |
CN108470128A (en) * | 2017-02-23 | 2018-08-31 | 全球能源互联网研究院有限公司 | A kind of online desensitization method and device of power load data |
CN108537062A (en) * | 2018-04-24 | 2018-09-14 | 山东华软金盾软件股份有限公司 | A kind of method of database data dynamic encryption |
CN108595978A (en) * | 2018-03-30 | 2018-09-28 | 平安科技(深圳)有限公司 | Information screen method, apparatus, terminal and computer readable storage medium |
CN108681676A (en) * | 2018-04-03 | 2018-10-19 | 北京市商汤科技开发有限公司 | Data managing method and device, system, electronic equipment, program and storage medium |
CN108809516A (en) * | 2018-05-17 | 2018-11-13 | 杭州安恒信息技术股份有限公司 | A kind of high security coding-decoding method of format data desensitization |
CN108809913A (en) * | 2017-05-04 | 2018-11-13 | ***通信集团重庆有限公司 | The method, apparatus and equipment of data desensitization |
CN108875404A (en) * | 2018-05-30 | 2018-11-23 | 中国联合网络通信集团有限公司 | Data desensitization method, device and storage medium based on machine learning |
CN108959964A (en) * | 2018-06-29 | 2018-12-07 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus and computer equipment for message desensitization |
CN109189675A (en) * | 2018-08-20 | 2019-01-11 | 中国平安人寿保险股份有限公司 | Big data Framework Software test method, device, computer equipment and storage medium |
CN109271807A (en) * | 2018-08-20 | 2019-01-25 | 深圳萨摩耶互联网金融服务有限公司 | The data safety processing method and system of database |
CN109299616A (en) * | 2018-09-07 | 2019-02-01 | 北明软件有限公司 | A kind of data safety managing and control system and method based on connection pool |
CN109308258A (en) * | 2018-08-21 | 2019-02-05 | 中国平安人寿保险股份有限公司 | Building method, device, computer equipment and the storage medium of test data |
CN109426725A (en) * | 2017-08-22 | 2019-03-05 | 中兴通讯股份有限公司 | Data desensitization method, equipment and computer readable storage medium |
WO2019071892A1 (en) * | 2017-10-13 | 2019-04-18 | 平安科技(深圳)有限公司 | Method for transmitting masking rules for sensitive information, application server, and computer readable storage medium |
CN109657496A (en) * | 2018-12-20 | 2019-04-19 | 中国电子科技网络信息安全有限公司 | A kind of big data static database desensitization system and method for the full mirror image of zero-copy |
WO2019091102A1 (en) * | 2017-11-07 | 2019-05-16 | 平安科技(深圳)有限公司 | Desensitization rule configuration method and program, application server and computer-readable storage medium |
CN109960944A (en) * | 2017-12-14 | 2019-07-02 | 中兴通讯股份有限公司 | A kind of data desensitization method, server, terminal and computer readable storage medium |
CN109977690A (en) * | 2017-12-28 | 2019-07-05 | ***通信集团陕西有限公司 | A kind of data processing method, device and medium |
CN110084065A (en) * | 2019-04-29 | 2019-08-02 | 北京口袋时尚科技有限公司 | Data desensitization method and device |
CN110138792A (en) * | 2019-05-21 | 2019-08-16 | 上海市疾病预防控制中心 | A kind of public health geodata goes privacy processing method and system |
CN110232290A (en) * | 2018-03-05 | 2019-09-13 | 中兴通讯股份有限公司 | Log desensitization method, server and storage medium |
CN110262787A (en) * | 2019-06-21 | 2019-09-20 | 北京搜房科技发展有限公司 | Sentence replacement method, device and electronic equipment |
CN110447035A (en) * | 2017-03-23 | 2019-11-12 | 微软技术许可有限责任公司 | User content is fuzzy in structuring subscriber data file |
CN110489997A (en) * | 2019-08-16 | 2019-11-22 | 北京计算机技术及应用研究所 | A kind of sensitive information desensitization method based on pattern matching algorithm |
CN110503455A (en) * | 2019-07-10 | 2019-11-26 | 平安普惠企业管理有限公司 | Product promotion method and relevant device based on information security |
CN110516466A (en) * | 2019-07-12 | 2019-11-29 | 苏州浪潮智能科技有限公司 | A kind of data desensitization method and device |
CN110516471A (en) * | 2019-08-15 | 2019-11-29 | 平安普惠企业管理有限公司 | Product promotion method and relevant device based on information security |
CN111030997A (en) * | 2019-11-12 | 2020-04-17 | 北京安天网络安全技术有限公司 | Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium |
CN111083135A (en) * | 2019-12-12 | 2020-04-28 | 深圳天源迪科信息技术股份有限公司 | Method for processing data by gateway and security gateway |
CN111241577A (en) * | 2020-01-06 | 2020-06-05 | 上海孚厘金融信息服务有限公司 | Method for desensitizing displayed data |
CN111428141A (en) * | 2020-04-23 | 2020-07-17 | 北京中安星云软件技术有限公司 | Method and device for associating application and database access behavior based on driving agent |
CN111740973A (en) * | 2020-06-16 | 2020-10-02 | 深圳市迈科龙电子有限公司 | Intelligent defense system and method for block chain service and application |
CN111818036A (en) * | 2020-06-30 | 2020-10-23 | 平安科技(深圳)有限公司 | Sensitive information protection method and device, computing equipment and storage medium |
CN112015651A (en) * | 2020-08-28 | 2020-12-01 | 北京互金新融科技有限公司 | Data processing method and device |
CN112559825A (en) * | 2020-12-28 | 2021-03-26 | 中国工商银行股份有限公司 | Service processing method, device, computing equipment and medium |
CN112613000A (en) * | 2020-12-22 | 2021-04-06 | 中国建设银行股份有限公司 | Sensitive information protection method and device, electronic equipment and readable storage medium |
CN112800474A (en) * | 2021-03-19 | 2021-05-14 | 北京安华金和科技有限公司 | Data desensitization method and device, storage medium and electronic device |
CN113051601A (en) * | 2019-12-27 | 2021-06-29 | 中移动信息技术有限公司 | Sensitive data identification method, device, equipment and medium |
CN113065163A (en) * | 2021-04-26 | 2021-07-02 | 好人生(上海)健康科技有限公司 | Big data oriented security data desensitization output method |
CN113343299A (en) * | 2021-06-18 | 2021-09-03 | 浪潮云信息技术股份公司 | Hive database dynamic desensitization system and implementation method |
CN113392425A (en) * | 2020-03-12 | 2021-09-14 | 中移物联网有限公司 | Data desensitization processing method and device, edge computing node and server |
CN113806808A (en) * | 2021-09-24 | 2021-12-17 | 四川新网银行股份有限公司 | Non-invasive data desensitization method and system in distributed environment |
WO2022012669A1 (en) * | 2020-07-16 | 2022-01-20 | 中兴通讯股份有限公司 | Data access method and device, and storage medium and electronic device |
CN114040404A (en) * | 2021-11-08 | 2022-02-11 | 中国电信股份有限公司 | Data distribution method, system, device and storage medium |
CN114726605A (en) * | 2022-03-30 | 2022-07-08 | 医渡云(北京)技术有限公司 | Sensitive data filtering method, device and system and computer equipment |
CN114040404B (en) * | 2021-11-08 | 2024-06-07 | 中国电信股份有限公司 | Data distribution method, system, equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013101723A1 (en) * | 2011-12-27 | 2013-07-04 | Wellpoint, Inc. | Method and system for data pattern matching, masking and removal of sensitive data |
CN103778380A (en) * | 2013-12-31 | 2014-05-07 | 网秦(北京)科技有限公司 | Data desensitization method and device and data anti-desensitization method and device |
CN104065750A (en) * | 2014-07-11 | 2014-09-24 | 中国人民公安大学 | Safety management method and system based on shared data |
CN104270465A (en) * | 2014-10-23 | 2015-01-07 | 成都双奥阳科技有限公司 | Cloud storage protection system |
CN104866775A (en) * | 2015-06-12 | 2015-08-26 | 四川友联信息技术有限公司 | Bleaching method for financial data |
CN105653981A (en) * | 2015-12-31 | 2016-06-08 | 中国电子科技网络信息安全有限公司 | Sensitive data protection system and method of data circulation and transaction of big data platform |
CN105956175A (en) * | 2016-05-24 | 2016-09-21 | 考拉征信服务有限公司 | Webpage content crawling method and device |
CN105975870A (en) * | 2016-05-19 | 2016-09-28 | 上海点荣金融信息服务有限责任公司 | Data desensitization method and system |
-
2016
- 2016-10-17 CN CN201610902955.5A patent/CN106407843A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013101723A1 (en) * | 2011-12-27 | 2013-07-04 | Wellpoint, Inc. | Method and system for data pattern matching, masking and removal of sensitive data |
CN103778380A (en) * | 2013-12-31 | 2014-05-07 | 网秦(北京)科技有限公司 | Data desensitization method and device and data anti-desensitization method and device |
CN104065750A (en) * | 2014-07-11 | 2014-09-24 | 中国人民公安大学 | Safety management method and system based on shared data |
CN104270465A (en) * | 2014-10-23 | 2015-01-07 | 成都双奥阳科技有限公司 | Cloud storage protection system |
CN104866775A (en) * | 2015-06-12 | 2015-08-26 | 四川友联信息技术有限公司 | Bleaching method for financial data |
CN105653981A (en) * | 2015-12-31 | 2016-06-08 | 中国电子科技网络信息安全有限公司 | Sensitive data protection system and method of data circulation and transaction of big data platform |
CN105975870A (en) * | 2016-05-19 | 2016-09-28 | 上海点荣金融信息服务有限责任公司 | Data desensitization method and system |
CN105956175A (en) * | 2016-05-24 | 2016-09-21 | 考拉征信服务有限公司 | Webpage content crawling method and device |
Cited By (79)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108470128A (en) * | 2017-02-23 | 2018-08-31 | 全球能源互联网研究院有限公司 | A kind of online desensitization method and device of power load data |
CN108470128B (en) * | 2017-02-23 | 2021-12-03 | 全球能源互联网研究院有限公司 | Online desensitization method and device for electric load data |
CN110447035A (en) * | 2017-03-23 | 2019-11-12 | 微软技术许可有限责任公司 | User content is fuzzy in structuring subscriber data file |
CN110447035B (en) * | 2017-03-23 | 2023-08-29 | 微软技术许可有限责任公司 | User content obfuscation in structured user data files |
CN107423632A (en) * | 2017-04-20 | 2017-12-01 | 北京同余科技有限公司 | Customizable sensitive data desensitization method and system |
CN107423632B (en) * | 2017-04-20 | 2020-09-15 | 国网浙江省电力有限公司营销服务中心 | Customizable sensitive data desensitization method and system |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN108809913A (en) * | 2017-05-04 | 2018-11-13 | ***通信集团重庆有限公司 | The method, apparatus and equipment of data desensitization |
CN107301349A (en) * | 2017-05-20 | 2017-10-27 | 北京明朝万达科技股份有限公司 | A kind of Access and control strategy of database method and system |
CN107507003B (en) * | 2017-06-26 | 2020-04-24 | 创新先进技术有限公司 | Service processing method, device and system |
CN111738729A (en) * | 2017-06-26 | 2020-10-02 | 创新先进技术有限公司 | Service processing method, device and system |
CN107507003A (en) * | 2017-06-26 | 2017-12-22 | 阿里巴巴集团控股有限公司 | A kind of method for processing business, equipment and system |
US11468445B2 (en) | 2017-06-26 | 2022-10-11 | Advanced New Technologies Co., Ltd. | Service processing method, device, and system |
US10984421B2 (en) | 2017-06-26 | 2021-04-20 | Advanced New Technologies Co., Ltd. | Service processing method, device, and system |
CN107392051A (en) * | 2017-07-28 | 2017-11-24 | 北京明朝万达科技股份有限公司 | A kind of big data processing method and system |
CN107403111A (en) * | 2017-08-10 | 2017-11-28 | 中国民航信息网络股份有限公司 | HIVE data desensitization method and device |
CN109426725A (en) * | 2017-08-22 | 2019-03-05 | 中兴通讯股份有限公司 | Data desensitization method, equipment and computer readable storage medium |
CN107563218A (en) * | 2017-08-23 | 2018-01-09 | 北京明朝万达科技股份有限公司 | A kind of data desensitization method and Hbase desensitization process systems based on big data |
CN107563218B (en) * | 2017-08-23 | 2019-01-15 | 北京明朝万达科技股份有限公司 | A kind of data desensitization method and Hbase desensitization process system based on big data |
CN107704770A (en) * | 2017-09-28 | 2018-02-16 | 平安普惠企业管理有限公司 | Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing |
CN107871086A (en) * | 2017-10-13 | 2018-04-03 | 平安科技(深圳)有限公司 | Sensitive information screen method, application server and computer-readable recording medium |
WO2019071892A1 (en) * | 2017-10-13 | 2019-04-18 | 平安科技(深圳)有限公司 | Method for transmitting masking rules for sensitive information, application server, and computer readable storage medium |
WO2019091102A1 (en) * | 2017-11-07 | 2019-05-16 | 平安科技(深圳)有限公司 | Desensitization rule configuration method and program, application server and computer-readable storage medium |
CN108021822A (en) * | 2017-11-30 | 2018-05-11 | 广州天鹏计算机科技有限公司 | The desensitization method and system of data |
CN109960944A (en) * | 2017-12-14 | 2019-07-02 | 中兴通讯股份有限公司 | A kind of data desensitization method, server, terminal and computer readable storage medium |
CN108182208A (en) * | 2017-12-18 | 2018-06-19 | 山东浪潮云服务信息科技有限公司 | A kind of method for interchanging data and platform |
CN109977690A (en) * | 2017-12-28 | 2019-07-05 | ***通信集团陕西有限公司 | A kind of data processing method, device and medium |
CN108288003A (en) * | 2017-12-29 | 2018-07-17 | 上海上讯信息技术股份有限公司 | A kind of Database Dynamic desensitization method and system based on more agency mechanisms |
CN108259491A (en) * | 2018-01-15 | 2018-07-06 | 北京炼石网络技术有限公司 | For the method, apparatus and its system of unstructured data safe handling |
CN108259491B (en) * | 2018-01-15 | 2021-07-16 | 北京炼石网络技术有限公司 | Method, device and system for safely processing unstructured data |
CN108418676A (en) * | 2018-01-26 | 2018-08-17 | 山东超越数控电子股份有限公司 | A kind of data desensitization method based on permission |
CN110232290A (en) * | 2018-03-05 | 2019-09-13 | 中兴通讯股份有限公司 | Log desensitization method, server and storage medium |
CN108595978A (en) * | 2018-03-30 | 2018-09-28 | 平安科技(深圳)有限公司 | Information screen method, apparatus, terminal and computer readable storage medium |
CN108681676A (en) * | 2018-04-03 | 2018-10-19 | 北京市商汤科技开发有限公司 | Data managing method and device, system, electronic equipment, program and storage medium |
CN108537062A (en) * | 2018-04-24 | 2018-09-14 | 山东华软金盾软件股份有限公司 | A kind of method of database data dynamic encryption |
CN108537062B (en) * | 2018-04-24 | 2022-03-22 | 山东华软金盾软件股份有限公司 | Dynamic encryption method for database data |
CN108809516B (en) * | 2018-05-17 | 2020-12-11 | 杭州安恒信息技术股份有限公司 | High-security coding and decoding method for desensitization of formatted data |
CN108809516A (en) * | 2018-05-17 | 2018-11-13 | 杭州安恒信息技术股份有限公司 | A kind of high security coding-decoding method of format data desensitization |
CN108875404B (en) * | 2018-05-30 | 2022-05-20 | 中国联合网络通信集团有限公司 | Data desensitization method and device based on machine learning and storage medium |
CN108875404A (en) * | 2018-05-30 | 2018-11-23 | 中国联合网络通信集团有限公司 | Data desensitization method, device and storage medium based on machine learning |
CN108959964A (en) * | 2018-06-29 | 2018-12-07 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus and computer equipment for message desensitization |
CN109189675A (en) * | 2018-08-20 | 2019-01-11 | 中国平安人寿保险股份有限公司 | Big data Framework Software test method, device, computer equipment and storage medium |
CN109271807A (en) * | 2018-08-20 | 2019-01-25 | 深圳萨摩耶互联网金融服务有限公司 | The data safety processing method and system of database |
CN109308258A (en) * | 2018-08-21 | 2019-02-05 | 中国平安人寿保险股份有限公司 | Building method, device, computer equipment and the storage medium of test data |
CN109299616A (en) * | 2018-09-07 | 2019-02-01 | 北明软件有限公司 | A kind of data safety managing and control system and method based on connection pool |
CN109657496A (en) * | 2018-12-20 | 2019-04-19 | 中国电子科技网络信息安全有限公司 | A kind of big data static database desensitization system and method for the full mirror image of zero-copy |
CN110084065B (en) * | 2019-04-29 | 2021-07-30 | 北京口袋时尚科技有限公司 | Data desensitization method and device |
CN110084065A (en) * | 2019-04-29 | 2019-08-02 | 北京口袋时尚科技有限公司 | Data desensitization method and device |
CN110138792B (en) * | 2019-05-21 | 2020-01-14 | 上海市疾病预防控制中心 | Public health geographic data privacy removal processing method and system |
CN110138792A (en) * | 2019-05-21 | 2019-08-16 | 上海市疾病预防控制中心 | A kind of public health geodata goes privacy processing method and system |
CN110262787A (en) * | 2019-06-21 | 2019-09-20 | 北京搜房科技发展有限公司 | Sentence replacement method, device and electronic equipment |
CN110503455A (en) * | 2019-07-10 | 2019-11-26 | 平安普惠企业管理有限公司 | Product promotion method and relevant device based on information security |
CN110516466A (en) * | 2019-07-12 | 2019-11-29 | 苏州浪潮智能科技有限公司 | A kind of data desensitization method and device |
CN110516471A (en) * | 2019-08-15 | 2019-11-29 | 平安普惠企业管理有限公司 | Product promotion method and relevant device based on information security |
CN110516471B (en) * | 2019-08-15 | 2022-05-17 | 平安普惠企业管理有限公司 | Product promotion method based on information security and related equipment |
CN110489997A (en) * | 2019-08-16 | 2019-11-22 | 北京计算机技术及应用研究所 | A kind of sensitive information desensitization method based on pattern matching algorithm |
CN111030997A (en) * | 2019-11-12 | 2020-04-17 | 北京安天网络安全技术有限公司 | Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium |
CN111083135A (en) * | 2019-12-12 | 2020-04-28 | 深圳天源迪科信息技术股份有限公司 | Method for processing data by gateway and security gateway |
CN113051601B (en) * | 2019-12-27 | 2024-05-03 | 中移动信息技术有限公司 | Sensitive data identification method, device, equipment and medium |
CN113051601A (en) * | 2019-12-27 | 2021-06-29 | 中移动信息技术有限公司 | Sensitive data identification method, device, equipment and medium |
CN111241577A (en) * | 2020-01-06 | 2020-06-05 | 上海孚厘金融信息服务有限公司 | Method for desensitizing displayed data |
CN113392425A (en) * | 2020-03-12 | 2021-09-14 | 中移物联网有限公司 | Data desensitization processing method and device, edge computing node and server |
CN111428141A (en) * | 2020-04-23 | 2020-07-17 | 北京中安星云软件技术有限公司 | Method and device for associating application and database access behavior based on driving agent |
CN111740973A (en) * | 2020-06-16 | 2020-10-02 | 深圳市迈科龙电子有限公司 | Intelligent defense system and method for block chain service and application |
CN111818036A (en) * | 2020-06-30 | 2020-10-23 | 平安科技(深圳)有限公司 | Sensitive information protection method and device, computing equipment and storage medium |
CN111818036B (en) * | 2020-06-30 | 2021-06-04 | 平安科技(深圳)有限公司 | Sensitive information protection method and device, computing equipment and storage medium |
WO2022012669A1 (en) * | 2020-07-16 | 2022-01-20 | 中兴通讯股份有限公司 | Data access method and device, and storage medium and electronic device |
CN112015651A (en) * | 2020-08-28 | 2020-12-01 | 北京互金新融科技有限公司 | Data processing method and device |
CN112015651B (en) * | 2020-08-28 | 2023-10-27 | 北京互金新融科技有限公司 | Data processing method and device |
CN112613000A (en) * | 2020-12-22 | 2021-04-06 | 中国建设银行股份有限公司 | Sensitive information protection method and device, electronic equipment and readable storage medium |
CN112559825B (en) * | 2020-12-28 | 2024-02-23 | 中国工商银行股份有限公司 | Service processing method, device, computing equipment and medium |
CN112559825A (en) * | 2020-12-28 | 2021-03-26 | 中国工商银行股份有限公司 | Service processing method, device, computing equipment and medium |
CN112800474A (en) * | 2021-03-19 | 2021-05-14 | 北京安华金和科技有限公司 | Data desensitization method and device, storage medium and electronic device |
CN113065163A (en) * | 2021-04-26 | 2021-07-02 | 好人生(上海)健康科技有限公司 | Big data oriented security data desensitization output method |
CN113343299A (en) * | 2021-06-18 | 2021-09-03 | 浪潮云信息技术股份公司 | Hive database dynamic desensitization system and implementation method |
CN113806808A (en) * | 2021-09-24 | 2021-12-17 | 四川新网银行股份有限公司 | Non-invasive data desensitization method and system in distributed environment |
CN114040404A (en) * | 2021-11-08 | 2022-02-11 | 中国电信股份有限公司 | Data distribution method, system, device and storage medium |
CN114040404B (en) * | 2021-11-08 | 2024-06-07 | 中国电信股份有限公司 | Data distribution method, system, equipment and storage medium |
CN114726605A (en) * | 2022-03-30 | 2022-07-08 | 医渡云(北京)技术有限公司 | Sensitive data filtering method, device and system and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106407843A (en) | Data desensitization method and data desensitization device | |
US20200285978A1 (en) | Model training system and method, and storage medium | |
CN106599713B (en) | A kind of database desensitization system and method based on big data | |
CN104125197B (en) | A kind of security baseline system and its method for realizing safety inspection | |
CN107871083A (en) | Desensitize regular collocation method, application server and computer-readable recording medium | |
CN110443059A (en) | Data guard method and device | |
CN112383546A (en) | Method for processing network attack behavior, related device and storage medium | |
CN105765901B (en) | Intelligent firewall access rule | |
CN110851860A (en) | Power consumption data desensitization algorithm model construction method based on anonymization privacy technology | |
CN109271807A (en) | The data safety processing method and system of database | |
CN107426231A (en) | A kind of method and device for identifying user behavior | |
CN108234426B (en) | APT attack warning method and APT attack warning device | |
CN106055609A (en) | nginx log monitoring method and apparatus, message distribution system and information processing apparatus | |
CN112000992B (en) | Data leakage prevention protection method and device, computer readable medium and electronic equipment | |
US20190005252A1 (en) | Device for self-defense security based on system environment and user behavior analysis, and operating method therefor | |
CN109299616A (en) | A kind of data safety managing and control system and method based on connection pool | |
CN112035344A (en) | Multi-scenario test method, device, equipment and computer readable storage medium | |
WO2021234464A2 (en) | Systems and methods for device detection and registration | |
CN111190950B (en) | Asset retrieval method and device | |
CN110798353A (en) | Network behavior risk perception and defense method based on behavior characteristic big data analysis | |
CN105260378A (en) | Database audit method and device | |
CN113794735B (en) | Sensitive data security protection method in SAAS system scene | |
CN106959903A (en) | Trap instruction Trap processing method and processing device | |
CN114826790A (en) | Block chain monitoring method, device, equipment and storage medium | |
CN114840574A (en) | Data query method, server, node and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170215 |
|
RJ01 | Rejection of invention patent application after publication |