CN110020553A - A kind of method and system for protecting sensitive data - Google Patents

A kind of method and system for protecting sensitive data Download PDF

Info

Publication number
CN110020553A
CN110020553A CN201910293345.3A CN201910293345A CN110020553A CN 110020553 A CN110020553 A CN 110020553A CN 201910293345 A CN201910293345 A CN 201910293345A CN 110020553 A CN110020553 A CN 110020553A
Authority
CN
China
Prior art keywords
sensitive data
data
database
sensitive
classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910293345.3A
Other languages
Chinese (zh)
Inventor
李向阳
刘昊东
郝文祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Cloud Information Technology Co Ltd
Original Assignee
Shandong Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Cloud Information Technology Co Ltd filed Critical Shandong Inspur Cloud Information Technology Co Ltd
Priority to CN201910293345.3A priority Critical patent/CN110020553A/en
Publication of CN110020553A publication Critical patent/CN110020553A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of method and system for protecting sensitive data, belong to the safe Treatment process field of government data.The method of protection sensitive data of the invention; this method includes carrying out finding and arranging sensitive data to sensitive data; to the sensitive data scan database of discovery; classification classification is carried out to each sensitive field using the data classification grade scale of foundation, the permission of different user in database, different objects comb and supervision authority changes.The method of the protection sensitive data of the invention can ensure that sensitive data is accurately and efficiently found and combed, and all protect to each outlet of sensitive data, and the probability of data leak event generation is effectively reduced, and have good application value.

Description

A kind of method and system for protecting sensitive data
Technical field
The present invention relates to the safe Treatment process field of government data, a kind of method that protecting sensitive data is specifically provided and is System.
Background technique
With cloud computing, the fast development of big data, " internet+" is widely applied in government affairs capacity building;Various regions The government affairs cloud of government is built to get through data silo, big data is shared, based on cloud platform construction, and target is to realize to run with data Road runs away instead of people, simplifies the working link of common people and enterprise;It is final to realize that a window is accepted, allow common people and enterprise to handle thing Xiang Shi, " at most running primary ", so that government affairs cloud effectively be landed, establishes the proprietary cloud application of government affairs of " internet+government affairs ".But It is during data " flowing ", there are many incipient fault for data security: protects the angle for closing rule from network safety grade Degree meets government affairs cloud data safety and closes rule, eliminates the problem of private data leakage risk is the task of top priority;From government affairs cloud and big number According to the supervision angle of platform, then whether be concerned about data " health ", whether data true, complete, credible, data use process is medium Whether can be leaked and be distorted in batches.Data are the discovery that one of important component of data safety, main purpose are to do sensitivity The discovery and classification work of data.In government affairs cloud business scenario, with being continuously increased for data assets, administrator is often How many platform of the database of oneself on cloud be difficult to get information about, how to be distributed, if is opened.It is special according to the business of government affairs cloud Sign, sensitive data generally comprise personal cell-phone number, address, social security information, common reserve fund information, house property information, diagnosis information etc., The non-publicity item information such as tax information, the equity information of enterprise.These information are extremely important to a industry or enterprise, once it lets out Leakage, not only causes damages to the prestige of government, it is most likely that causes economic loss to personal or enterprise, therefore, it is necessary to sensitivity The access of data needs to carry out stringent control.
Summary of the invention
Technical assignment of the invention is that in view of the above problems, providing one kind can ensure sensitive data by accurate high The discovery of effect ground and combing, and each outlet of sensitive data is all protected, the general of data leak event generation is effectively reduced The method of the protection sensitive data of rate.
The further technical assignment of the present invention is to provide a kind of system for protecting sensitive data.
To achieve the above object, the present invention provides the following technical scheme that
A method of protection sensitive data, this method include carrying out discovery to sensitive data and carrying out to sensitive data whole Reason divides each sensitive field the sensitive data scan database of discovery using the data classification grade scale of foundation Class classification comb to the permission of different user in database, different objects and supervision authority changes.
Preferably, carrying out carrying out cloud database sniff, the cloud being reconfigured first in discovery procedure to sensitive data Database.
Preferably, cloud database sniff provides the function of searching for proprietary middle database automatically, IP sections and port are formulated Range scans for.
Preferably, the essential information that cloud database is found automatically includes: port numbers, type of database, database reality Example name and database server ip address.
Preferably, being the field setting identification matching algorithm in data source, obtaining in the cloud database that configuration obtains After configured data source and the algorithm set, each table of data source is carried out with the random sampling of behavior unit, it will Data are identified by the matching algorithm set.
Preferably, classification classification is carried out to the sensitive data identified during arranging to sensitive data, according to Different data feature, classifies to sensitive data.
Preferably, different sensitive ranks is specified when classifying to sensitive data for different data types, from It is dynamic that susceptibility scoring is carried out to the table comprising sensitive data, mode and library.
A kind of system for protecting sensitive data, which includes sensitive data discovery module and sensitive data sorting module;
Sensitive data discovery module is for finding sensitive data, and to the sensitive data scan database of discovery;
Sensitive data sorting module carries out classification classification to each sensitive field using the data classification grade scale of foundation, The permission of different user in database, different objects comb and supervision authority variation.
Preferably, sensitive data discovery module carry out cloud database first in discovery procedure and smell to sensitive data Visit, the cloud database being reconfigured, cloud database sniff provides searches for the function of proprietary middle database automatically, formulate IP section with The range of port scans for, and the essential information that cloud database is found automatically includes: port numbers, type of database, database Instance Name and database server ip address.
Preferably, during the sensitive data sorting module arranges sensitive data, to the sensitivity identified Data carry out classification classification, specified for different data types when classifying to sensitive data according to different data feature Different sensitive ranks carries out susceptibility scoring to the table comprising sensitive data, mode and library automatically.
Compared with prior art, the method for protection sensitive data of the invention has following prominent the utility model has the advantages that described The method administrator of protection sensitive data can more intuitively understand how many platform of the database of oneself on cloud, how to be distributed, be No unlatching can increase substantially the accuracy and speed of data classification classification, use manpower and material resources sparingly;Make simultaneously according to according to data Role, responsibility and other IT of user define identity characteristic, dynamically carry out special safe handling to the data that request returns, It can ensure that the data consumer of the different stage access sensitive data apt according to its identity characteristic, data be effectively reduced and let out The probability that leakage event occurs has good application value.
Detailed description of the invention
Fig. 1 is the flow chart of the specific embodiment of the method for protection sensitive data of the present invention.
Specific embodiment
Below in conjunction with embodiment, the method and system of protection sensitive data of the invention are described in further detail.
Embodiment
The method of protection sensitive data of the invention, including discovery is carried out to sensitive data and sensitive data is carried out whole Reason divides each sensitive field the sensitive data scan database of discovery using the data classification grade scale of foundation Class classification comb to the permission of different user in database, different objects and supervision authority changes.
The background data base of government affairs cloud large-scale application has a tables up to a hundred and thousands of column, to protect core data to provide It produces, first it is to be understood which data is sensitive data, table and column is scanned by sensitive data discovery feature, it is close to find The sensitive datas such as code, identification information, credit card, while user passes through the side of customized sensitive objects search key Formula finds the specific sensitive data of user.Role, responsibility and other IT according to data consumer define identity characteristic, dynamic The data that request is returned carry out special safe handling, it is ensured that the data consumer of different stage is proper according to its identity characteristic Such as the access sensitive data of its point, the probability of data leak event generation is effectively reduced.
Sensitive data is found and is arranged, data staging classification mechanism is improved: in data in use, different number According to different sensitive rank and level of confidentiality is possessed, security strategy needed for the data of different stage and reinforcing mode are all different. By the deciding grade and level mechanism perfect to sensitive data, administrator is assisted to judge table in database, mode and the sensitive rank in whole library, just In further formulating government affairs cloud Data Security or taking suitable data reinforcement measure, different grades of sensitive data is protected.
Administrator understands the permission variation of data assets by the variation of monitoring data permission in real time, according to user's dimension, right As dimension carries out analysis and arrangement to the permission of database, the situation of change of permission between different rounds scannings is compared.Real time inspection, Show the real-time secured views of database;Periodic scanning reflects variation of the current safety situation relative to baseline, checks detailed Changing condition realizes the unified management to sensitive data.
Sensitive data is carried out to carry out cloud database sniff first in discovery procedure, the cloud database being reconfigured.
Its medium cloud database sniff provides searches for the function of proprietary middle database automatically, formulate IP section with the range of port into Row search.The essential information that cloud database is found automatically includes: port numbers, type of database, database instance name and data Library server ip address.It configures in obtained cloud database, is the field setting identification matching algorithm in data source, is obtaining After the data source of configuration and the algorithm set, each table of data source will count with the random sampling of behavior unit It is identified according to by the matching algorithm set.Hit rate can be set in matching algorithm, if certain column is to matching algorithm Hit rate is up to standard, then the field is sensitive field, and it is 80%, 90%, 95% that hit rate, which can be adjusted according to the actual situation,. If recognizing sensitive data field, record and save.By automatic identification sensitive data, avoid according to field definition The cumbersome work of sensitive data member, while the sensitive data that lasting discovery is new.
During arranging to sensitive data, classification classification is carried out to the sensitive data identified, according to different data Feature classifies to sensitive data.Different sensitivities is specified when classifying to sensitive data for different data types Rank carries out susceptibility scoring to the table comprising sensitive data, mode and library automatically.
According to different data feature, to common such as name, certificate number, bank account, the amount of money, date, address, phone number Code, the address Email, license plate number, Vehicle Identify Number, enterprise name, industrial and commercial registration number, organization mechanism code, Taxpayer Identification Number etc. are quick Sense data are classified.Specify different sensitive ranks for different data types, system is automatically to containing sensitive data Table, mode, library carry out susceptibility scoring.
To different user in database, the permission of different objects comb and supervision authority variation.To needing control The database of limit creates a corresponding resource table;Access user is created again, user's table is established, then by user and money Source opening relationships, establishes user resources relation table, comprising type of database, ID, database user name, close in the information of configuration Code, chained address, port etc..It is different with the user for authorizing different to different access user configuration one or more resources Access the permission of resource.When user query database, the database-name of user query is obtained, judges whether user has access Permission;If there is the access authority of database, then judge whether user has the access authority of table again;If user has corresponding table Permission, then corresponding field information is obtained from corresponding database and table according to database name and table name and returns to user. The case where being accessed by which user the object in database carries out induction and conclusion, especially to the table for containing sensitive columns or The higher object of susceptibility scoring, monitors emphatically its access authority dividing condition.Sensitivity can be used normally in the user having permission Data, the user of permission does not need to initiate approval request then using sensitive data, cannot use if examination & approval do not pass through quick Feel data.
When application query sensitive data, by data safety network gateway to the result set that inquiry returns carry out parsing line by line, Compare filtering, and to sensitive data carry out desensitization masking processing after, return to API.Preservation tactics are as follows: defaulting to all quick Sense information is covered;By Provisioning Policy, the application system of authorization is handled without masking or part masking;It is awarded in examination & approval Under the premise of power passes through, data API can inform the data that do not cover by parameter.
Operation maintenance personnel can have permission inquiry data, meeting during carrying out daily O&M to the data in database There is the phenomenon that inquiring in violation of rules and regulations, Preservation tactics are as follows: all O&M operations, it is necessary to by the mistake of database security gateway It filters (being namely connected in series in network), the result set data of O&M inquiry is filtered, according to the type of field, carry out corresponding Masking processing;The operation of operation maintenance personnel of auditing inquiry sensitive data, and analysis alarm is carried out to User behavior.
It can be stored in due to sensitive data in the index data of ES system, be retrieved for total factor and carry out full-text search inquiry, Therefore there may be sensitive data in query result, total factor retrieval application is to be completed by " retrieval API " to ES index data Full-text search, and collection data are returned the result by the API.Preservation tactics are as follows: disposing number in " retrieval API " service routine According to filter assemblies;Retrieval API calls filter assemblies to the result set data of return line by line, and filter assemblies unidirectionally add to data It is compared after close;If comparison result finds sensitive data, corresponding masking processing is carried out to sensitive data, such as deviate and take Whole, mask shielding, flexibly coding etc..
As shown in Figure 1, the method for protection sensitive data of the invention, detailed process is as follows:
1) data use: data use is divided into total factor retrieval application, application system use and data O&M.
2) API, data safety network gateway are retrieved: disposing " data filtering " component, filtering group in " retrieval API " service routine Part is compared to after the result progress One-Way Encryption of return with sensitive data;Data safety network gateway produces the result for needing milk to O&M Collection data are filtered and carry out relevant masking processing.
3) data sharing: first shared data to be compared with sensitive data inventory before data sharing, to sensitive number It is then exported again according to desensitize.
4) control flow: sensitive data can be used in the user having permission, and the user of permission does not need to initiate to examine to ask It asks, sensitive data cannot be used if examination & approval do not pass through.
5) sensitive data encryption storage: the storage of sensitive data is encrypted, prevents from being dragged library and the person of being managed It checks.
The system of protection sensitive data of the invention, the system include that sensitive data discovery module and sensitive data arrange mould Block;
Sensitive data discovery module is for finding sensitive data, and to the sensitive data scan database of discovery;
Sensitive data sorting module carries out classification classification to each sensitive field using the data classification grade scale of foundation, The permission of different user in database, different objects comb and supervision authority variation.
Preferably, sensitive data discovery module carry out cloud database first in discovery procedure and smell to sensitive data Visit, the cloud database being reconfigured, cloud database sniff provides searches for the function of proprietary middle database automatically, formulate IP section with The range of port scans for, and the essential information that cloud database is found automatically includes: port numbers, type of database, database Instance Name and database server ip address.
Preferably, during the sensitive data sorting module arranges sensitive data, to the sensitivity identified Data carry out classification classification, specified for different data types when classifying to sensitive data according to different data feature Different sensitive ranks carries out susceptibility scoring to the table comprising sensitive data, mode and library automatically.
Embodiment described above, the only present invention more preferably specific embodiment, those skilled in the art is at this The usual variations and alternatives carried out within the scope of inventive technique scheme should be all included within the scope of the present invention.

Claims (10)

1. a kind of method for protecting sensitive data, it is characterised in that: this method includes carrying out discovery to sensitive data and to sensitivity Data are arranged, to the sensitive data scan database of discovery, using the data classification grade scale of foundation to each sensitivity Field carries out classification classification, comb to the permission of different user in database, different objects and supervision authority changes.
2. the method for protection sensitive data according to claim 1, it is characterised in that: carry out discovery procedure to sensitive data In carry out cloud database sniff first, the cloud database being reconfigured.
3. the method for protection sensitive data according to claim 2, it is characterised in that: the offer of cloud database sniff is searched automatically The function of the proprietary middle database of rope, the range for formulating IP sections and port scan for.
4. the method for protection sensitive data according to claim 3, it is characterised in that: the base that cloud database is found automatically This information includes: port numbers, type of database, database instance name and database server ip address.
5. the method for protection sensitive data according to claim 4, it is characterised in that: in the cloud database configured, Matching algorithm is identified for the field setting in data source, after the configured data source of acquisition and the algorithm set, to data The each table in source identified data by the matching algorithm set with the random sampling of behavior unit.
6. the method for protection sensitive data according to claim 5, it is characterised in that: carry out arrangement process to sensitive data In, classification classification is carried out to the sensitive data identified, according to different data feature, is classified to sensitive data.
7. the method for protection sensitive data according to claim 6, it is characterised in that: carry out classification hour hands to sensitive data Different sensitive ranks is specified to different data types, and susceptibility is carried out to the table comprising sensitive data, mode and library automatically Scoring.
8. a kind of system for protecting sensitive data, it is characterised in that: the system includes sensitive data discovery module and sensitive data Sorting module;
Sensitive data discovery module is for finding sensitive data, and to the sensitive data scan database of discovery;
Sensitive data sorting module carries out classification classification, logarithm to each sensitive field using the data classification grade scale of foundation Comb according to the permission of different user in library, different objects and supervision authority variation.
9. the system of protection sensitive data according to claim 8, it is characterised in that: sensitive data discovery module is to sensitivity Data carry out carrying out cloud database sniff first in discovery procedure, and the cloud database being reconfigured, cloud database sniff provides Automatically the function of proprietary middle database is searched for, the range for formulating IP sections and port scans for, what cloud database was found automatically Essential information includes: port numbers, type of database, database instance name and database server ip address.
10. the system of protection sensitive data according to claim 9, it is characterised in that: the sensitive data sorting module During arranging to sensitive data, classification classification is carried out to the sensitive data identified, according to different data feature, to quick Sense data specify different sensitive ranks for different data types when being classified, automatically to the table comprising sensitive data, Mode and library carry out susceptibility scoring.
CN201910293345.3A 2019-04-12 2019-04-12 A kind of method and system for protecting sensitive data Pending CN110020553A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910293345.3A CN110020553A (en) 2019-04-12 2019-04-12 A kind of method and system for protecting sensitive data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910293345.3A CN110020553A (en) 2019-04-12 2019-04-12 A kind of method and system for protecting sensitive data

Publications (1)

Publication Number Publication Date
CN110020553A true CN110020553A (en) 2019-07-16

Family

ID=67191196

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910293345.3A Pending CN110020553A (en) 2019-04-12 2019-04-12 A kind of method and system for protecting sensitive data

Country Status (1)

Country Link
CN (1) CN110020553A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110399749A (en) * 2019-08-05 2019-11-01 杭州安恒信息技术股份有限公司 Data assets management method and system
CN110661776A (en) * 2019-07-29 2020-01-07 奇安信科技集团股份有限公司 Sensitive data tracing method, device, security gateway and system
CN110795751A (en) * 2019-10-30 2020-02-14 浪潮云信息技术有限公司 Method for carrying out safety protection on sensitive data through natural language analysis
CN110941956A (en) * 2019-10-26 2020-03-31 华为技术有限公司 Data classification method, device and related equipment
CN112069183A (en) * 2020-09-07 2020-12-11 中国平安财产保险股份有限公司 Shielded data management method and device, electronic equipment and readable storage medium
CN112085374A (en) * 2020-09-04 2020-12-15 浪潮云信息技术股份公司 Intelligent monitoring object abnormity self-checking pushing method
CN112231715A (en) * 2020-11-11 2021-01-15 福建有度网络安全技术有限公司 Data leakage warning method and related device
CN112417391A (en) * 2020-10-28 2021-02-26 深圳市橡树黑卡网络科技有限公司 Information data security processing method, device, equipment and storage medium
CN112861142A (en) * 2021-02-22 2021-05-28 北京安华金和科技有限公司 Database risk level determination method and device, storage medium and electronic device
CN113347213A (en) * 2021-08-05 2021-09-03 环球数科集团有限公司 Trusted channel authentication system based on protection of sensitive data of evanescent member
CN114205118A (en) * 2021-11-17 2022-03-18 南方电网数字电网研究院有限公司 Data access control analysis method based on data security method category
CN114339734A (en) * 2022-03-04 2022-04-12 深圳市恒讯通电子有限公司 Wireless communication network data sharing method and device based on mobile equipment
CN115659407A (en) * 2022-12-15 2023-01-31 北京市大数据中心 Data asset processing method, device and medium
CN116881687A (en) * 2023-06-25 2023-10-13 国网冀北电力有限公司信息通信分公司 Power grid sensitive data identification method and device based on feature extraction
CN117194751A (en) * 2023-11-08 2023-12-08 杭州易康信科技有限公司 Government electronic data screening method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376272A (en) * 2014-11-13 2015-02-25 青岛龙泰天翔通信科技有限公司 Cloud computing enterprise information system and user right setting method thereof
CN105095519A (en) * 2015-09-18 2015-11-25 北京金山安全软件有限公司 User data management method and device and electronic equipment
CN105721245A (en) * 2016-02-02 2016-06-29 四川长虹电器股份有限公司 Network data sniffing realization method based on rapid connection protocol
CN106789964A (en) * 2016-12-02 2017-05-31 ***通信集团新疆有限公司 Cloud resource pool data safety detection method and system
CN109525671A (en) * 2018-11-26 2019-03-26 远光软件股份有限公司 Date storage method, electronic equipment and storage medium based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376272A (en) * 2014-11-13 2015-02-25 青岛龙泰天翔通信科技有限公司 Cloud computing enterprise information system and user right setting method thereof
CN105095519A (en) * 2015-09-18 2015-11-25 北京金山安全软件有限公司 User data management method and device and electronic equipment
CN105721245A (en) * 2016-02-02 2016-06-29 四川长虹电器股份有限公司 Network data sniffing realization method based on rapid connection protocol
CN106789964A (en) * 2016-12-02 2017-05-31 ***通信集团新疆有限公司 Cloud resource pool data safety detection method and system
CN109525671A (en) * 2018-11-26 2019-03-26 远光软件股份有限公司 Date storage method, electronic equipment and storage medium based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
九天科技: "《黑客攻防从新手到高手》", 31 October 2013 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661776B (en) * 2019-07-29 2021-12-24 奇安信科技集团股份有限公司 Sensitive data tracing method, device, security gateway and system
CN110661776A (en) * 2019-07-29 2020-01-07 奇安信科技集团股份有限公司 Sensitive data tracing method, device, security gateway and system
CN110399749B (en) * 2019-08-05 2021-04-23 杭州安恒信息技术股份有限公司 Data asset management method and system
CN110399749A (en) * 2019-08-05 2019-11-01 杭州安恒信息技术股份有限公司 Data assets management method and system
CN110941956A (en) * 2019-10-26 2020-03-31 华为技术有限公司 Data classification method, device and related equipment
CN110795751A (en) * 2019-10-30 2020-02-14 浪潮云信息技术有限公司 Method for carrying out safety protection on sensitive data through natural language analysis
CN112085374A (en) * 2020-09-04 2020-12-15 浪潮云信息技术股份公司 Intelligent monitoring object abnormity self-checking pushing method
CN112069183A (en) * 2020-09-07 2020-12-11 中国平安财产保险股份有限公司 Shielded data management method and device, electronic equipment and readable storage medium
CN112069183B (en) * 2020-09-07 2024-05-03 中国平安财产保险股份有限公司 Method and device for managing shielding data, electronic equipment and readable storage medium
CN112417391B (en) * 2020-10-28 2023-12-19 深圳市橡树黑卡网络科技有限公司 Information data security processing method, device, equipment and storage medium
CN112417391A (en) * 2020-10-28 2021-02-26 深圳市橡树黑卡网络科技有限公司 Information data security processing method, device, equipment and storage medium
CN112231715A (en) * 2020-11-11 2021-01-15 福建有度网络安全技术有限公司 Data leakage warning method and related device
CN112861142A (en) * 2021-02-22 2021-05-28 北京安华金和科技有限公司 Database risk level determination method and device, storage medium and electronic device
CN113347213A (en) * 2021-08-05 2021-09-03 环球数科集团有限公司 Trusted channel authentication system based on protection of sensitive data of evanescent member
CN114205118B (en) * 2021-11-17 2023-10-27 南方电网数字电网研究院有限公司 Data access control analysis method based on data security method category
CN114205118A (en) * 2021-11-17 2022-03-18 南方电网数字电网研究院有限公司 Data access control analysis method based on data security method category
CN114339734A (en) * 2022-03-04 2022-04-12 深圳市恒讯通电子有限公司 Wireless communication network data sharing method and device based on mobile equipment
CN115659407A (en) * 2022-12-15 2023-01-31 北京市大数据中心 Data asset processing method, device and medium
CN116881687A (en) * 2023-06-25 2023-10-13 国网冀北电力有限公司信息通信分公司 Power grid sensitive data identification method and device based on feature extraction
CN116881687B (en) * 2023-06-25 2024-04-05 国网冀北电力有限公司信息通信分公司 Power grid sensitive data identification method and device based on feature extraction
CN117194751A (en) * 2023-11-08 2023-12-08 杭州易康信科技有限公司 Government electronic data screening method and system
CN117194751B (en) * 2023-11-08 2024-04-19 杭州易康信科技有限公司 Government electronic data screening method and system

Similar Documents

Publication Publication Date Title
CN110020553A (en) A kind of method and system for protecting sensitive data
US20220284120A1 (en) System and method of filtering consumer data
Lee et al. An effective security measures for nuclear power plant using big data analysis approach
CN111738549A (en) Food safety risk assessment method, device, equipment and storage medium
CN107577939A (en) Data leakage prevention method based on keyword technology
CN112417492A (en) Service providing method based on data classification and classification
CN110020687B (en) Abnormal behavior analysis method and device based on operator situation perception portrait
US11381591B2 (en) Information security system based on multidimensional disparate user data
CN107733902A (en) A kind of monitoring method and device of target data diffusion process
Bellomarini et al. COVID-19 and company knowledge graphs: assessing golden powers and economic impact of selective lockdown via AI reasoning
CN111915331A (en) Enterprise credit investigation data management method and system based on block chain
CN113709170A (en) Asset safe operation system, method and device
CN116738449A (en) DSMM-based data security management and control and operation system
Hajian Simultaneous discrimination prevention and privacy protection in data publishing and mining
Makarova Determining the choice of attack methods approach
De et al. A refinement approach for the reuse of privacy risk analysis results
CN114205118A (en) Data access control analysis method based on data security method category
CN117473527A (en) Data security risk analysis method, device, equipment and storage medium
Alzahrani Estimating Security Risk of Healthcare Web Applications: A Design Perspective.
Zaki et al. Analyzing financial fraud cases using a linguistics-based text mining approach
Dvojmoč Corporate intelligence as the new reality: The necessity of corporate security in modern global business
Nayak et al. Automatic detection and analysis of dpp entities in legal contract documents
Pavolotsky Demystifying big data
Malek Bigger Is Always Not Better; less Is More, Sometimes: The Concept of Data Minimization in the Context of Big Data
Liu et al. Exploring the Path of Personal Information Infringement Governance by Web Crawlers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190716