CN112800447A - Data meaning configuration format based reserved encryption method and system - Google Patents

Data meaning configuration format based reserved encryption method and system Download PDF

Info

Publication number
CN112800447A
CN112800447A CN202110108738.XA CN202110108738A CN112800447A CN 112800447 A CN112800447 A CN 112800447A CN 202110108738 A CN202110108738 A CN 202110108738A CN 112800447 A CN112800447 A CN 112800447A
Authority
CN
China
Prior art keywords
data
dictionary
selecting
meaning
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110108738.XA
Other languages
Chinese (zh)
Inventor
黄山姗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Mininglamp Software System Co ltd
Original Assignee
Beijing Mininglamp Software System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Mininglamp Software System Co ltd filed Critical Beijing Mininglamp Software System Co ltd
Priority to CN202110108738.XA priority Critical patent/CN112800447A/en
Publication of CN112800447A publication Critical patent/CN112800447A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation
    • G06F40/157Transformation using dictionaries or tables

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for preserving encryption based on a data meaning configuration format, wherein the method comprises the following steps: acquiring a content identification specification; acquiring information of a preset dictionary; selecting data to be encrypted; based on the content recognition specification and the dictionary, configuring the data according to the content of the data, wherein the configuration process comprises the following steps: selecting a dictionary to be replaced according to the data type and setting a limiting condition; selecting a corresponding replacement data range according to the data meaning; and selecting a corresponding check formula according to the data meaning, and setting whether the check bit needs to be recalculated for the encrypted data for the data field with the check bit. The invention reduces the perception of personnel to the details such as the field position, but converts the details into the content which is convenient for communication such as the region and the date, avoids configuration errors, reduces the learning cost and achieves a more accurate content simulation effect.

Description

Data meaning configuration format based reserved encryption method and system
Technical Field
The invention relates to the technical field of information security, in particular to a method and a system for preserving encryption based on a data meaning configuration format.
Background
Gartner mentions the problems of data privacy and security in the ten major data trends in 2019 and 2020, and if the security of data acquisition, storage and use in enterprises is problematic, the reputation of the enterprises is influenced, legal problems are caused, and the enterprises pay more and more attention to the data security problem; with the continuous reporting of privacy disclosure in recent years, people also consciously pay attention to the data security problem of the used applications, and the exhibition of data security becomes an essential capability for enterprises.
However, in the mass display of enterprises, the abundance of data and the accuracy of data need to be reflected on the premise of data security, and the original data needs to be processed, so that not only the key characteristics of the data need to be retained, but also the effect that specific individuals cannot be tracked needs to be achieved by simultaneously encrypting, for example, a virtual number widely used in the current express delivery industry, and data characteristics need to be retained for data analysis.
The prior art generally adopts a rough corresponding mode of numbers-numbers, letters-letters and Chinese characters-Chinese characters. However, the data characteristics of the encrypted data obtained by the current method and the original data may have a large difference, for example, the first 3 bits of the mobile phone number represent operator information, a data analyzer can obtain the distribution information of an operator through the first 3 bits, and the existing encryption method may encrypt the first 3 bits of the encrypted data into a value that cannot be analyzed by the operator information, or analyze a telecommunication operator into a mobile operator.
Disclosure of Invention
The invention provides a method and a system for preserving encryption based on a data meaning configuration format, aiming at the technical problem that the characteristics of encrypted data are changed.
In a first aspect, an embodiment of the present application provides a method for preserving encryption based on a data meaning configuration format, including:
a specification acquisition step: acquiring a content identification specification;
a dictionary obtaining step: acquiring information of a preset dictionary;
a data selection step: selecting data to be encrypted;
a configuration step: and configuring the data according to the content of the data based on the content identification specification and the dictionary.
The data is a data type with a defined data format or a self-defined dictionary or regular expression.
The method for configuring format reserved encryption based on data meaning includes:
and a dictionary selection step: selecting the dictionary needing to be replaced according to the data type;
a range selection step: selecting a corresponding replacement data range according to the data meaning;
formula selection: and selecting a corresponding check formula according to the data meaning.
The above method for preserving encryption based on data meaning configuration format, wherein the dictionary selecting step further comprises:
a condition setting step: and setting a limiting condition according to the data type.
The above method for configuring format reserved encryption based on data meaning, wherein the formula selecting step further comprises:
and a check bit calculation step: and setting whether the check bit needs to be recalculated for the encrypted data or not for the data field with the check bit.
In a second aspect, an embodiment of the present application provides a system for preserving encryption based on a data meaning configuration format, including:
a specification acquisition module: acquiring a content identification specification;
a dictionary acquisition module: acquiring information of a preset dictionary;
a data selection module: selecting data to be encrypted;
a configuration module: and configuring the data according to the content of the data based on the content identification specification and the dictionary.
The system for configuring format preserving encryption based on data meaning is characterized in that the data is a data type with a defined data format or a customized dictionary or regular expression.
The above system for configuring format preserving encryption based on data meaning, wherein the configuration module comprises:
a dictionary selection unit: selecting the dictionary needing to be replaced according to the data type;
a range selection unit: selecting a corresponding replacement data range according to the data meaning;
a formula selection unit: and selecting a corresponding check formula according to the data meaning.
The above system for configuring format preserving encryption based on data meaning, wherein the dictionary selecting unit further comprises:
a condition setting unit: and setting a limiting condition according to the data type.
The above system for configuring format preserving encryption based on data meaning, wherein the formula selecting unit further comprises:
a check bit calculation unit: and setting whether the check bit needs to be recalculated for the encrypted data or not for the data field with the check bit.
Compared with the prior art, the invention has the advantages and positive effects that:
1. the general data field meaning and the general dictionary information are abstracted, and the personnel using the same system use the same set of standard, so that the condition of manually arranging the same information for many times is avoided.
2. For fields with special formats, detailed corresponding to specific data positions is not needed, effects meeting requirements can be set only through data meanings, and data with corresponding meanings can be reserved according to analysis content of requirements.
Drawings
FIG. 1 is a schematic diagram illustrating steps of a format preserving encryption method based on data meaning configuration according to the present invention;
FIG. 2 is a flowchart based on step S4 in FIG. 1 according to the present invention;
FIG. 3 is a diagram illustrating an example of a specific information specification definition provided by the present invention;
FIG. 4 is an exemplary diagram of preset dictionary information provided by the present invention;
FIG. 5 is a schematic flow chart illustrating an embodiment of a format preserving encryption method based on data meaning configuration according to the present invention;
FIG. 6 is an illustration of an interface configuration sample provided by the present invention;
FIG. 7 is a block diagram of a format preserving encryption system configured based on data meaning according to the present invention;
fig. 8 is a block diagram of a computer device according to an embodiment of the present application.
Wherein the reference numerals are:
1. a specification acquisition module; 2. a dictionary acquisition module; 3. a data selection module; 4. a configuration module; 41. a dictionary selecting unit; 411. a condition setting unit; 42. a range selection unit; 43. a formula selection unit; 431. a check bit calculation unit; 81. a processor; 82. a memory; 83. a communication interface; 80. a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The present invention is described in detail with reference to the embodiments shown in the drawings, but it should be understood that these embodiments are not intended to limit the present invention, and those skilled in the art should understand that functional, methodological, or structural equivalents or substitutions made by these embodiments are within the scope of the present invention.
Before describing in detail the various embodiments of the present invention, the core inventive concepts of the present invention are summarized and described in detail by the following several embodiments.
The invention can configure the content which has definite meaning information and can define the range or the verifiable content which has a verification formula in the data aiming at different meaning information so as to achieve the effect of preserving analyzable content and simultaneously encrypting the original data.
The first embodiment is as follows:
fig. 1 is a schematic diagram illustrating steps of a reserved encryption method based on a data meaning configuration format according to the present invention, and as shown in fig. 1, this embodiment discloses a specific implementation of a reserved encryption method (hereinafter referred to as "method") based on a data meaning configuration format.
Specifically, as shown in fig. 1, the method disclosed in this embodiment mainly includes the following steps:
step S1: a content identification specification is obtained.
Specifically, a content identification specification which may have a special data meaning is prepared in advance, as shown in fig. 3, for example, the id number is a 6-digit address code (2-digit provincial code + 2-digit city code + 2-digit prefecture code) + 8-digit birth date code + 3-digit sequence code + 1-digit check code; the mobile phone number is randomly distributed by a 3-bit number segment, a 4-bit regional code and a 4-bit user number.
Step S2: and acquiring information of a preset dictionary.
Specifically, a dictionary of common codes and contents, such as city codes, operator codes, and valid mailbox domains, is prepared in advance, as shown in fig. 4.
Step S3: data to be encrypted is selected.
Specifically, the data to be encrypted is selected, the data type with the defined data format may be selected, or the data type may be a customized dictionary or regular expression.
Step S4: and configuring the data according to the content of the data based on the content identification specification and the dictionary.
Specifically, referring to fig. 2, step S4 specifically includes the following contents:
step S41: and selecting the dictionary needing to be replaced according to the data type.
Wherein step S41 further includes setting a limiting condition according to the data type.
Specifically, a dictionary and a limitation condition which need to be replaced are determined for data content, for example, the data type is a mobile phone number, an operator information replacement effect is selected as an operator list, and the limitation condition is that an operator corresponding relation is reserved. The expected effect is that 13500000000 is obtained after the mobile phone number 13800000000 is encrypted, the mobile phone number has changed but the operator information has not changed, and the analysis of the data analysis on the operator is not influenced.
The defined content can be automatically identified, for example, an operator is automatically matched with an operator random table, a mailbox domain name is matched with a domain name random table, and dictionary modification can be carried out; if the content is not defined, manual selection can be performed when the content is configurable.
Step S42: the corresponding replacement data range is selected according to the data meaning.
Specifically, the replacement data range corresponding to the data meaning is selected, a time range can be set for a field with the time meaning, for example, 8-14 bits of the identification number are the birth date, the range of the birth date can be set, and the condition of the identification number of a person who is too old or not born is avoided. The birth date range of the ID card number is 19800101-20201201.
Step S43: and selecting a corresponding check formula according to the data meaning.
Specifically, step S43 further includes: and setting whether the check bit needs to be recalculated for the encrypted data or not for the data field with the check bit. If the system has strict data format check, after part of data fields are encrypted, the number corresponding to the check digit also needs to be recalculated, and whether the check digit needs to be recalculated for the encrypted data can be set for the data fields with check digits, such as IMEI and identity card number.
Please refer to fig. 5. Fig. 5 is a schematic flow chart of an embodiment of a data meaning configuration format preserving encryption method provided by the present invention, and an application flow of the method is specifically described as follows with reference to fig. 5:
1. defining a data format;
2. defining a data dictionary;
3. selecting a data format/data position required to be processed;
4. selecting the meaning of the data needing to be configured;
5. selecting a replacement dictionary and a limiting condition corresponding to the data meaning;
6. selecting a replacement data range corresponding to the meaning of the data;
7. and selecting a check formula corresponding to the meaning of the data.
For example, fig. 6 is a sample diagram of interface configuration provided by the present invention, and fig. 6 shows an interface configuration diagram of an id card format reserved encryption.
The invention accumulates detailed business meanings of data meanings, accumulates accurate data dictionary ranges of different business meanings and establishes corresponding relations; the perception of personnel on details such as field positions is reduced, and the details are converted into the content which is convenient to communicate such as regions and dates, configuration errors are avoided, the learning cost is reduced, and a more accurate content simulation effect is achieved.
Example two:
in combination with the method for preserving encryption based on data meaning configuration format disclosed in the first embodiment, this embodiment discloses a specific implementation example of a system (hereinafter referred to as "system") for preserving encryption based on data meaning configuration format.
Referring to fig. 7, the system includes:
the specification acquisition module 1: acquiring a content identification specification;
the dictionary obtaining module 2: acquiring information of a preset dictionary;
the data selection module 3: selecting data to be encrypted;
the configuration module 4: and configuring the data according to the content of the data based on the content identification specification and the dictionary.
Specifically, the configuration module 4 includes:
the dictionary selecting unit 41: selecting the dictionary needing to be replaced according to the data type;
the range selection unit 42: selecting a corresponding replacement data range according to the data meaning;
formula selection unit 43: and selecting a corresponding check formula according to the data meaning.
Specifically, the dictionary selecting unit 41 further includes:
condition setting unit 411: and setting a limiting condition according to the data type.
Specifically, the formula selecting unit 43 further includes:
check bit calculation unit 431: and setting whether the check bit needs to be recalculated for the encrypted data or not for the data field with the check bit.
Please refer to the description of the first embodiment, which will not be repeated herein.
Example three:
referring to FIG. 8, this embodiment discloses an embodiment of a computer device. The computer device may comprise a processor 81 and a memory 82 in which computer program instructions are stored.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 82 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 82 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 82 may include removable or non-removable (or fixed) media, where appropriate. The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 82 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 implements any of the above-described embodiments of a method of preserving encryption based on a data meaning configuration format by reading and executing computer program instructions stored in the memory 82.
In some of these embodiments, the computer device may also include a communication interface 83 and a bus 80. As shown in fig. 8, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
Bus 80 includes hardware, software, or both to couple the components of the computer device to each other. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
In addition, in combination with the data meaning-based configuration format preserving encryption method in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the above embodiments of a data meaning based configuration format preserving encryption method.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In conclusion, the method has the advantages that the general data field meaning and the general dictionary information are abstracted, and the personnel using the same system use the same set of standards, so that the condition that the same information is manually sorted for many times is avoided; for fields with special formats, detailed corresponding to specific data positions is not needed, effects meeting requirements can be set only through data meanings, and data with corresponding meanings can be reserved according to analysis content of requirements.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for preserving encryption based on a data meaning configuration format, comprising:
a specification acquisition step: acquiring a content identification specification;
a dictionary obtaining step: acquiring information of a preset dictionary;
a data selection step: selecting data to be encrypted;
a configuration step: and configuring the data according to the content of the data based on the content identification specification and the dictionary.
2. The method for preserving encryption based on data meaning configuration format of claim 1, wherein the data is data type with defined data format or customized dictionary or regular expression.
3. The method of claim 2, wherein the step of configuring comprises:
and a dictionary selection step: selecting the dictionary needing to be replaced according to the data type;
a range selection step: selecting a corresponding replacement data range according to the data meaning;
formula selection: and selecting a corresponding check formula according to the data meaning.
4. The method of claim 3, wherein the dictionary selecting step further comprises:
a condition setting step: and setting a limiting condition according to the data type.
5. The method of claim 3, wherein the formula selecting step further comprises:
and a check bit calculation step: and setting whether the check bit needs to be recalculated for the encrypted data or not for the data field with the check bit.
6. A system for preserving encryption based on a data meaning configuration format, comprising:
a specification acquisition module: acquiring a content identification specification;
a dictionary acquisition module: acquiring information of a preset dictionary;
a data selection module: selecting data to be encrypted;
a configuration module: and configuring the data according to the content of the data based on the content identification specification and the dictionary.
7. The system for preserving encryption based on data meaning configuration format as claimed in claim 6, wherein the data is data type or customized dictionary or regular expression with defined data format.
8. The system of claim 7, wherein the configuration module comprises:
a dictionary selection unit: selecting the dictionary needing to be replaced according to the data type;
a range selection unit: selecting a corresponding replacement data range according to the data meaning;
a formula selection unit: and selecting a corresponding check formula according to the data meaning.
9. The system of claim 8, wherein the dictionary selection unit further comprises:
a condition setting unit: and setting a limiting condition according to the data type.
10. The system of claim 8, wherein the formula selection unit further comprises:
a check bit calculation unit: and setting whether the check bit needs to be recalculated for the encrypted data or not for the data field with the check bit.
CN202110108738.XA 2021-01-27 2021-01-27 Data meaning configuration format based reserved encryption method and system Pending CN112800447A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110108738.XA CN112800447A (en) 2021-01-27 2021-01-27 Data meaning configuration format based reserved encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110108738.XA CN112800447A (en) 2021-01-27 2021-01-27 Data meaning configuration format based reserved encryption method and system

Publications (1)

Publication Number Publication Date
CN112800447A true CN112800447A (en) 2021-05-14

Family

ID=75811991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110108738.XA Pending CN112800447A (en) 2021-01-27 2021-01-27 Data meaning configuration format based reserved encryption method and system

Country Status (1)

Country Link
CN (1) CN112800447A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2009288767A1 (en) * 2008-09-08 2010-03-11 Salesforce.Com, Inc. An appliance, system, method and corresponding software components for encrypting and processing data
CN104731976A (en) * 2015-04-14 2015-06-24 海量云图(北京)数据技术有限公司 Method for finding and sorting private data in data table
CN110399733A (en) * 2019-03-18 2019-11-01 国网安徽省电力有限公司黄山供电公司 A kind of desensitization platform for structural data
CN111291403A (en) * 2020-01-15 2020-06-16 上海新炬网络信息技术股份有限公司 Data desensitization device based on distributed cluster
CN111767565A (en) * 2019-03-15 2020-10-13 北京京东尚科信息技术有限公司 Data desensitization processing method, processing device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2009288767A1 (en) * 2008-09-08 2010-03-11 Salesforce.Com, Inc. An appliance, system, method and corresponding software components for encrypting and processing data
CN104731976A (en) * 2015-04-14 2015-06-24 海量云图(北京)数据技术有限公司 Method for finding and sorting private data in data table
CN111767565A (en) * 2019-03-15 2020-10-13 北京京东尚科信息技术有限公司 Data desensitization processing method, processing device and storage medium
CN110399733A (en) * 2019-03-18 2019-11-01 国网安徽省电力有限公司黄山供电公司 A kind of desensitization platform for structural data
CN111291403A (en) * 2020-01-15 2020-06-16 上海新炬网络信息技术股份有限公司 Data desensitization device based on distributed cluster

Similar Documents

Publication Publication Date Title
CN112541745B (en) User behavior data analysis method and device, electronic equipment and readable storage medium
CA2906475C (en) Method and apparatus for substitution scheme for anonymizing personally identifiable information
CN110597511B (en) Page automatic generation method, system, terminal equipment and storage medium
WO2019062081A1 (en) Salesman profile formation method, electronic device and computer readable storage medium
CN109816330B (en) Rule checking method, device, electronic equipment and computer readable storage medium
CN110532107B (en) Interface calling method, device, computer equipment and storage medium
CN110489466B (en) Method and device for generating invitation code, terminal equipment and storage medium
CN108255555A (en) A kind of system language switching method and terminal device
CN111046879A (en) Certificate image classification method and device, computer equipment and readable storage medium
CN112307512A (en) Log desensitization method, device and storage medium
CN109271564B (en) Policy query method and device
CN114265740A (en) Error information processing method, device, equipment and storage medium
FI20195426A1 (en) Compatible anonymization of data sets of different source
CN106357412B (en) A kind of method, apparatus and system for veritifying identity information
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
CN112800447A (en) Data meaning configuration format based reserved encryption method and system
WO2019095768A1 (en) User information screening method, server and computer-readable storage medium
CN111881480A (en) Private data encryption method and device, computer equipment and storage medium
CN114840634B (en) Information storage method and device, electronic equipment and computer readable medium
CN116303937A (en) Reply method, reply device, electronic equipment and readable storage medium
CN114710468A (en) Domain name generation and identification method, device, equipment and medium
CN111786992A (en) Member registration and authentication method, terminal device and readable storage medium
CN110119337B (en) Data analysis method and device and server
CN110009386B (en) User classification method, device, computer equipment and storage medium
CN114614972A (en) Data alignment method, system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination