CN110348239A - Desensitize regular configuration method and data desensitization method, system, computer equipment - Google Patents

Desensitize regular configuration method and data desensitization method, system, computer equipment Download PDF

Info

Publication number
CN110348239A
CN110348239A CN201910512598.5A CN201910512598A CN110348239A CN 110348239 A CN110348239 A CN 110348239A CN 201910512598 A CN201910512598 A CN 201910512598A CN 110348239 A CN110348239 A CN 110348239A
Authority
CN
China
Prior art keywords
page
desensitization
data
field
sensitive information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910512598.5A
Other languages
Chinese (zh)
Other versions
CN110348239B (en
Inventor
杜长闯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengju Technology Co ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910512598.5A priority Critical patent/CN110348239B/en
Publication of CN110348239A publication Critical patent/CN110348239A/en
Application granted granted Critical
Publication of CN110348239B publication Critical patent/CN110348239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a kind of regular configuration method of desensitization, the method includes the steps: S1. sends accessing page request;S2. the corresponding address URL is obtained based on the accessing page request, and the page hierarchical identification of the page is set according to the address URL;S3. the business information that server is returned according to the accessing page request is received;Whether S4. inquired in the page according to the business information includes sensitive information field;S5. if including the sensitive information field, the page hierarchical identification, the sensitive information field and corresponding shielding rules are established into mapping relations, and the mapping relations are configured in desensitization rule list;S6. step S1~S6 is repeated for next page, until the desensitization rule list is configured to finish.The embodiment of the present invention can rectify and improve the unified of the field shielding rules of the page each in complication system, avoid and rectify and improve respectively to each page, and workload needed for effectively reducing rectification improves the upgrading efficiency of desensitization rule.

Description

Desensitize regular configuration method and data desensitization method, system, computer equipment
Technical field
The present embodiments relate to field of computer data processing more particularly to a kind of regular configuration methods of desensitization, and Data desensitization method, system, computer equipment, computer readable storage medium.
Background technique
It is higher and higher to the attention degree of individual privacy and network security with the extensive use of network technology.Enterprise's number It is more and more according to the customer data stored in library, be especially stored in electric business platform and banking system a large amount of customer information or Transaction Information etc. and privacy and safety-related sensitive information, such as customer name, certificate information, contact address and contact method Deng.How client individual privacy is protected, at currently needing one of the problem of paying close attention to.
In addition, staff when safeguarding database, when desensitization rule needs to make rectification, generally requires multiple Each page is rectified and improved respectively, leads to database maintenance low efficiency.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention is that providing a kind of data desensitization method, system, computer equipment and meter Calculation machine readable storage medium storing program for executing can rectify and improve the unified of the field shielding rules of the page each in complication system, avoid to every One page is rectified and improved respectively, and workload needed for effectively reducing rectification improves the upgrading efficiency of desensitization rule.
To achieve the above object, the embodiment of the invention provides a kind of regular configuration methods of desensitization, comprising the following steps:
S1. accessing page request is sent;
S2. the corresponding address URL is obtained based on the accessing page request, and the page is arranged according to the address URL Page hierarchical identification;
S3. the business information that server is returned according to the accessing page request is received;
Whether S4. inquired in the page according to the business information includes sensitive information field;
S5. if including the sensitive information field, by the page hierarchical identification, the sensitive information field and corresponding Shielding rules establish mapping relations, and the mapping relations are configured in desensitization rule list;
S6. step S1~S6 is repeated for next page, until the desensitization rule list is configured to finish.
Preferably, the step S4 further include:
The business information is matched with each key character of preset keyword symbol concentration or key-strings;And
If being matched to the key character or key-strings concentrated in the business information including the key character, sentence Breaking includes sensitive information field in the page.
Preferably, the step S5 further include:
The place field type of the sensitive information field is stored in the desensitization rule list.
Preferably, further include the steps that increasing sensitive information field and corresponding field shielding rules:
The corresponding URL of each page and business information are read from the storage region;
Whether inquiry includes sensitive information field to be added, if including described to be added in wherein one or more pages When sensitive information field, by the page hierarchical identification of the one or more page, sensitive information field to be added and corresponding screen It covers rule and establishes mapping relations, and the mapping relations are added in desensitization rule list.
The embodiment of the invention also provides a kind of data desensitization methods, which comprises
The accessing request information of information for the target page to server transmission is inputted according to user;
Receive the data to be desensitized that the server is returned based on the accessing request information;And
The data to be desensitized are converted into desensitization data, the desensitization rule list according to preconfigured desensitization rule list Mapping relations including page hierarchical identification, sensitive information field and field shielding rules, the page hierarchical identification is basis The address URL of the target pages is pre-set, and the mapping relations include being preconfigured in the desensitization rule list Sub- mapping relations between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pages Sensitive information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
Preferably, in described the step of receiving the data to be desensitized that the server is returned based on the accessing request information Between the described the step of data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list, also wrap It includes:
The data to be desensitized are intercepted, it is described to be stored in buffer zone after the data that desensitize are intercepted;And
The data to be desensitized are obtained from the buffer zone.
Preferably, the step that the data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list After rapid, comprising:
The desensitization data are provided to the view layer progress page to show.
The embodiment of the invention also provides data desensitization systems, comprising:
Sending module, for inputting the accessing request information of information for the target page to server transmission according to user;
Receiving module, the data to be desensitized returned for receiving the server based on the accessing request information;And
Desensitize module, for the data to be desensitized to be converted to desensitization data according to preconfigured desensitization rule list, The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the page Hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include be preconfigured in institute It states in desensitization rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules Sub- mapping relations:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pages Sensitive information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
To achieve the above object, the embodiment of the invention also provides a kind of computer equipment, the computer equipment storages Device, processor and it is stored in the computer program that can be run on the memory and on the processor, the computer journey The step of data desensitization method as described above is realized when sequence is executed by processor.
To achieve the above object, the embodiment of the invention also provides a kind of computer readable storage medium, the computers Computer program is stored in readable storage medium storing program for executing, the computer program can be performed by least one processor, so that institute State the step of at least one processor executes data desensitization method as described above.
Data desensitization method, system, computer equipment and computer readable storage medium provided in an embodiment of the present invention lead to The mapping relations between the page hierarchical identification in desensitization rule list, the sensitive information field and corresponding shielding rules are crossed, The similar field of different levels is allowed to map the same field shielding rules, when the field shielding rules to certain class field are done When modifying out, which can be implemented in all pages comprising such field, without to point The other modification that field shielding rules are carried out to each page.
It can be appreciated that using the technical solution of the present embodiment to the whole of the field shielding rules of the page each in complication system Change, avoid and each page is rectified and improved respectively, workload needed for effectively reducing rectification improves the upgrading of desensitization rule Efficiency.
Detailed description of the invention
Fig. 1 is the running environment schematic diagram of the regular configuration method of desensitization of the embodiment of the present invention.
Fig. 2 is the flow chart of the regular configuration method embodiment one of present invention desensitization.
Fig. 3 is the flow chart of data desensitization method embodiment two of the present invention.
Fig. 4 is the flow chart of data desensitization method embodiment three of the present invention.
Fig. 5 is the program module schematic diagram of data of the present invention desensitization system embodiment four.
Fig. 6 is the hardware structural diagram of computer equipment embodiment five of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
Fig. 1 is the running environment schematic diagram of the regular configuration method of desensitization of the embodiment of the present invention.Computer equipment 2 is exemplary Connection server or server cluster, be stored with customer information in the server or server cluster.
Microsoft Windows, Linux, Mac OS, Android, IOS etc. can be run in the computer equipment 2 Operating system, and be mounted in aforesaid operations system browser application (e.g., IE browser, Chrome browser etc.) or Customer end A pp.Data interaction is carried out by the browser application or customer end A pp and server.
Following embodiment will be that executing subject carries out exemplary description with computer equipment 2.
Embodiment one
Referring to Fig.2, the step flow chart of the regular configuration method of the desensitization for showing the embodiment of the present invention one.It is appreciated that Flow chart in this method embodiment, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S100 sends the accessing page request of accession page.
Illustratively, an automatic test script can be configured in computer equipment 2, for stepping on according to pre-defined rule simulation Each page or menu in land and access client App.
Illustratively, computer equipment 2 can also configure user graphical interface, and staff can be connect by graphical user Mouth is transmitted into the accessing page request of each page to computer equipment 2.
Step S102 obtains corresponding URL (Uniform Resource locator system based on the accessing page request One Resource Locator) address, and the page hierarchical identification of the page is set according to the address URL.
For example, when entering the specified second level page from first level pages: due to including that triggering enters each two in first level pages The button of the grade page, each button are associated with the link or page path of a direction second level page.When some button is by with triggering, Then the link according to associated by the button that is triggered or page path obtain the second level page corresponding with the button that is triggered URL。
It include the file path that band has levels in the address URL, i.e., the corresponding file path of the described page.Pass through the band The file path having levels can correspond to the page setup page hierarchical identification, and the page hierarchical identification includes the address URL In the corresponding file path of the page, the page hierarchical identification of each page is identified by setting number.For example, can be with For digital number, 060301,060302 etc. is set by each first level pages, the second level page under first level pages 060301 is set It is set to 06030101, is 06030201 etc. by the second level page setup under first level pages 060302, and so on.It can be appreciated that Pass through the page hierarchical identification for each page configuration, so that it may obtain the page relation between each page.Certainly, this programme It is not limited to indicate the page hierarchical identification of each page using digital number, letter etc. can also be passed through.
Step S104 receives the business information that server is returned according to the accessing page request.
After the server receives the accessing page request, the accessing page request can be parsed, and in response to The accessing page request obtains the business information from database.
Illustratively, the accessing page request is based on HTTP (hypertext transfer protocol, HyperText Transfer Protocol) the HTTP request message of agreement.The HTTP request message can be grasped by existing HTTP resolver Make.Wherein, the HTTP request message includes: the method (GET) of request, URL, protocol version etc..
GET method, it is desirable that the URL resource positioned is placed on the data portion of response message by database, is passed back to computer Equipment 2.Therefore, database can be believed in response to " method " and " URL " in the HTTP request message, the business of returning response Breath.
In the present embodiment, the business information can be the page of server return (e.g., based on the specific page of HTML Face) in field information.The field information includes field name etc., which can be made of character or character string.
Whether step S106, being inquired in the page according to the business information includes sensitive information field.If so, into Enter step S108;If not, entering step S100 to execute the investigation operation of sensitive information field for each and every one the next page.
Specifically, step S106 may include steps of:
S106A carries out each key character or key-strings that the business information and preset keyword symbol are concentrated Matching.The character or character string that the preset keyword symbol is concentrated are for being associated with all kinds of client's individual privacy data and certain passes The sensitive traffic data of key, such as: customer name, customer name etc.;Address: home address, CompanyAddress etc.;Mailbox: company Mailbox, common mailbox etc.;Phone: mobile phone, fixed-line telephone etc.;Certificate: identity card, passport, officer's identity card etc.;Account number: bank card, visitor Family number, the tax registration number, organization mechanism code, business license number etc.;Postcode: company's postcode, home zip code etc.;Date: Birthday etc..For example, character string " " is associated with passport NO., character string " " associated client title etc..
S106B, if being matched to the key character or key character concentrated in the business information including the key character String then judges to include sensitive information field in the page.
When illustratively, such as in the business information being matched to &custName, then judge to include quick in the page Feel information field, that is, includes being related to the sensitive information field of customer name.
The page hierarchical identification, the sensitive information field and corresponding shielding rules are established and are mapped by step S108 Relationship, and the mapping relations are configured in desensitization rule list.
It is exemplary, configuration desensitization rule list, the desensitization rule list include shielding rules table, multiple sensitive information field lists and Multiple page hierarchical identification tables.The shielding rules table is used for storing each shielding rules table, each sensitive information field list Multiple field names of similar field in the page of storage different levels, each page hierarchical identification table have together for storing The page hierarchical identification of class field.
It is associated between each table by external key, for example, some shielding rules in some shielding rules table are outside One sensitive information field list of key relationship maps, i.e. this shielding rules are suitable for the associated sensitive information field list All sensitivity fields;The associated sensitive information field list passes through the corresponding page hierarchical relationship of another external key relationship maps Table.
Step S110, judges the desensitization rule list is configured whether to finish, and if it is terminates process, is otherwise directed to down One page repeats step S100~S110.
Since the field name of the similar field in the page of different levels is different, such as respectively id, name, Classname corresponds to the similar field such as customer name, customer name.Pass through the page level in above-mentioned desensitization rule list Mapping relations between mark, the sensitive information field and corresponding shielding rules, so that the similar field of different levels can To map the same field shielding rules, when the field shielding rules to certain class field make modification, the field shielding rules It can be implemented in all pages comprising such field, without to respectively to the progress field shielding of each page The modification of rule.
That is, the similar field to each level does unitized processing.For example, word in first level pages (such as 060301) The field of the entitled name of field and the three-level page be (such as in the field of Duan Mingwei id, the second level page (such as 06030101) 0603010101) field of the entitled classname of field maps a field shielding rules in, when the field shielding rules are modified When, it is equivalent to the field shielding rule of the corresponding several pages of the several hierarchical identifications such as 060301,06030101 and 0603010101 Then modified.It can be appreciated that using the technical solution of the present embodiment to the field shielding rules of the page each in complication system Rectification, avoid and each page rectified and improved respectively, effectively reduce rectification needed for workload, improve desensitization rule Upgrade efficiency.
Optionally, step S108 further include: the place field type of the sensitive information field is stored in the desensitization In rule list.
The field type, such as list list type, map array type.The field type is for guiding work people Member's rapid increasing new sensitive information page.
Optionally, step S108 further include: the corresponding user right of the sensitive information field is configured to the desensitization In rule list.
The user right may include common employee's permission, department's assistant's permission, first-line management's permission, middle rank pipe Reason personnel permission and senior executive's permission etc..The user right may also comprise: webpage logon rights, ca authentication webpage are stepped on Record permission, system client logon rights etc..It is of course also possible to based on other user rights for considering setting.Different users Permission, for example, lack of competence obtains the sensitive information field of corresponding higher others' member's permission of level-one for common employee.
After configuring desensitization rule list by S1~S6 step, the acquired corresponding URL of each page and business letter Breath is saved in specified storage region.Optionally, further include step S110, be used for: in the desensitization rule list delete and Add sensitive information field and corresponding field shielding rules.
For example, the step of increasing sensitive information field and corresponding field shielding rules is as follows:
S110A is read in the corresponding URL of each page and business information from the storage region;
Whether S110B, inquiry include sensitive information field to be added, if in certain page including the sensitive letter to be added When ceasing field, the page hierarchical identification, sensitive information field to be added and corresponding shielding rules are established into mapping relations, and will The mapping relations are added in desensitization rule list.
Embodiment two
Referring to Fig. 3, show the embodiment of the present invention and data desensitization method step flow chart.It is appreciated that this Flow chart in embodiment of the method, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S200 inputs the accessing request information of information for the target page to server transmission according to user.
The computer collocations have the user graphical interface for accessing the target pages, the user graphical interface packet Include input frame, button, combobox and list etc..The input frame includes Text Entry, numeric input boxes, for inputting identity Authentication information, such as user name, password.After the button is clicked by user, accessing request information can be generated and be sent to data In system, the accessing request information carries all kinds of supplemental characteristics, and the supplemental characteristic may include authentication information etc..
Step S202 receives the data to be desensitized that the server is returned based on the accessing request information.
After the server receives the accessing page request, the accessing page request can be parsed, and in response to The accessing page request obtains the data to be desensitized from database.
The data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list by step S204.
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, The page hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include preparatory It is configured at the corresponding page hierarchical identification of each page in the desensitization rule list, sensitive information field and field shielding rule Sub- mapping relations between then.
Step S204 may comprise steps of:
Step S204A obtains the page hierarchical identification of the target pages.Specifically, the target pages can be passed through The address URL obtain the page hierarchical identification of the page.
Step S204B is inquired corresponding with the target pages according to the page hierarchical identification from the desensitization rule list Sensitive information field and corresponding field shielding rules.
The field shielding rules: it is character some or all of in sensitive information field replacing with designated character. For example, be directed to customer name, can by customer name surname and name select one and replace with designated character, or replace with finger Determine character;For passport NO., a part of number in passport NO. can be replaced with into preset characters, or will be in passport NO. Whole numbers replace with designated character.It should be noted that designated character can be " * " or other characters.
Step S204C executes the desensitization data de- according to the sensitive information field and the field shielding rules Quick operation.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be with It is used to provide for checking to user.
Optionally, further include step S206: the desensitization data being provided to the view layer progress page and are shown.
By data desensitization method described in embodiment two, by the page hierarchical relationship of target webpage, from desensitization rule Corresponding sensitive information field and field shielding rules are obtained in table, can be rapidly carried out sensitive information masking operation, it is ensured that The sensitive traffic data of all kinds of client's individual privacy data and certain keys are not leaked.
Embodiment three
Referring to Fig. 4, show the embodiment of the present invention and data desensitization method step flow chart.It is appreciated that this Flow chart in embodiment of the method, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S300 inputs the accessing request information of information for the target page to server transmission according to user.
Step S302 receives the data to be desensitized that the server is returned based on the accessing request information.
Step S304 intercepts the data to be desensitized, described to be stored in buffer zone after the data that desensitize are intercepted.
Specifically, blocker is called to carry out interception operation to the data to be desensitized.
Step S306 obtains the data to be desensitized from the buffer zone.
The data structure information for obtaining the data to be desensitized, may include partly shielding effect according to the data structure information Field.
The data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list by step S308.
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, The page hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include preparatory It is configured at the corresponding page hierarchical identification of each page in the desensitization rule list, sensitive information field and field shielding rule Sub- mapping relations between then.
Step S308 may comprise steps of:
Step S308A obtains the page hierarchical identification of the target pages.Specifically, the target pages can be passed through The address URL obtain the page hierarchical identification of the page.
Step S308B is inquired corresponding with the target pages according to the page hierarchical identification from the desensitization rule list Sensitive information field and corresponding field shielding rules.
Step S308C executes the desensitization data de- according to the sensitive information field and the field shielding rules Quick operation.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be with It is used to provide for checking to user.
Example IV
Please continue to refer to Fig. 5, the program module schematic diagram of data desensitization system embodiment four of the present invention is shown.In this reality It applies in example, data desensitization system 20 may include or be divided into one or more program modules, one or more program mould Block is stored in storage medium, and as performed by one or more processors, to complete the present invention, and can realize above-mentioned data Desensitization method.The so-called program module of the embodiment of the present invention is the series of computation machine program instruction for referring to complete specific function Section, the implementation procedure than program itself more suitable for description data desensitization system 20 in storage medium.Being described below will be specific Introduce the function of each program module of the present embodiment:
Sending module 200 is believed for inputting information according to user to the access request that server is sent for the target page Breath.
Computer collocations have the user graphical interface for accessing the target pages, and the user graphical interface includes defeated Enter frame, button, combobox and list etc..The input frame includes Text Entry, numeric input boxes, for inputting authentication Information, such as user name, password.After the button is clicked by user, accessing request information can be generated and be sent to data system In, the accessing request information carries all kinds of supplemental characteristics, and the supplemental characteristic may include authentication information etc..
Receiving module 202, the data to be desensitized returned for receiving the server based on the accessing request information.
After the server receives the accessing page request, the accessing page request can be parsed, and in response to The accessing page request obtains the data to be desensitized from database.
Desensitize module 204, for the data to be desensitized to be converted to desensitization number according to preconfigured desensitization rule list According to the desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the page Face hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include be preconfigured in In the desensitization rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules Sub- mapping relations: according to the page hierarchical identification of the target pages, inquiry and the page object from the desensitization rule list The corresponding sensitive information field in face and corresponding field shielding rules;And it is shielded according to the sensitive information field and the field Rule executes desensitization operation to the desensitization data.
The field shielding rules: it is character some or all of in sensitive information field replacing with designated character. For example, be directed to customer name, can by customer name surname and name select one and replace with designated character, or replace with finger Determine character;For passport NO., a part of number in passport NO. can be replaced with into preset characters, or will be in passport NO. Whole numbers replace with designated character.It should be noted that designated character can be " * " or other characters.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be with It is used to provide for checking to user.
In one embodiment, further include the blocking module 206, be used for: intercepting the data to be desensitized, it is described wait desensitize Buffer zone is stored in after data are intercepted.
Specifically, blocker is called to carry out interception operation to the data to be desensitized.The desensitization module 204 is delayed from described It deposits region and obtains the data to be desensitized, and carry out desensitization operation according to the data to be desensitized.
In one embodiment, further include the display module 208, be used for: by the desensitization data be provided to view layer into The row page is shown.
By the page hierarchical relationship of target webpage, corresponding sensitive information field and field are obtained from desensitization rule list Shielding rules can be rapidly carried out sensitive information masking operation, it is ensured that all kinds of client's individual privacy data and certain keys Sensitive traffic data be not leaked.
Embodiment five
It is the hardware structure schematic diagram of the computer equipment of the embodiment of the present invention five refering to Fig. 6.It is described in the present embodiment Computer equipment 2 is that one kind can be automatic to carry out numerical value calculating and/or information processing according to the instruction for being previously set or storing Equipment.The computer equipment 2 can be computer, tablet computer etc..As shown, the computer equipment 2 is at least wrapped It includes, but is not limited to, it is de- that connection memory 21, processor 22, network interface 23 and data can be in communication with each other by system bus Quick system 20.Wherein:
In the present embodiment, memory 21 includes at least a type of computer readable storage medium, the readable storage Medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 21 can be the internal storage unit of computer equipment 2, such as the hard disk or memory of the computer equipment 2.In other implementations In example, memory 21 is also possible to the grafting being equipped on the External memory equipment of computer equipment 2, such as the computer equipment 20 Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 can also both including computer equipment 2 internal storage unit and also including outside it Store equipment.In the present embodiment, memory 21 is installed on the operating system and types of applications of computer equipment 2 commonly used in storage Software, for example, example IV data desensitization system 20 program code etc..In addition, memory 21 can be also used for temporarily depositing Store up the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU), Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control computer equipment 2 Overall operation.In the present embodiment, program code or processing data of the processor 22 for being stored in run memory 21, example As operation data desensitize system 20, to realize the data desensitization method of embodiment two or three.
The network interface 23 may include radio network interface or wired network interface, which is commonly used in Communication connection is established between the computer equipment 2 and other electronic devices.For example, the network interface 23 is for passing through network The computer equipment 2 is connected with exterior terminal, establishes data transmission between the computer equipment 2 and exterior terminal Channel and communication connection etc..The network can be intranet (Intranet), internet (Internet), whole world movement Communication system (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the nothings such as Wi-Fi Line or cable network.
It should be pointed out that Fig. 6 illustrates only the computer equipment 2 with component 20-23, it should be understood that simultaneously All components shown realistic are not applied, the implementation that can be substituted is more or less component.
In the present embodiment, be stored in memory 21 the data desensitization system 20 can also be divided into one or The multiple program modules of person, one or more of program modules are stored in memory 21, and are handled by one or more Device (the present embodiment is processor 22) is performed, to complete the present invention.
For example, Fig. 5 shows the program module schematic diagram of realization data desensitization 20 example IV of system, the embodiment In, it is described that sending module 200 can be divided into based on data desensitization system 20, receiving module 202, desensitization module 204, intercepted Module 206 and display module 208.Wherein, the so-called program module of the present invention is a series of meters for referring to complete specific function Calculation machine program instruction section, than program more suitable for describing execution of the data desensitization system 20 in the computer equipment 2 Process.The concrete function of described program module 200-208 has had a detailed description in example IV, and details are not described herein.
Embodiment six
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc. Answer function.The computer readable storage medium of the present embodiment desensitizes system 20 for storing data, realization when being executed by processor The data desensitization method of embodiment two or three.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of regular configuration method of desensitization, which is characterized in that the method includes the steps:
S1. accessing page request is sent;
S2. the corresponding address URL is obtained based on the accessing page request, and the page of the page is set according to the address URL Hierarchical identification;
S3. the business information that server is returned according to the accessing page request is received;
Whether S4. inquired in the page according to the business information includes sensitive information field;
S5. if including the sensitive information field, by the page hierarchical identification, the sensitive information field and corresponding screen It covers rule and establishes mapping relations, and the mapping relations are configured in desensitization rule list;
S6. step S1~S6 is repeated for next page, until the desensitization rule list is configured to finish.
2. the regular configuration method of desensitization according to claim 1, which is characterized in that the step S4 further include:
The business information is matched with each key character of preset keyword symbol concentration or key-strings;And
If being matched to the key character or key-strings concentrated in the business information including the key character, institute is judged Stating includes sensitive information field in the page.
3. the regular configuration method of desensitization according to claim 1, which is characterized in that the step S5 further include:
The place field type of the sensitive information field is stored in the desensitization rule list.
4. the regular configuration method of desensitization according to claim 1, which is characterized in that further include increase sensitive information field with And the step of corresponding field shielding rules:
The corresponding URL of each page and business information are read from the storage region;
Whether inquiry includes sensitive information field to be added, if in wherein one or more pages including the sensitivity to be added When information field, by the page hierarchical identification of the one or more page, sensitive information field to be added and corresponding shielding rule Mapping relations are then established, and the mapping relations are added in desensitization rule list.
5. a kind of data desensitization method, which is characterized in that the described method includes:
Accessing request information for the target page is sent to server according to the information of user's input;
Receive the data to be desensitized that the server is returned based on the accessing request information;And
The data to be desensitized are converted into desensitization data according to preconfigured desensitization rule list, the desensitization rule list includes The mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the page hierarchical identification is according to The address URL of target pages is pre-set, and the mapping relations are each in the desensitization rule list including being preconfigured Sub- mapping relations between the corresponding page hierarchical identification of the page, sensitive information field and field shielding rules:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pages quick Feel information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
6. data desensitization method according to claim 5, which is characterized in that receive the server based on described described Accessing request information return data to be desensitized the step of and it is described according to preconfigured desensitization rule list by described wait desensitize Data were converted between the step of desensitization data, further includes:
The data to be desensitized are intercepted, it is described to be stored in buffer zone after the data that desensitize are intercepted;And
The data to be desensitized are obtained from the buffer zone.
7. data desensitization method according to claim 5, which is characterized in that described according to preconfigured desensitization rule list After the step of data to be desensitized are converted to desensitization data, comprising:
The desensitization data are provided to the view layer progress page to show.
The system 8. a kind of data desensitize characterized by comprising
Sending module, for inputting the accessing request information of information for the target page to server transmission according to user;
Receiving module, the data to be desensitized returned for receiving the server based on the accessing request information;And
Desensitize module, described for the data to be desensitized to be converted to desensitization data according to preconfigured desensitization rule list Desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the page level Mark be it is pre-set according to the address URL of the target pages, the mapping relations include being preconfigured in described de- Son in quick rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules reflects Penetrate relationship:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pages quick Feel information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
9. a kind of computer equipment, the computer equipment memory, processor and it is stored on the memory and can be in institute State the computer program run on processor, which is characterized in that such as right is realized when the computer program is executed by processor It is required that described in any one of 5 to 7 the step of data desensitization method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program, the computer program can be performed by least one processors, so that at least one described processor executes such as right It is required that described in any one of 5 to 7 the step of data desensitization method.
CN201910512598.5A 2019-06-13 2019-06-13 Desensitization rule configuration method, data desensitization method, system and computer equipment Active CN110348239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910512598.5A CN110348239B (en) 2019-06-13 2019-06-13 Desensitization rule configuration method, data desensitization method, system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910512598.5A CN110348239B (en) 2019-06-13 2019-06-13 Desensitization rule configuration method, data desensitization method, system and computer equipment

Publications (2)

Publication Number Publication Date
CN110348239A true CN110348239A (en) 2019-10-18
CN110348239B CN110348239B (en) 2023-10-27

Family

ID=68182002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910512598.5A Active CN110348239B (en) 2019-06-13 2019-06-13 Desensitization rule configuration method, data desensitization method, system and computer equipment

Country Status (1)

Country Link
CN (1) CN110348239B (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830246A (en) * 2019-10-31 2020-02-21 北京东软望海科技有限公司 Intranet and extranet secure transmission control method and device, computer equipment and storage medium
CN110826004A (en) * 2019-11-05 2020-02-21 杭州安恒信息技术股份有限公司 Front-end request data processing method and related device
CN111209589A (en) * 2019-12-31 2020-05-29 航天信息股份有限公司 Method and system for dynamic data desensitization based on regional chain
CN111597578A (en) * 2020-04-23 2020-08-28 国网湖北省电力有限公司信息通信公司 Customer sensitive information desensitization system of electric power marketing system
CN111639179A (en) * 2020-04-20 2020-09-08 福建省农村信用社联合社 Privacy control method and device for batch customer information of bank front-end query system
CN112052256A (en) * 2020-09-02 2020-12-08 平安资产管理有限责任公司 Multi-version request returning method and device, computer equipment and readable storage medium
CN112052364A (en) * 2020-09-27 2020-12-08 深圳前海微众银行股份有限公司 Sensitive information detection method, device, equipment and computer readable storage medium
CN112199624A (en) * 2020-10-10 2021-01-08 杭州安恒信息技术股份有限公司 Data access control method, device, electronic device and storage medium
CN112199723A (en) * 2020-10-16 2021-01-08 深圳无域科技技术有限公司 PKI system, PKI control method, and data security system
CN112463799A (en) * 2020-12-11 2021-03-09 天冕信息技术(深圳)有限公司 Data extraction method, device, equipment and storage medium
CN112883405A (en) * 2021-03-22 2021-06-01 亿企赢网络科技有限公司 Data desensitization method, device, equipment and storage medium
CN113360947A (en) * 2021-06-30 2021-09-07 杭州网易再顾科技有限公司 Data desensitization method and device, computer readable storage medium and electronic equipment
CN113407989A (en) * 2021-05-26 2021-09-17 天九共享网络科技集团有限公司 Data desensitization method and device, electronic equipment and storage medium
CN113569291A (en) * 2021-08-02 2021-10-29 京东科技控股股份有限公司 Log mask method and device
CN113691366A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Desensitized secure biometric identity authentication system
CN113722757A (en) * 2021-08-30 2021-11-30 平安医疗健康管理股份有限公司 Sensitive data coding method, device, equipment and storage medium
CN113761565A (en) * 2020-08-05 2021-12-07 北京京东振世信息技术有限公司 Data desensitization method and apparatus
CN114117498A (en) * 2021-12-01 2022-03-01 恒安嘉新(北京)科技股份公司 Desensitization data realization method, device, system, equipment and storage medium
CN117336083A (en) * 2023-10-27 2024-01-02 河北赛克普泰计算机咨询服务有限公司 Communication method and system in network security level protection
CN117708885A (en) * 2024-02-05 2024-03-15 盛业信息科技服务(深圳)有限公司 Personal sensitive information protection control method and system based on decision engine

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100205189A1 (en) * 2009-02-11 2010-08-12 Verizon Patent And Licensing Inc. Data masking and unmasking of sensitive data
WO2011018316A1 (en) * 2009-08-12 2011-02-17 F-Secure Corporation Web browser security
CN104994104A (en) * 2015-07-06 2015-10-21 浙江大学 Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN107180200A (en) * 2017-04-20 2017-09-19 北京同余科技有限公司 Data file customizable desensitization method and system
CN108171069A (en) * 2018-01-03 2018-06-15 平安科技(深圳)有限公司 Desensitization method, application server and computer readable storage medium
CN108664812A (en) * 2018-05-14 2018-10-16 阿里巴巴集团控股有限公司 Information desensitization method, apparatus and system
CN109376547A (en) * 2018-09-29 2019-02-22 北京邮电大学 Information protection method and system based on file path
CN109614816A (en) * 2018-11-19 2019-04-12 平安科技(深圳)有限公司 Data desensitization method, device and storage medium
CN109716345A (en) * 2016-04-29 2019-05-03 普威达有限公司 Computer implemented privacy engineering system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100205189A1 (en) * 2009-02-11 2010-08-12 Verizon Patent And Licensing Inc. Data masking and unmasking of sensitive data
WO2011018316A1 (en) * 2009-08-12 2011-02-17 F-Secure Corporation Web browser security
CN104994104A (en) * 2015-07-06 2015-10-21 浙江大学 Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN109716345A (en) * 2016-04-29 2019-05-03 普威达有限公司 Computer implemented privacy engineering system and method
CN107180200A (en) * 2017-04-20 2017-09-19 北京同余科技有限公司 Data file customizable desensitization method and system
CN108171069A (en) * 2018-01-03 2018-06-15 平安科技(深圳)有限公司 Desensitization method, application server and computer readable storage medium
CN108664812A (en) * 2018-05-14 2018-10-16 阿里巴巴集团控股有限公司 Information desensitization method, apparatus and system
CN109376547A (en) * 2018-09-29 2019-02-22 北京邮电大学 Information protection method and system based on file path
CN109614816A (en) * 2018-11-19 2019-04-12 平安科技(深圳)有限公司 Data desensitization method, device and storage medium

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830246B (en) * 2019-10-31 2020-11-17 望海康信(北京)科技股份公司 Intranet and extranet secure transmission control method and device, computer equipment and storage medium
CN110830246A (en) * 2019-10-31 2020-02-21 北京东软望海科技有限公司 Intranet and extranet secure transmission control method and device, computer equipment and storage medium
CN110826004A (en) * 2019-11-05 2020-02-21 杭州安恒信息技术股份有限公司 Front-end request data processing method and related device
CN111209589A (en) * 2019-12-31 2020-05-29 航天信息股份有限公司 Method and system for dynamic data desensitization based on regional chain
CN111639179A (en) * 2020-04-20 2020-09-08 福建省农村信用社联合社 Privacy control method and device for batch customer information of bank front-end query system
CN111639179B (en) * 2020-04-20 2023-11-10 福建省农村信用社联合社 Batch customer information privacy control method and device for bank front-end query system
CN111597578A (en) * 2020-04-23 2020-08-28 国网湖北省电力有限公司信息通信公司 Customer sensitive information desensitization system of electric power marketing system
CN113691366A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Desensitized secure biometric identity authentication system
CN113761565B (en) * 2020-08-05 2024-04-16 北京京东振世信息技术有限公司 Data desensitization method and device
CN113761565A (en) * 2020-08-05 2021-12-07 北京京东振世信息技术有限公司 Data desensitization method and apparatus
CN112052256A (en) * 2020-09-02 2020-12-08 平安资产管理有限责任公司 Multi-version request returning method and device, computer equipment and readable storage medium
CN112052364A (en) * 2020-09-27 2020-12-08 深圳前海微众银行股份有限公司 Sensitive information detection method, device, equipment and computer readable storage medium
CN112199624A (en) * 2020-10-10 2021-01-08 杭州安恒信息技术股份有限公司 Data access control method, device, electronic device and storage medium
CN112199723A (en) * 2020-10-16 2021-01-08 深圳无域科技技术有限公司 PKI system, PKI control method, and data security system
CN112463799A (en) * 2020-12-11 2021-03-09 天冕信息技术(深圳)有限公司 Data extraction method, device, equipment and storage medium
CN112883405B (en) * 2021-03-22 2023-09-12 亿企赢网络科技有限公司 Data desensitization method, device, equipment and storage medium
CN112883405A (en) * 2021-03-22 2021-06-01 亿企赢网络科技有限公司 Data desensitization method, device, equipment and storage medium
CN113407989A (en) * 2021-05-26 2021-09-17 天九共享网络科技集团有限公司 Data desensitization method and device, electronic equipment and storage medium
CN113360947A (en) * 2021-06-30 2021-09-07 杭州网易再顾科技有限公司 Data desensitization method and device, computer readable storage medium and electronic equipment
CN113360947B (en) * 2021-06-30 2022-07-26 杭州网易再顾科技有限公司 Data desensitization method and device, computer readable storage medium and electronic equipment
CN113569291B (en) * 2021-08-02 2024-04-05 京东科技控股股份有限公司 Log mask method and device
CN113569291A (en) * 2021-08-02 2021-10-29 京东科技控股股份有限公司 Log mask method and device
CN113722757A (en) * 2021-08-30 2021-11-30 平安医疗健康管理股份有限公司 Sensitive data coding method, device, equipment and storage medium
CN113722757B (en) * 2021-08-30 2024-05-17 深圳平安医疗健康科技服务有限公司 Coding method, device, equipment and storage medium of sensitive data
CN114117498A (en) * 2021-12-01 2022-03-01 恒安嘉新(北京)科技股份公司 Desensitization data realization method, device, system, equipment and storage medium
CN117336083A (en) * 2023-10-27 2024-01-02 河北赛克普泰计算机咨询服务有限公司 Communication method and system in network security level protection
CN117336083B (en) * 2023-10-27 2024-05-14 河北赛克普泰计算机咨询服务有限公司 Communication method and system in network security level protection
CN117708885A (en) * 2024-02-05 2024-03-15 盛业信息科技服务(深圳)有限公司 Personal sensitive information protection control method and system based on decision engine
CN117708885B (en) * 2024-02-05 2024-05-28 盛业信息科技服务(深圳)有限公司 Personal sensitive information protection control method and system based on decision engine

Also Published As

Publication number Publication date
CN110348239B (en) 2023-10-27

Similar Documents

Publication Publication Date Title
CN110348239A (en) Desensitize regular configuration method and data desensitization method, system, computer equipment
US8341104B2 (en) Method and apparatus for rule-based masking of data
US8590003B2 (en) Controlling access to resources by hosted entities
US7089588B2 (en) Performance path method and apparatus for exchanging data among systems using different data formats
US8219816B2 (en) IVR call routing using encrypted data
CN109977690A (en) A kind of data processing method, device and medium
CN111695156A (en) Service platform access method, device, equipment and storage medium
US20110113468A1 (en) Establishing and enforcing security and privacy policies in web-based applications
US20070011742A1 (en) Communication information monitoring apparatus
US20170235936A1 (en) Secure credential service for cloud platform applications
CN110035075A (en) Detection method, device, computer equipment and the storage medium of fishing website
EP2717178A1 (en) Analysis and specification creation for web documents
US6760844B1 (en) Secure transactions sessions
US10616209B2 (en) Preventing inter-application message hijacking
CN105610819B (en) The method and apparatus of the query service of server info are provided
CN103605924A (en) Method and device for preventing malicious program from attacking online payment page
US20140173693A1 (en) Cookie Optimization
KR20170095292A (en) Method and apparatus for providing authentication information on a web page
CN103336693B (en) The creation method of refer chain, device and security detection equipment
US8539335B2 (en) Entering data into a webpage
CN111241504B (en) Identity verification method, device, electronic equipment and storage medium
US11444968B1 (en) Distributed system for autonomous discovery and exploitation of an organization's computing and/or human resources to evaluate capacity and/or ability to detect, respond to, and mitigate effectiveness of intrusion attempts by, and reconnaissance efforts of, motivated, antagonistic, third parties
CN103581321A (en) Creation method and device for refer link, safety detecting method and client side
CN110213211A (en) Identify the method, apparatus, terminal and storage medium of safe download link
US11716381B2 (en) Exporting data to a cloud-based service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230928

Address after: No. 197 Bagou Village, Zhanjie Town, Gongyi City, Zhengzhou City, Henan Province, 451200

Applicant after: Zhang Jianjun

Address before: 518052 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: PING AN PUHUI ENTERPRISE MANAGEMENT Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231110

Address after: No. 1601, 16th Floor, Zhongyuan Data Industry Building, No. 19 Chongde Street, Zhengdong New District, Zhengzhou City, Henan Province, 450000

Patentee after: Hengju Technology Co.,Ltd.

Address before: No. 197 Bagou Village, Zhanjie Town, Gongyi City, Zhengzhou City, Henan Province, 451200

Patentee before: Zhang Jianjun

TR01 Transfer of patent right