CN114461614B - Sensitive data identification processing method and system - Google Patents
Sensitive data identification processing method and system Download PDFInfo
- Publication number
- CN114461614B CN114461614B CN202210376532.XA CN202210376532A CN114461614B CN 114461614 B CN114461614 B CN 114461614B CN 202210376532 A CN202210376532 A CN 202210376532A CN 114461614 B CN114461614 B CN 114461614B
- Authority
- CN
- China
- Prior art keywords
- sensitive data
- program
- version number
- different
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/219—Managing data history or versioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
Abstract
The application discloses a sensitive data identification processing method and a system, wherein the method comprises the following steps: acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, wherein the preset condition is configured in advance; generating a version number corresponding to the sensitive data at least according to the sensitive data; adding said version number to said sensitive data; and sending the sensitive data with the version number added to a preset program, wherein the preset program is a program for using or processing the sensitive data. The method and the device solve the problem that whether the sources of the sensitive data are consistent or not cannot be distinguished in the prior art, so that the sensitive data of different batches can be identified, and the program or the application can be favorably used for correspondingly processing the sensitive data.
Description
Technical Field
The application relates to the field of data processing, in particular to a sensitive data identification processing method and system.
Background
The sensitive data discovery program is used for discovering sensitive data in the database, and the discovered sensitive data is sent to other programs or applications to process or use the sensitive data.
The inventor finds that, because the sensitive data in the database is dynamically changed, for example, the sensitive data in the database is increased or deleted, the sensitive data discovered by the sensitive data discovery program each time is also different, which causes the situation that the sensitive data is inconsistent when the sensitive data is sent to other programs or applications for use after being discovered, and the processing of the sensitive data by different programs or applications using the sensitive data is affected because the sensitive data received by different programs or applications is different.
In the prior art, no corresponding solution has been proposed for this problem.
Disclosure of Invention
The embodiment of the application provides a sensitive data identification processing method and system, so as to at least solve the problem that whether the sources of sensitive data are consistent or not cannot be distinguished in the prior art.
According to one aspect of the application, a sensitive data identification processing method is provided, and comprises the following steps: acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, wherein the preset condition is configured in advance; generating a version number corresponding to the sensitive data at least according to the sensitive data; adding the version number to the sensitive data; and sending the sensitive data with the version number added to a preset program, wherein the preset program is a program for using or processing the sensitive data.
Further, after the sensitive data with the version number added is sent to the predetermined program, the method further includes: and receiving an acknowledgement message sent by the predetermined program, wherein the acknowledgement message is used for indicating that the predetermined program has received the sensitive data of the version number.
Further, the method also comprises the following steps: and under the condition that the confirmation message is not received after a preset time, the sensitive data with the version number increased is sent to the preset program again until the confirmation message sent by the preset program is received.
Further, the version number is used for identifying the sensitive data, and the sensitive data discovery program has different version numbers between different batches of the discovered sensitive data.
In this embodiment, a system for processing sensitive data identifier is further provided, including: the acquisition module is used for acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, wherein the preset condition is configured in advance; the generating module is used for generating a version number corresponding to the sensitive data at least according to the sensitive data; an adding module for adding the version number to the sensitive data; and the sending module is used for sending the sensitive data added with the version number to a predetermined program, wherein the predetermined program is a program for using or processing the sensitive data.
Further, after the sensitive data with the version number increased is sent to the predetermined program, the system further includes: a receiving module, configured to receive a confirmation message sent by the predetermined program, where the confirmation message is used to indicate that the predetermined program has received the sensitive data of the version number.
Further, the sending module is further configured to: and under the condition that the confirmation message is not received after a preset time, the sensitive data with the version number increased is sent to the preset program again until the confirmation message sent by the preset program is received.
Further, the version number is used for identifying the sensitive data, and the version numbers of the sensitive data discovered by different batches of the sensitive data discovery program are different.
According to another aspect of the present application, there is also provided a memory for storing a program for performing the above method.
According to another aspect of the present application, there is also provided a processor for executing a program, wherein the program is configured to perform the above method.
In the embodiment of the application, the method comprises the steps of acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, wherein the preset condition is configured in advance; generating a version number corresponding to the sensitive data at least according to the sensitive data; adding said version number to said sensitive data; and sending the sensitive data with the version number added to a preset program, wherein the preset program is a program for using or processing the sensitive data. The method and the device solve the problem that whether the sources of the sensitive data are consistent or not cannot be distinguished in the prior art, so that the sensitive data of different batches can be identified, and the program or the application can be favorably used for correspondingly processing the sensitive data.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, are included to provide a further understanding of the application, and the description of the exemplary embodiments of the application are intended to be illustrative of the application and are not intended to limit the application. In the drawings:
fig. 1 is a flowchart of a sensitive data identification processing method according to an embodiment of the present application.
Detailed Description
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than here.
In this embodiment, a sensitive data identifier processing method is provided, and fig. 1 is a flowchart of a sensitive data identifier processing method according to an embodiment of the present application, where as shown in fig. 1, the flowchart includes the following steps:
step S102, sensitive data discovered by a sensitive data discovery program from a database according to a preset condition is obtained, wherein the preset condition is configured in advance;
Step S104, generating a version number corresponding to the sensitive data at least according to the sensitive data; for example, the version number is used to identify the sensitive data, and the sensitive data discovery program has different version numbers between different batches of discovered sensitive data.
As an optional embodiment, the version number is increased linearly, where the linear increase is that the version number is increased according to a predetermined step after the sensitive data discovery program discovers the sensitive data once; in this addition, a time for finding the sensitive data may be added to the version number, and the linearly added version number and the time for finding the sensitive data are used together to identify the sensitive data.
As another optional embodiment, the found sensitive data may be taken as a whole, and the hash operation may be performed on the sensitive data taken as a whole, and a result of the hash operation may be retained; the two times of sensitive data which are continuously found are called first sensitive data and second sensitive data, whether the hash operation result of the first sensitive data is the same as the hash operation result of the second sensitive data or not is obtained, and if the two times of sensitive data are the same, the version numbers of the first sensitive data and the second sensitive data are the same; and if the hash operation results of the first sensitive data and the second sensitive data are different, the version numbers of the first sensitive data and the second sensitive data are different.
When the version number is generated, the version number may be composed of two parts, where a first part of the two parts is a linearly increasing serial number, and a second part of the two parts is a result obtained by performing a hash operation on the sensitive data found in the batch.
By means of the processing mode of the version numbers, on one hand, the different batches found by the sensitive data can be identified to be the same through the version numbers, and meanwhile, whether the contents of the sensitive data corresponding to the different version numbers are the same can be identified through adding the hash operation result in the version numbers.
As another alternative, in step S102, if the sensitive data discovery program uses different predetermined conditions to discover sensitive data, the discovered sensitive data should be different, and if the same predetermined conditions are used to discover sensitive data, the sensitive data of different batches may be the same or different; at the time of generating the version number, a predetermined condition for at least the idea to identify the use may be used. In this case, it is also possible to distinguish whether the same condition is used to find sensitive data by the version number.
Step S106, adding the version number to the sensitive data;
And step S108, sending the sensitive data with the version number added to a predetermined program, wherein the predetermined program is a program for using or processing the sensitive data.
The steps solve the problem that whether the sources of the sensitive data are consistent or not cannot be distinguished in the prior art, so that the sensitive data of different batches can be identified, and the sensitive data can be correspondingly processed by a program or an application.
After step S108, the method may further include: and receiving an acknowledgement message sent by the predetermined program, wherein the acknowledgement message is used for indicating that the predetermined program has received the sensitive data of the version number. Optionally, in a case that the confirmation message is not received after a predetermined period of time, the sensitive data with the version number increased is sent to the predetermined program again until the confirmation message sent by the predetermined program is received.
Through the optional implementation mode, the sensitive data can be retransmitted under the condition that the sensitive data of the corresponding version is not received, and the safety of data transmission is ensured.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor arranged to run the computer program to perform the method in the above embodiments.
The programs described above may be run on a processor or stored in memory (or referred to as computer-readable media), which includes both non-transitory and non-transitory, removable and non-removable media, that enable storage of information by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
These computer programs may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks, and corresponding steps may be implemented by different modules.
Such an apparatus or system is provided in this embodiment. The system is called a sensitive data identification processing system and comprises: the acquisition module is used for acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, wherein the preset condition is configured in advance; the generating module is used for generating a version number corresponding to the sensitive data at least according to the sensitive data; an adding module for adding the version number to the sensitive data; and the sending module is used for sending the sensitive data added with the version number to a predetermined program, wherein the predetermined program is a program for using or processing the sensitive data.
The system or the apparatus is configured to implement the functions of the method in the foregoing embodiments, and each module in the system or the apparatus corresponds to each step in the method, which has been already described in the method, and is not described again here.
For example, after the sensitive data increased by the version number is sent to the predetermined program, the system further includes: a receiving module, configured to receive a confirmation message sent by the predetermined program, where the confirmation message is used to indicate that the predetermined program has received the sensitive data of the version number.
For another example, the sending module is further configured to: and under the condition that the confirmation message is not received after a preset time, the sensitive data with the version number increased is sent to the preset program again until the confirmation message sent by the preset program is received.
The embodiment solves the problem that whether the sources of the sensitive data are consistent or not cannot be distinguished in the prior art, so that the sensitive data of different batches can be identified, and the program or the application can perform corresponding processing on the sensitive data.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (6)
1. A sensitive data identification processing method, comprising:
acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, wherein the preset condition is configured in advance;
generating a version number corresponding to the sensitive data at least according to the sensitive data, wherein if the sensitive data discovery program discovers the sensitive data by using different predetermined conditions, the discovered sensitive data are different, and if the sensitive data discovery program discovers the sensitive data by using the same predetermined conditions, the sensitive data of different batches may be the same or different; in generating a version number, at least one bit of the version number is used to identify the predetermined conditions used, the version number also being used to distinguish whether the same predetermined conditions are used to discover sensitive data;
adding the version number to the sensitive data;
sending the sensitive data added with the version number to a predetermined program, wherein the predetermined program is a program for using or processing the sensitive data;
receiving an acknowledgement message sent by the predetermined program, wherein the acknowledgement message is used for indicating that the predetermined program has received the sensitive data of the version number;
And under the condition that the confirmation message is not received after a preset time, the sensitive data with the version number increased is sent to the preset program again until the confirmation message sent by the preset program is received.
2. The method of claim 1, wherein the version number is used to identify the sensitive data, and wherein the sensitive data discovery procedure has different version numbers between sensitive data discovered by different batches.
3. A sensitive data identification processing system, comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring sensitive data discovered by a sensitive data discovery program from a database according to a preset condition, and the preset condition is pre-configured;
the generating module is used for generating a version number corresponding to the sensitive data at least according to the sensitive data; if the sensitive data discovery program uses different predetermined conditions to discover sensitive data, the discovered sensitive data are different, and if the same predetermined conditions are used to discover the sensitive data, the sensitive data of different batches may be the same or different; in generating a version number, at least one bit of the version number is used to identify the predetermined conditions used, the version number also being used to distinguish whether the same predetermined conditions are used to discover sensitive data;
The adding module is used for adding the version number to the sensitive data;
the sending module is used for sending the sensitive data added with the version number to a predetermined program, wherein the predetermined program is a program for using or processing the sensitive data;
a receiving module, configured to receive a confirmation message sent by the predetermined program, where the confirmation message is used to indicate that the predetermined program has received the sensitive data of the version number;
wherein the sending module is further configured to: and under the condition that the confirmation message is not received after a preset time, the sensitive data with the version number increased is sent to the preset program again until the confirmation message sent by the preset program is received.
4. The system of claim 3, wherein the version number is used to identify the sensitive data, and wherein the sensitive data discovery program has different version numbers between different batches of the discovered sensitive data.
5. A memory for storing a program, wherein the program is adapted to perform the method of any of claims 1 to 2.
6. A processor configured to execute a program, wherein the program is configured to perform the method of any one of claims 1 to 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210376532.XA CN114461614B (en) | 2022-04-12 | 2022-04-12 | Sensitive data identification processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210376532.XA CN114461614B (en) | 2022-04-12 | 2022-04-12 | Sensitive data identification processing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114461614A CN114461614A (en) | 2022-05-10 |
CN114461614B true CN114461614B (en) | 2022-06-28 |
Family
ID=81416496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210376532.XA Active CN114461614B (en) | 2022-04-12 | 2022-04-12 | Sensitive data identification processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114461614B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105814564A (en) * | 2013-12-14 | 2016-07-27 | 微软技术许可有限责任公司 | Query techniques and ranking results for knowledge-based matching |
CN108229154A (en) * | 2017-12-12 | 2018-06-29 | 顺丰科技有限公司 | Sensitive data operation log recording method, device, storage medium and equipment |
CN110069487A (en) * | 2017-09-28 | 2019-07-30 | 北京国双科技有限公司 | A kind of data processing method, apparatus and system |
CN110457957A (en) * | 2019-08-22 | 2019-11-15 | 腾讯科技(深圳)有限公司 | Information processing method, device, electronic equipment and the medium of electronic bill |
CN110727895A (en) * | 2019-10-09 | 2020-01-24 | 北京达佳互联信息技术有限公司 | Sensitive word sending method and device, electronic equipment and storage medium |
CN112380411A (en) * | 2020-11-10 | 2021-02-19 | 北京达佳互联信息技术有限公司 | Sensitive word processing method and device, electronic equipment, system and storage medium |
CN112527763A (en) * | 2019-09-19 | 2021-03-19 | 深圳艾派网络科技股份有限公司 | Method and system for updating text format data |
CN112580094A (en) * | 2020-12-14 | 2021-03-30 | 京东数字科技控股股份有限公司 | Data processing method, electronic device, and storage medium |
CN113312412A (en) * | 2021-06-25 | 2021-08-27 | 建信金融科技有限责任公司 | Statistical data acquisition method and device, electronic equipment and storage medium |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1413021A (en) * | 2002-08-27 | 2003-04-23 | 强海胜 | Multi-edition TV program satellite broadcast/automatic receiving, editing and recording transmission method |
US7542471B2 (en) * | 2002-10-30 | 2009-06-02 | Citrix Systems, Inc. | Method of determining path maximum transmission unit |
JP5679074B2 (en) * | 2011-12-19 | 2015-03-04 | 富士通株式会社 | Method, program, and apparatus for determining software installation order |
US9281941B2 (en) * | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
CN110245149B (en) * | 2019-06-25 | 2021-09-17 | 北京明略软件系统有限公司 | Metadata version management method and device |
CN110796556A (en) * | 2019-10-30 | 2020-02-14 | 泰康保险集团股份有限公司 | Information processing method and device, computer readable storage medium and electronic equipment |
CN112287384A (en) * | 2020-09-21 | 2021-01-29 | 长沙市到家悠享网络科技有限公司 | Configuration file generation method and device and storage medium |
CN112256320A (en) * | 2020-11-04 | 2021-01-22 | 广州繁星互娱信息科技有限公司 | Version number generation method, device, terminal and storage medium |
CN112486946A (en) * | 2020-11-17 | 2021-03-12 | 中国人寿保险股份有限公司 | Version confirmation method, version confirmation system, electronic equipment and storage medium |
CN114020854A (en) * | 2021-11-02 | 2022-02-08 | 杭州友电科技有限公司 | Data query method, system, electronic device and storage medium of dimension table |
-
2022
- 2022-04-12 CN CN202210376532.XA patent/CN114461614B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105814564A (en) * | 2013-12-14 | 2016-07-27 | 微软技术许可有限责任公司 | Query techniques and ranking results for knowledge-based matching |
CN110069487A (en) * | 2017-09-28 | 2019-07-30 | 北京国双科技有限公司 | A kind of data processing method, apparatus and system |
CN108229154A (en) * | 2017-12-12 | 2018-06-29 | 顺丰科技有限公司 | Sensitive data operation log recording method, device, storage medium and equipment |
CN110457957A (en) * | 2019-08-22 | 2019-11-15 | 腾讯科技(深圳)有限公司 | Information processing method, device, electronic equipment and the medium of electronic bill |
CN112527763A (en) * | 2019-09-19 | 2021-03-19 | 深圳艾派网络科技股份有限公司 | Method and system for updating text format data |
CN110727895A (en) * | 2019-10-09 | 2020-01-24 | 北京达佳互联信息技术有限公司 | Sensitive word sending method and device, electronic equipment and storage medium |
CN112380411A (en) * | 2020-11-10 | 2021-02-19 | 北京达佳互联信息技术有限公司 | Sensitive word processing method and device, electronic equipment, system and storage medium |
CN112580094A (en) * | 2020-12-14 | 2021-03-30 | 京东数字科技控股股份有限公司 | Data processing method, electronic device, and storage medium |
CN113312412A (en) * | 2021-06-25 | 2021-08-27 | 建信金融科技有限责任公司 | Statistical data acquisition method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114461614A (en) | 2022-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106878365B (en) | data synchronization method and device | |
CN114461614B (en) | Sensitive data identification processing method and system | |
CN113794696A (en) | Network security information processing method and system based on causal model | |
CN114416224A (en) | Method and device for calling micro service under multi-micro service environment | |
CN113641974A (en) | Database access control method and system based on cryptographic bridge | |
CN112035524B (en) | List data query method, device, computer equipment and readable storage medium | |
CN111835712A (en) | Data transmission method, device, system, equipment and storage medium | |
CN112181830A (en) | Memory leak detection method, device, terminal and medium | |
CN114020477A (en) | Desensitization cluster environment concurrent task scheduling method and device | |
CN112948389B (en) | MD 5-based database table data comparison method and device | |
CN111611092B (en) | Notification processing method, device and equipment | |
CN114879993A (en) | Upgrading processing method of software installation package, server and client | |
CN113553193B (en) | Mirror image data auditing and distributing processing method and system | |
CN109561123B (en) | Token caching method and device | |
CN111475807A (en) | Detection method and device for movable storage equipment | |
CN113326308B (en) | Intelligent integration method and device for financial data and processor | |
CN113723991B (en) | Marketing article influence analysis processing method and device | |
CN112579877A (en) | Information source system control method, device, storage medium and equipment | |
CN115510815B (en) | Rule-based identification generation method and apparatus | |
CN113641424B (en) | Database operation processing method and system | |
CN110175053B (en) | Picture loading method and device | |
CN115062091A (en) | Method, equipment and medium for improving block chain data throughput based on asynchronous mode | |
CN113961968A (en) | Method and device for carrying out data desensitization interrupt post-processing on file | |
CN114510495A (en) | Database service data consistency processing method and system | |
CN110659251B (en) | Data processing method and system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |