CN115422584A - Data deformation method and device - Google Patents

Data deformation method and device Download PDF

Info

Publication number
CN115422584A
CN115422584A CN202211052727.5A CN202211052727A CN115422584A CN 115422584 A CN115422584 A CN 115422584A CN 202211052727 A CN202211052727 A CN 202211052727A CN 115422584 A CN115422584 A CN 115422584A
Authority
CN
China
Prior art keywords
deformation
data
data file
field
deformed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211052727.5A
Other languages
Chinese (zh)
Inventor
李平
梁锦华
郑培钿
王攀峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211052727.5A priority Critical patent/CN115422584A/en
Publication of CN115422584A publication Critical patent/CN115422584A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a data deformation method and a device, wherein the method comprises the following steps: receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request; performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation; the application can effectively improve convenience, reliability and safety during data deformation processing.

Description

Data deformation method and device
Technical Field
The present application relates to the field of data processing, and in particular, to a data transformation method and apparatus.
Background
The bank system holds massive (EB) information data, and in order to adapt to the massive data, the bank information system needs to perform performance test or function simulation test for simulating a production environment, and the test environment is data which cannot create massive and has an association relationship artificially. Therefore, it becomes an important test data preparation method to transfer the produced data to the test environment after deformation (desensitization) processing, and the current data deformation (desensitization) security is all dependent on institutional management, i.e. each time a deformation (desensitization) rule is set and the minimum authorization of the rule is guaranteed. If the data deformation rule is not kept secret properly, the production data leakage may be caused by rule leakage.
In addition, in the existing morphing (desensitization) technology, in order to ensure that the format is kept unchanged after data desensitization (for example, 11 digits are still 11 digits after 11 digit mobile phone number desensitization; possible surname and first name combinations are still obtained after Chinese name desensitization), and the association relationship of the associated fields of different table data is kept unchanged, a desensitization tool usually needs to set a large number of complex mapping rules, and if the mapping rules leak, the desensitized data can be restored.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a data deformation method and device, which can effectively improve the convenience, reliability and safety of data deformation processing.
In order to solve at least one of the above problems, the present application provides the following technical solutions:
in a first aspect, the present application provides a data warping method, including:
receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request;
and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
Further, after the determining the field to be deformed in the corresponding data file according to the data file deformation request, the method includes:
carrying out deformation type matching on each field to be deformed in the data file, and determining a deformation type corresponding to the field to be deformed;
and determining a corresponding deformation mode according to the deformation type of the field to be deformed.
Further, after the determining the field to be deformed in the corresponding data file according to the data file deformation request, the method includes:
determining a corresponding desensitization requirement according to the data file deformation request;
and determining the deformation mapping space range of the field to be deformed in the data file according to the desensitization requirement.
Further, after the obtaining of the data file after data transformation, the method includes:
monitoring whether the data deformation operation is executed completely;
if yes, destroying the reserved format encryption key in the hardware encryption equipment.
Further, the determining, according to the desensitization requirement, a transformation mapping space range of a field to be transformed in the data file includes:
and determining the numerical value range of the field to be deformed in the data file according to the desensitization requirement.
Further, the destroying the reserved format encryption key in the hardware encryption device includes:
and destroying the reserved format encryption key in the hardware encryption equipment by setting a physical mode.
In a second aspect, the present application provides a data warping apparatus, comprising:
the deformation field determining module is used for receiving a data file deformation request and determining a field to be deformed in a corresponding data file according to the data file deformation request;
and the data deformation module is used for performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
Further, the method also comprises the following steps:
the deformation type determining unit is used for performing deformation type matching on each field to be deformed in the data file and determining a deformation type corresponding to the field to be deformed;
and the deformation mode determining unit is used for determining a corresponding deformation mode according to the deformation type of the field to be deformed.
Further, the method also comprises the following steps:
a desensitization requirement determining unit, configured to determine a corresponding desensitization requirement according to the data file deformation request;
and the mapping range determining unit is used for determining the deformation mapping space range of the field to be deformed in the data file according to the desensitization requirement.
Further, the method also comprises the following steps:
the deformation operation monitoring unit is used for monitoring whether the data deformation operation is finished;
and the encryption key destroying unit is used for destroying the reserved format encryption key in the hardware encryption equipment.
In a third aspect, the present application provides an electronic device, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the data transformation method when executing the program.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the data warping method.
In a fifth aspect, the present application provides a computer program product comprising computer programs/instructions which, when executed by a processor, implement the steps of the data morphing method.
According to the technical scheme, the data deformation method and the data deformation device are characterized in that a data file deformation request is received, and a field to be deformed in a corresponding data file is determined according to the data file deformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following descriptions are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a data transformation method according to an embodiment of the present application;
FIG. 2 is a second flowchart illustrating a data transformation method according to an embodiment of the present application;
FIG. 3 is a third flowchart illustrating a data transformation method according to an embodiment of the present application;
FIG. 4 is a fourth flowchart illustrating a data transformation method according to an embodiment of the present application;
FIG. 5 is one of the configuration diagrams of a data warping device in the embodiment of the present application;
FIG. 6 is a second block diagram of a data transformation apparatus according to an embodiment of the present application;
FIG. 7 is a third block diagram of a data transformation apparatus according to an embodiment of the present application;
FIG. 8 is a fourth block diagram of the data transformation device in the embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
In consideration of the problems in the prior art, the application provides a data deformation method and device, wherein a data file deformation request is received, and a field to be deformed in a corresponding data file is determined according to the data file deformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
In order to effectively improve convenience, reliability and safety during data transformation processing, the present application provides an embodiment of a data transformation method, and with reference to fig. 1, the data transformation method specifically includes the following contents:
step S101: receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request.
Optionally, before performing data transformation, the hardware encryption device storing the format-preserved encryption key generates a transformation key group by using a hardware random number module, and uses the transformation key group for subsequent format-preserved encryption.
Optionally, the service system of the present application requests the data file to be transformed through the service interface, and the service interface checks whether the file has a field that needs to be transformed, and if so, the service interface enters the next step of processing.
Step S102: and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
Optionally, the present application may perform transformation type matching on each field in the data file, that is, a field-specific processing manner (for example, a name field performs UTF-8 chinese character type processing without limiting a surname range, a money amount performs integer type processing, an id card performs certificate number type processing to ensure that a birthday information format is correct, and address information performs UTF-8 chinese character type processing).
Optionally, the data deformation mapping space setting may be performed according to the desensitization requirement, that is, a value range of the data is selected (assuming that there are 1 ten thousand credit card test data, the validity periods of the cards are between 20180101 and 20220101, and in order to generate partial expired card (the validity period is generally 5 years), the mapping rule may be adjusted, so that the mapping output space range is set to 20150101 to 20200101).
Optionally, the application may perform data transformation operation on the field to be transformed by setting a hardware encryption device storing a reserved format encryption key, a transformation type corresponding to the data file transformation request, and a transformation mapping space range, that is, perform reserved format encryption FPE on input data, and integrate and output a transformation result.
In another possible embodiment of the present application, after the present application completes the data transformation, the hardware protection unit destroys the key group in a physical manner, so as to ensure that the data encrypted by the FPE cannot be decrypted.
As can be seen from the above description, the data transformation method provided in the embodiment of the present application can determine the field to be transformed in the corresponding data file according to the data file transformation request by receiving the data file transformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
In an embodiment of the data transformation method of the present application, referring to fig. 2, the following may be further included:
step S201: and carrying out deformation type matching on each field to be deformed in the data file, and determining the deformation type corresponding to the field to be deformed.
Step S202: and determining a corresponding deformation mode according to the deformation type of the field to be deformed.
Optionally, the method and the device can perform deformation type matching on each field in the data file, namely, a field-specific processing mode (for example, a name field performs UTF-8 Chinese character type processing without limiting a surname range, money performs integer type processing, an identification card performs identification card number type processing to ensure that a birthday information format is correct, and address information performs UTF-8 Chinese character type processing).
In an embodiment of the data transformation method of the present application, referring to fig. 3, the following may be further included:
step S301: and determining the corresponding desensitization requirement according to the data file deformation request.
Step S302: and determining the deformation mapping space range of the field to be deformed in the data file according to the desensitization requirement.
Optionally, the numerical value range of the field to be deformed in the data file may be determined according to the desensitization requirement.
Specifically, the data deformation mapping space setting can be performed according to the desensitization requirement, that is, the value range of the data is selected (assuming that there are 1 ten thousand credit card test data, the validity periods of the cards are between 20180101 and 20220101, and in order to generate partial data of expired cards (the validity period is generally 5 years), the mapping rule can be adjusted, so that the mapping output space range is set to 20150101 to 20200101).
In an embodiment of the data transformation method of the present application, referring to fig. 4, the following may be further included:
step S401: and monitoring whether the data deformation operation is finished.
Step S402: if yes, destroying the reserved format encryption key in the hardware encryption equipment.
Optionally, the reserved format encryption key in the hardware encryption device may be destroyed by setting a physical manner.
Specifically, after the data is transformed, the hardware protection unit destroys the key group in a physical mode, and it is ensured that the data encrypted by the FPE cannot be decrypted.
In order to effectively improve convenience, reliability and safety during data transformation processing, the present application provides an embodiment of a data transformation apparatus for implementing all or part of contents of the data transformation method, and referring to fig. 5, the data transformation apparatus specifically includes the following contents:
and the deformation field determining module 10 is configured to receive a data file deformation request, and determine a field to be deformed in a corresponding data file according to the data file deformation request.
And the data deformation module 20 is configured to perform data deformation operation on the field to be deformed by setting a hardware encryption device in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request, and a deformation mapping space range, so as to obtain a data file after data deformation.
As can be seen from the above description, the data deformation apparatus provided in the embodiment of the present application can determine the field to be deformed in the corresponding data file according to the data file deformation request by receiving the data file deformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
In an embodiment of the data transformation apparatus of the present application, referring to fig. 6, the following contents are further specifically included:
and a deformation type determining unit 31, configured to perform deformation type matching on each field to be deformed in the data file, and determine a deformation type corresponding to the field to be deformed.
And a deformation mode determining unit 32, configured to determine a corresponding deformation mode according to the deformation type of the field to be deformed.
In an embodiment of the data transformation apparatus of the present application, referring to fig. 7, the following is further included:
a desensitization requirement determining unit 41, configured to determine a corresponding desensitization requirement according to the data file deformation request.
And the mapping range determining unit 42 is configured to determine a deformation mapping space range of the field to be deformed in the data file according to the desensitization requirement.
In an embodiment of the data transformation apparatus of the present application, referring to fig. 8, the following is further included:
and a deformation operation monitoring unit 51, configured to monitor whether the data deformation operation is completed.
An encryption key destruction unit 52, configured to destroy the reserved format encryption key in the hardware encryption device.
In terms of hardware, in order to effectively improve convenience, reliability, and security during data transformation processing, the present application provides an embodiment of an electronic device for implementing all or part of contents in the data transformation method, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between the data deformation device and relevant equipment such as a core service system, a user terminal, a relevant database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the logic controller may refer to the embodiment of the data transformation method and the embodiment of the data transformation apparatus in the embodiments for implementation, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, a smart wearable device, and the like. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the data transformation method may be performed on the electronic device side as described above, or all operations may be performed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third-party server platform that has a communication link with the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
Fig. 9 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 9, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. It is noted that this fig. 9 is exemplary; other types of structures may also be used in addition to or in place of the structures to implement telecommunications or other functions.
In one embodiment, the data morphing method function may be integrated into the central processor 9100. The central processor 9100 can be configured to perform the following control:
step S101: receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request.
Step S102: and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
As can be seen from the above description, in the electronic device provided in the embodiment of the present application, by receiving a data file deformation request, a field to be deformed in a corresponding data file is determined according to the data file deformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
In another embodiment, the data transformation apparatus may be configured separately from the central processor 9100, for example, the data transformation apparatus may be configured as a chip connected to the central processor 9100, and the data transformation method function is realized by the control of the central processor.
As shown in fig. 9, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 9; in addition, the electronic device 9600 may further include components not shown in fig. 9, which may be referred to in the prior art.
As shown in fig. 9, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. The power supply 9170 is used to provide power to the electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., read Only Memory (ROM), random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes referred to as an EPROM or the like. The memory 9140 could also be some other type of device. The memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage part 9142, the application/function storage part 9142 being used to store application programs and function programs or a flow for executing the operation of the electronic device 9600 by the central processing unit 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
The embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps of the data transformation method whose main execution body is the server or the client in the foregoing embodiments, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements all the steps of the data transformation method whose main execution body is the server or the client in the foregoing embodiments, for example, when the processor executes the computer program, the processor implements the following steps:
step S101: receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request.
Step S102: and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
As can be seen from the above description, in the computer-readable storage medium provided in the embodiment of the present application, by receiving a data file deformation request, a field to be deformed in a corresponding data file is determined according to the data file deformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file subjected to data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
Embodiments of the present application further provide a computer program product capable of implementing all steps in the data transformation method in which the execution subject in the above embodiments is a server or a client, and when being executed by a processor, the computer program/instruction implements the steps of the data transformation method, for example, the computer program/instruction implements the following steps:
step S101: receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request.
Step S102: and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
As can be seen from the above description, in the computer program product provided in the embodiment of the present application, by receiving a data file deformation request, a field to be deformed in a corresponding data file is determined according to the data file deformation request; and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which a format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain a data file after data deformation, so that the convenience, reliability and safety during data deformation processing can be effectively improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method of data morphing, the method comprising:
receiving a data file deformation request, and determining a field to be deformed in a corresponding data file according to the data file deformation request;
and performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the format-preserved encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
2. The data transformation method according to claim 1, wherein after determining the field to be transformed in the corresponding data file according to the data file transformation request, the method comprises:
performing deformation type matching on each field to be deformed in the data file, and determining a deformation type corresponding to the field to be deformed;
and determining a corresponding deformation mode according to the deformation type of the field to be deformed.
3. The data transformation method according to claim 1, after determining the field to be transformed in the corresponding data file according to the data file transformation request, comprising:
determining a corresponding desensitization requirement according to the data file deformation request;
and determining the deformation mapping space range of the field to be deformed in the data file according to the desensitization requirement.
4. The data transformation method of claim 1, wherein after the obtaining of the data file after data transformation, the method comprises:
monitoring whether the data deformation operation is executed completely;
if yes, destroying the reserved format encryption key in the hardware encryption equipment.
5. The data deformation method according to claim 3, wherein the determining a deformation mapping space range of the field to be deformed in the data file according to the desensitization requirement comprises:
and determining the numerical value range of the field to be deformed in the data file according to the desensitization requirement.
6. The data deformation method of claim 4, wherein the destroying the reserved format encryption key in the hardware encryption device comprises:
and destroying the reserved format encryption key in the hardware encryption equipment by setting a physical mode.
7. A data morphing apparatus, comprising:
the deformation field determining module is used for receiving a data file deformation request and determining a field to be deformed in a corresponding data file according to the data file deformation request;
and the data deformation module is used for performing data deformation operation on the field to be deformed by setting hardware encryption equipment in which the reserved format encryption key is stored, a deformation type corresponding to the data file deformation request and a deformation mapping space range to obtain the data file after data deformation.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the data warping method according to any one of claims 1 to 6 when executing the program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the data deformation method of any one of claims 1 to 6.
10. A computer program product comprising computer program/instructions, characterized in that the computer program/instructions, when executed by a processor, implement the steps of the data morphing method of any one of claims 1 to 6.
CN202211052727.5A 2022-08-31 2022-08-31 Data deformation method and device Pending CN115422584A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211052727.5A CN115422584A (en) 2022-08-31 2022-08-31 Data deformation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211052727.5A CN115422584A (en) 2022-08-31 2022-08-31 Data deformation method and device

Publications (1)

Publication Number Publication Date
CN115422584A true CN115422584A (en) 2022-12-02

Family

ID=84201096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211052727.5A Pending CN115422584A (en) 2022-08-31 2022-08-31 Data deformation method and device

Country Status (1)

Country Link
CN (1) CN115422584A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116776351A (en) * 2023-06-21 2023-09-19 中国民用航空总局第二研究所 Preserving format encryption method and system for personal information to resist statistical analysis attack

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116776351A (en) * 2023-06-21 2023-09-19 中国民用航空总局第二研究所 Preserving format encryption method and system for personal information to resist statistical analysis attack

Similar Documents

Publication Publication Date Title
CN111369247A (en) Cross-bank transaction data processing method and device
CN111931209A (en) Contract information verification method and device based on zero knowledge certification
CN110659899B (en) Offline payment method, device and equipment
CN113409134A (en) Enterprise financing trust method and device based on federal learning
CN114519360B (en) Data read-write method, login method and device of service system and computer equipment
CN115422584A (en) Data deformation method and device
CN114697117B (en) Verification method, device, cipher device and system based on positioning information
CN101841806A (en) Service card information processing method, device and system and communication terminal
CN115099930A (en) Financial business data processing method and device
CN115567297A (en) Cross-site request data processing method and device
CN101986684A (en) Processing system and method for rechargeable paying
CN113158259A (en) Block chain integrity verification method and device
CN113434423A (en) Interface test method and device
CN110555693B (en) System and method for realizing two-dimension code safety by using SIM card
CN111178893A (en) Security authentication method and device for preventing brush theft
CN112749966B (en) Transaction replay detection method and device
CN112511510B (en) Authorization authentication method, system, electronic equipment and readable storage medium
CN116738500A (en) Data deformation processing method, device and system
CN113159758A (en) Method and device for displaying two-dimensional code by POS machine
CN113420266A (en) Computer system integrated software protection method and device
CN113569289A (en) Data desensitization method and device
CN114881643A (en) Loss reporting method, device and system for bank card
CN111935159A (en) Method, device and system for authenticating mutual trust between multiple systems
CN116703400A (en) Encryption payment method, device and system based on quantum communication
CN114581163A (en) Bill data processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination