CN115640606A - Data visualization method and system based on safety - Google Patents
Data visualization method and system based on safety Download PDFInfo
- Publication number
- CN115640606A CN115640606A CN202211333710.7A CN202211333710A CN115640606A CN 115640606 A CN115640606 A CN 115640606A CN 202211333710 A CN202211333710 A CN 202211333710A CN 115640606 A CN115640606 A CN 115640606A
- Authority
- CN
- China
- Prior art keywords
- data
- sensitive
- field
- fields
- desensitization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000013079 data visualisation Methods 0.000 title claims abstract description 22
- 238000000586 desensitisation Methods 0.000 claims abstract description 56
- 238000001914 filtration Methods 0.000 claims description 14
- 238000012544 monitoring process Methods 0.000 claims description 13
- 238000012545 processing Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 12
- 238000004590 computer program Methods 0.000 description 7
- 231100000279 safety data Toxicity 0.000 description 7
- 238000007726 management method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012800 visualization Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000005457 optimization Methods 0.000 description 4
- 238000003860 storage Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 3
- 238000013499 data model Methods 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 238000007794 visualization technique Methods 0.000 description 1
Images
Abstract
The invention discloses a data visualization method and a system based on safety, wherein the method comprises the steps of identifying a data field in data to be processed, and automatically setting a sensitive data label or a sensitive data grade of a sensitive field in the data field based on an identification result; extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching a desensitization rule corresponding to the extracted sensitive data label of the sensitive field, and performing dynamic desensitization on the sensitive field based on the desensitization rule to acquire a desensitization data field associated with the sensitive field; and displaying the data field, the sensitive field and the desensitization data field in a tree structure based on the incidence relation among the data field, the sensitive field and the desensitization data field.
Description
Technical Field
The invention relates to the technical field of data security processing, in particular to a data visualization method and system based on security.
Background
With the explosive growth of user data in modern society, the data has various characteristics, and massive data processing becomes possible by big data. When the big data era comes, data is not only transmitted to a display end to be displayed to a user, but also massive data information needs to be efficiently processed and analyzed. On the other hand, as the breadth and depth of social activities continue to expand, the amount of data generated increases and the data dimensions continue to expand, the data sources are scattered and inconsistent, the data quality is poor, and management is poor.
Prior art 1 (CN 110955897A) discloses a software development safety management and control visualization method and system based on big data, where prior art 1 collects safety data of node input and output objects by manually monitoring or setting a data acquisition probe for a node of software to be developed; and storing the collected safety data in a safety database unit in a standardized manner through a safety data model, extracting the safety data, calculating a safety value according to the safety data model, and graphically displaying the safety value. In the prior art 1, manual participation is needed for processing data, and the safety of the data is difficult to ensure.
Prior art 2 (CN 110007989A) discloses a data visualization platform system, which presents different types of data in various and appropriate ways through a constructed visualization platform, and can effectively realize communication between people and data. The scheme disclosed in reference 2 does not perform secure processing on data, and cannot ensure the security of the data.
Prior art 3 (CN 109377439A) discloses a system and a method for managing city safety information and a data processing center, which are used to solve the problem of low accuracy of the existing city safety analysis results. The scheme disclosed in reference 3 does not relate to security of processing data.
Therefore, a technique is needed to enable security-based data visualization.
Disclosure of Invention
The technical scheme of the invention provides a data visualization method and system based on safety, which aim to solve the problem of safely visualizing data.
In order to solve the above problem, the present invention provides a security-based data visualization method, including:
identifying data fields in the data to be processed, and automatically setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on identification results;
extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels;
matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and displaying the data field, the sensitive field and the desensitization data field in a tree structure based on the incidence relation among the data field, the sensitive field and the desensitization data field.
Preferably, the method further comprises the following steps:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
Preferably, the identifying data fields in the data to be processed includes:
and identifying whether the sensitive field is in compliance or not based on an identification algorithm, and automatically setting a sensitive data label or a sensitive data level of the sensitive field in the data field based on an identification result when the sensitive field is in compliance.
Preferably, the method further comprises encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
Preferably, the displaying of the tree structure for the data field, the sensitive field and the desensitized data field includes:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
In another aspect of the invention, the invention provides a security-based data visualization system, the system comprising:
the sensitive data setting unit is used for identifying the data field in the data to be processed and automatically setting the sensitive data label or the sensitive data grade of the sensitive field in the data field based on the identification result;
the data asset desensitization unit is used for extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and the sensitive data monitoring unit is used for displaying the tree structures of the data fields, the sensitive fields and the desensitized data fields based on the incidence relation among the data fields, the sensitive fields and the desensitized data fields.
Preferably, the sensitive data setting unit is further configured to:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
Preferably, the sensitive data setting unit is configured to identify a data field in the data to be processed, and is further configured to:
and identifying whether the sensitive field is in compliance or not based on an identification algorithm, and automatically setting a sensitive data label or a sensitive data level of the sensitive field in the data field based on an identification result when the sensitive field is in compliance.
Preferably, the system further comprises a data asset encryption unit for:
encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
Preferably, the sensitive data monitoring unit is configured to perform tree structure exhibition on the data field, the sensitive field, and the desensitization data field, and is further configured to:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
The technical scheme of the invention provides a data visualization method and a system based on safety, wherein the method comprises the steps of identifying a data field in data to be processed, and automatically setting a sensitive data label or a sensitive data grade of a sensitive field in the data field based on an identification result; extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the sensitive data labels of the extracted sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to obtain desensitization data fields associated with the sensitive fields; and displaying the tree structure of the data field, the sensitive field and the desensitization data field based on the incidence relation among the data field, the sensitive field and the desensitization data field. The technical scheme of the invention can process and analyze data under any scene service, and simultaneously ensure the safety of the data. The technical scheme of the invention not only realizes the visualization of the data, but also ensures the safety of the data in the process of processing and displaying the data. According to the technical scheme, the processes of data acquisition, processing, extraction and display do not need manual direct monitoring, but data desensitization and encryption are realized in a program compiling mode, so that the situation that an ordinary user cannot operate and process data in the system using process is ensured, and the safety of the data is ensured. The user can check and analyze the data in different dimensions in the visualization module.
Drawings
A more complete understanding of exemplary embodiments of the present invention may be had by reference to the following drawings in which:
FIG. 1 is a flow diagram of a security-based data visualization method according to a preferred embodiment of the present invention;
FIG. 2 is a block diagram of a security-based data visualization system in accordance with a preferred embodiment of the present invention;
FIG. 3 is a flow chart of sensitive data identification according to a preferred embodiment of the present invention;
FIG. 4 is a flow diagram of data desensitization according to a preferred embodiment of the present invention; and
fig. 5 is a schematic diagram of a group optimization structure according to a preferred embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings are not intended to limit the present invention. In the drawings, the same unit/element is denoted by the same reference numeral.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 shows a security-based data visualization method according to an embodiment of the present invention, in which modules such as sensitive data monitoring and analysis, sensitive data distribution, and the like are combined with a graph by using the modules in a coordinated manner, so that dimensional data can be edited and viewed comprehensively and conveniently. At present, data visualization is realized on the market mainly based on technologies such as Echarts and AntV-X6 graph editing engines, and the technologies have good stability and expression effect after long-term use and verification. By adopting desensitization, encryption algorithm and open source visualization technology, the invention not only ensures the data security, but also can look up and analyze data such as sensitive data monitoring, sensitive data access logs and the like, and is convenient for users to efficiently manage the data.
As shown in fig. 1, the present invention provides a security-based data visualization method, which includes:
step 101: identifying data fields in the data to be processed, and automatically setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on identification results;
preferably, the method further comprises the following steps:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
Preferably, identifying the data field in the data to be processed includes:
and whether the sensitive field is in compliance or not is identified based on an identification algorithm, and when the sensitive field is in compliance, a sensitive data label or a sensitive data level of the sensitive field in the data field is automatically set based on an identification result.
The invention firstly obtains the log information of enterprise users such as tax numbers, addresses and the like, stores the log information in a data warehouse, and acquires, cleans, standardizes and extracts user data through an acquisition module. And finally, displaying the data for the user in a graphical image mode. The data security management runs through the whole data management process, various data security management measures such as encryption, desensitization, fuzzification processing, database authorization monitoring and the like of private data are provided, the safe operation of the data is guaranteed in an all-round mode, and the structure diagram of the data security management system is shown in figure 2.
The sensitive data setting module comprises a sensitive data label, sensitive level setting and sensitive data identification. Firstly, data is labeled, a sensitive data label is set for a field, the value of the field can be intelligently scanned, and rules corresponding to the sensitive label are matched for batch encryption and desensitization. And data identification and marking can be carried out according to the set sensitivity level and the set sensitivity label. The method comprises the following steps: manual marking, which can perform condition filtering on the data to be filtered; the sensitive data needing to be marked are automatically identified and intelligently identified, and the sensitive data identification process is shown as the attached figure 3.
The method can manually mark the sensitive data to be marked, select the corresponding data assets, perform condition filtering on the data to be filtered, and manually identify the data by adding the sensitive data label to be marked.
The method can intelligently identify the sensitive data to be marked, select the corresponding data asset and add the sensitive data label to be marked, and the system can determine the sensitive data label with the matching degree of more than 70% with 16 built-in sensitive data labels according to the built-in matching rules, and can intelligently identify the sensitive data label by clicking and scanning.
Step 102: extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels;
step 103: matching desensitization rules corresponding to the sensitive data labels of the extracted sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to obtain desensitization data fields associated with the sensitive fields;
the sensitive data desensitization module encrypts the data assets according to the sensitive level or picks up the data assets in batches according to the sensitive data labels, and picks up all sensitive fields meeting the sensitive data requirements under the asset catalogues. Dynamic desensitization is then performed according to the rules of the sensitivity level or sensitive data tags. And an automatic identification algorithm is adopted for the user identity card number, the telephone number, the tax number and the like, and the identification is provided for the regulatory information. An identity card: three recognition algorithms isValidate18IdCard, isIdCard, ishmtIdCard are provided. Wherein the isValidate18IdCard recognizes the qualified inward-oriented identification number before desensitization, the isIdCard recognizes the inward-oriented identification number after desensitization, and the ishMtIdCard recognizes the identification numbers of the Australian Hongkong district before and after desensitization, and the desensitization process is shown in figure 4.
The invention can build or check all desensitization rules, and build desensitization rules corresponding to specific sensitive data labels, and desensitization rules with the same name can not be set under the same sensitive data label.
The invention sets a group on the main interface, and can put the data of the same series under one group.
Newly created desensitization data desensitizes individual data. And selecting a data asset set needing desensitization, selecting a desensitization rule, and clicking to view data after storage to see desensitization effect. For example, the desensitization rule is set to four x's in the middle of the cell number.
Step 104: and displaying the tree structure of the data field, the sensitive field and the desensitization data field based on the incidence relation among the data field, the sensitive field and the desensitization data field.
Preferably, the method further comprises encrypting the sensitive data:
and selecting sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
The sensitive data encryption module dynamically encrypts assets through a built-in algorithm, and can selectively encrypt certain roles and users during encryption. A reserved format encryption algorithm is used. For an 11-digit mobile phone number in the form of 13801110543, the number remains 11 after encryption. The initial three digits of the mobile phone number are 130-199, and the rest 8 digits are random. The specific reserved format encryption algorithm is implemented as follows, and the following is a specific function description:
public long fpe_tel_encrypt(int m,int round,long input,String key)
public long fpe_tel_decrypt(int m,int round,long input,String key)
inputting a description:
int m: the category parameters of the format encryption algorithm are reserved, and the algorithm needs to be set to be an odd number;
int round: encryption and decryption rounds, wherein encryption and decryption parameters need to be consistent;
long input: data to be operated on;
string key: the SM4 algorithm uses a secret key, a 32-bit 16-ary number.
Preferably, the tree structure presentation of the data field, the sensitive field and the desensitized data field includes:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
The sensitive data monitoring module adopts an open-source AntV-X6 graph editing engine, uses a layout algorithm provided by AntV-X6 to realize the optimization of the group, and realizes the layout, rendering and sideline linkage of father and son group nodes by combining the group on the basis of hierarchical layout. In the process of data standardization processing, a large amount of metadata, data assets and relevance among sensitive data fields exist, and in order to facilitate display for users, the dependency relationship among different dimensional data is displayed in a tree structure form by adopting the technology. Meanwhile, the metadata can be subjected to root tracing, full-chain analysis and relevance analysis, and the group optimization structure is shown in the attached figure 5.
The invention ensures the safety and integrity of the data in the whole life cycle process of collecting, processing and extracting and displaying the data; the invention solves the problems that the safety data in the existing collected metadata are disordered and have no relevance among the safety data; the invention adopts a layout algorithm provided by open source AntV-X6, realizes the optimization of the group, and realizes the layout, rendering and sideline linkage of the nodes of the father-son-grandson group by combining the group on the basis of hierarchical layout.
According to the invention, through a safe data visualization program, visualization can be realized on data, and the safety of the data is also ensured. According to the invention, from the business scene of an enterprise user operation management mode, user data is acquired, cleaned, processed in a standardized manner and extracted and displayed through modules such as data acquisition, data processing and data visualization. The method not only treats mass data, but also ensures the accuracy of the data. The modules are matched for use, so that modules such as data assets and sensitive data monitoring are combined, dimensional data are edited and checked comprehensively and conveniently, and enterprise user management and operation efficiency is greatly improved.
Fig. 2 is a block diagram of a security-based data visualization system according to a preferred embodiment of the present invention.
As shown in fig. 2, the present invention provides a security-based data visualization system, comprising:
the sensitive data setting unit is used for identifying the data field in the data to be processed and automatically setting the sensitive data label or the sensitive data grade of the sensitive field in the data field based on the identification result;
preferably, the sensitive data setting unit is further configured to:
and performing condition filtering on the data fields in the data to be processed, and setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on the condition filtering result.
Preferably, the sensitive data setting unit is configured to identify a data field in the data to be processed, and is further configured to:
whether the sensitive field is in compliance is identified based on an identification algorithm, and when the sensitive field is in compliance, a sensitive data label or a sensitive data level of the sensitive field in the data field is automatically set based on an identification result.
The data asset desensitization unit is used for extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to obtain desensitization data fields associated with the sensitive fields;
the sensitive data monitoring unit is used for displaying the tree structure of the data field, the sensitive field and the desensitized data field based on the incidence relation among the data field, the sensitive field and the desensitized data field.
Preferably, the sensitive data monitoring unit is configured to perform tree structure exhibition on the data field, the sensitive field, and the desensitized data field, and is further configured to:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
Preferably, the system further comprises a data asset encryption unit for:
encrypting the sensitive data:
and selecting sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
The security-based data visualization system provided by the embodiment of the invention corresponds to the security-based data visualization method provided by the embodiment of the invention, and details are not repeated here.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the invention can be realized by adopting various computer languages, such as object-oriented programming language Java and transliterated scripting language JavaScript.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a// the [ device, component, etc ]" are to be interpreted openly as at least one instance of a device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
Claims (10)
1. A security-based data visualization method, the method comprising:
identifying data fields in the data to be processed, and automatically setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on identification results;
extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels;
matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and displaying the data field, the sensitive field and the desensitized data field in a tree structure based on the incidence relation among the data field, the sensitive field and the desensitized data field.
2. The method of claim 1, further comprising:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
3. The method of claim 1, the identifying data fields in the data to be processed comprising:
and whether the sensitive field is in compliance is identified based on an identification algorithm, and when the sensitive field is in compliance, a sensitive data label or a sensitive data level of the sensitive field in the data field is automatically set based on an identification result.
4. The method of claim 1, further comprising encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
5. The method of claim 1, the exposing of the data field, the sensitive field, and the desensitized data field to a tree structure, comprising:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
6. A security-based data visualization system, the system comprising:
the sensitive data setting unit is used for identifying the data field in the data to be processed and automatically setting the sensitive data label or the sensitive data grade of the sensitive field in the data field based on the identification result;
the data asset desensitization unit is used for extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and the sensitive data monitoring unit is used for displaying the tree structures of the data fields, the sensitive fields and the desensitized data fields based on the incidence relation among the data fields, the sensitive fields and the desensitized data fields.
7. The system of claim 6, the sensitive data setting unit further to:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
8. The system of claim 6, the sensitive data setting unit to identify a data field in the data to be processed, and further to:
and identifying whether the sensitive field is in compliance or not based on an identification algorithm, and automatically setting a sensitive data label or a sensitive data level of the sensitive field in the data field based on an identification result when the sensitive field is in compliance.
9. The system of claim 6, further comprising a data asset encryption unit to:
encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
10. The system of claim 6, the sensitive data monitoring unit to perform tree-structured presentation of the data field, the sensitive field, and the desensitized data field, and further to:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211333710.7A CN115640606A (en) | 2022-10-28 | 2022-10-28 | Data visualization method and system based on safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211333710.7A CN115640606A (en) | 2022-10-28 | 2022-10-28 | Data visualization method and system based on safety |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115640606A true CN115640606A (en) | 2023-01-24 |
Family
ID=84947746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211333710.7A Pending CN115640606A (en) | 2022-10-28 | 2022-10-28 | Data visualization method and system based on safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115640606A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116541382A (en) * | 2023-02-23 | 2023-08-04 | 广东东联信创信息技术有限公司 | Data management method and system based on data security identification level |
-
2022
- 2022-10-28 CN CN202211333710.7A patent/CN115640606A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116541382A (en) * | 2023-02-23 | 2023-08-04 | 广东东联信创信息技术有限公司 | Data management method and system based on data security identification level |
CN116541382B (en) * | 2023-02-23 | 2023-11-14 | 邵阳学院 | Data management method and system based on data security identification level |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106572117B (en) | A kind of detection method and device of WebShell file | |
CN110336838B (en) | Account abnormity detection method, device, terminal and storage medium | |
CN105283852A (en) | Obfuscating trace data | |
CN108710564A (en) | Source code comprehensive evaluating platform based on big data | |
CN112446637A (en) | Building construction quality safety online risk detection method and system | |
CN115640606A (en) | Data visualization method and system based on safety | |
CN112765673A (en) | Sensitive data statistical method and related device | |
CN115658080A (en) | Method and system for identifying open source code components of software | |
CN109711849B (en) | Ether house address portrait generation method and device, electronic equipment and storage medium | |
CN113900955A (en) | Automatic testing method, device, equipment and storage medium | |
CN113918467A (en) | Financial system testing method, device, equipment and storage medium | |
CN115758435A (en) | External sharing security processing method for company marketing data and related equipment | |
Acosta et al. | City safety perception model based on visual content of street images | |
CN107430590A (en) | Data compare | |
CN112508541A (en) | Portable mobile phone acquisition software system based on training trainee information data acquisition | |
CN111046382A (en) | Database auditing method, device, storage medium and device | |
CN115828243A (en) | Static code flow analysis method based on scanning scheme | |
CN106528644B (en) | Remote sensing data retrieval method and device | |
CN114416806A (en) | Method and device for acquiring power safety knowledge data and computer equipment | |
CN113221162A (en) | Private disease-specific big data privacy protection method and system based on block chain | |
CN110688645A (en) | Big data analysis system based on computer verification code technology | |
CN112685389A (en) | Data management method, data management device, electronic device, and storage medium | |
CN114630314B (en) | Updating method, device, equipment and storage medium of terminal information base | |
CN116541382B (en) | Data management method and system based on data security identification level | |
CN113344744B (en) | Personalized business function calculation method and device for power system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |