TW201339882A - Personal data analyzing and shielding system and method - Google Patents

Personal data analyzing and shielding system and method Download PDF

Info

Publication number
TW201339882A
TW201339882A TW101109801A TW101109801A TW201339882A TW 201339882 A TW201339882 A TW 201339882A TW 101109801 A TW101109801 A TW 101109801A TW 101109801 A TW101109801 A TW 101109801A TW 201339882 A TW201339882 A TW 201339882A
Authority
TW
Taiwan
Prior art keywords
personal data
masking
analyzing
host
series
Prior art date
Application number
TW101109801A
Other languages
Chinese (zh)
Other versions
TWI591506B (en
Inventor
Jia-Chi Weng
Hung-Yu Su
Original Assignee
Openfind Information Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Openfind Information Technology Inc filed Critical Openfind Information Technology Inc
Priority to TW101109801A priority Critical patent/TWI591506B/en
Publication of TW201339882A publication Critical patent/TW201339882A/en
Application granted granted Critical
Publication of TWI591506B publication Critical patent/TWI591506B/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a personal data analyzing and shielding system and method. The system comprises a user host and a checking host. The user host includes a first transmission interface and a plurality of text format files. The checking host includes a second transmission interface, a scanning unit, and a masking unit interfaced with each other, wherein the second transmission interface of the checking host is connected with the first transmission interface of the user host, and the scanning unit is employed to screen the plurality of text format files in the user host, so as to find out a series of personal data messages and transmit the same to the masking unit. For the series of personal data messages, the masking unit is employed to shield partial information of the series of personal data messages, so as to form a shielding message.

Description

個人資料分析與遮蔽之系統與方法Personal data analysis and masking system and method

本發明屬於一種資料分析之系統與方法,尤其是關於一種個人資料分析與遮蔽之系統與方法。The invention belongs to a system and method for data analysis, in particular to a system and method for analyzing and masking personal data.

近年來,由於網路科技的發達,人們不論是工作、學習、購物或者參加社團等等,常常會將自己的個人資料訊息提供給第二方或第三方,但常因人們的疏忽,不小心對外洩露這些個人資料而危害到了所謂的個資安全問題,而不肖人士常常會利用這些資料來做侵害。為避免個資外洩造成公司團體與人們的權益損失,公司往往會聘請個資保護專家來為企業體系打造有效的個資防護機制,如現在的ISO認證等等,以稽核公司內部是否有大量的個人資訊檔案分佈,並為所有個資防護工作奠定基礎。目前,一般個人資訊的盤點採階層式回報的方式,先告知員工並由員工主動提報,但由於電腦化的影響,長期使用的個人電腦中往往會有許多個資是無法詳細的由使用者記憶或是以人力一一檢視,因此,如何有效的找出個人電腦中之個資,並且以安全的提報方式給相關稽核人員,不會洩露出去,以對所找出的個資進行保護或刪除,是本發明相當關鍵的重點。In recent years, due to the development of Internet technology, people often provide their personal information to second parties or third parties, whether they are working, studying, shopping or participating in clubs, but they are often careless because of people’s negligence. The disclosure of these personal data to the outside world jeopardizes the so-called personal security issues, and people who do not use it often use this information to infringe. In order to avoid the loss of personal rights and losses of corporate groups and people, the company often hires individual protection experts to create an effective personal protection mechanism for the enterprise system, such as the current ISO certification, etc., to audit whether there are a large number of internal companies. The distribution of personal information files and lay the foundation for all personal protection work. At present, the general method of collecting personal information is based on the method of class-based return. The staff is informed first and the employee is actively reporting. However, due to the influence of computerization, there are often many users in the long-term use of personal computers that cannot be detailed. Memory is checked by human beings. Therefore, how to effectively identify the personal assets in the personal computer and provide relevant auditors with safe reporting methods will not be leaked to protect the identified individual assets. Or deletion is a fairly critical focus of the present invention.

為此,本申請人有鑒於上述習知人力盤點效率不彰,且效果有限之缺陷和不便之處,秉持著研究創新、精益求精之精神,利用其專業眼光和專業知識,研究出一種新穎的個人資料分析與遮蔽之系統與方法。To this end, the Applicant has developed a novel individual by taking advantage of its professional vision and professional knowledge in view of the above-mentioned deficiencies and inconveniences of the limited labor efficiency and limited effectiveness. System and method for data analysis and shading.

本發明的目的在於提供一種系統結構與方法,合乎科學,更能提高盤點效率,並且避免資料外洩之個人資料分析與遮蔽之系統與方法。The object of the present invention is to provide a system and method for system, which is scientific, can improve inventory efficiency, and avoids data leakage and personal data analysis and shielding systems and methods.

為達到上述目的,本發明採用如下技術方案:In order to achieve the above object, the present invention adopts the following technical solutions:

一種個人資料分析與遮蔽之系統,其包含:一用戶主機,包含一第一傳輸介面,且該用戶主機包含複數個文字格式檔案;以及一盤點主機,包含相介接之一第二傳輸介面、一掃描單元以及一遮罩單元;其中,該盤點主機之該第二傳輸介面與該用戶主機之該第一傳輸介面相連結,並透過該掃描單元對該用戶主機中該複數個文字格式檔案進行篩選,以篩選出一系列個人資料訊息並傳送至該遮罩單元,而該系列個人資料訊息透過該遮罩單元以遮蔽該系列個人資料訊息之部分資訊,以形成一遮蔽訊息。A system for analyzing and masking personal data, comprising: a user host, comprising a first transmission interface, wherein the user host comprises a plurality of text format files; and an inventory host, comprising one of the second transmission interfaces, a scanning unit and a mask unit; wherein the second transmission interface of the inventory host is coupled to the first transmission interface of the user host, and the plurality of text format files in the user host are performed by the scanning unit Screening to screen out a series of personal information messages and transmit them to the mask unit, and the series of personal information messages are used to block part of the information of the series of personal information messages to form a masking message.

在本發明中,其中該遮蔽方法係利用一特殊符號來遮蔽該系列個人資料訊息之部分訊息,且屬於不可還原之遮蔽。In the present invention, the masking method utilizes a special symbol to mask part of the information of the series of personal data messages, and is an irreducible mask.

在本發明中,其中該特殊符號係為問號與星號之組合。In the present invention, the special symbol is a combination of a question mark and an asterisk.

在本發明中,其中該盤點主機更包含一傳輸單元,該傳輸單元與遮蔽單元相介接,該遮蔽訊息透過該傳輸單元將該遮蔽訊息傳送至一外部伺服器。In the present invention, the inventory host further includes a transmission unit, and the transmission unit is connected to the shielding unit, and the masking message transmits the masking message to an external server through the transmission unit.

在本發明中,其中該傳輸模組為有線或無線之傳輸協定。In the present invention, the transmission module is a wired or wireless transmission protocol.

在本發明中,其中該外部伺服器係為一報表伺服器或一雲端系統。In the present invention, the external server is a report server or a cloud system.

一種個人資料分析與遮蔽之方法,其包含下列步驟:利用一盤點主機與具有複數個電子檔案之一用戶主機連結;藉由該盤點主機之一掃描模組之一掃描程序對該用戶主機之複數個電子檔案進行掃描,以掃瞄出一系列個人資料訊息,並將該系列個人資料訊息傳送至一遮罩模組;以及藉由該遮罩模組之一遮蔽方法覆蓋該系列個人資料訊息之部分資訊,以形成一遮蔽訊息。A method for analyzing and masking personal data, comprising the steps of: connecting with a user host having one of a plurality of electronic files by using an inventory host; and scanning the program for one of the scanning modules of one of the counting hosts Scanning electronic files to scan a series of personal information messages and transmitting the series of personal information messages to a mask module; and covering the series of personal data messages by one of the mask modules Part of the information to form a cover message.

在本發明中,其中更包含下列步驟:一特殊符號來遮蔽該系列個人資料訊息之部分訊息,且不可還原。In the present invention, the method further includes the following steps: a special symbol to mask part of the information of the series of personal information messages, and cannot be restored.

在本發明中,其中該特殊符號為星號或問號之組合。In the present invention, the special symbol is a combination of an asterisk or a question mark.

在本發明中,其中該盤點主機更包含一傳輸單元,該傳輸單元與遮蔽單元相介接,該遮蔽訊息透過該傳輸單元將該遮蔽訊息傳送至一外部伺服器。In the present invention, the inventory host further includes a transmission unit, and the transmission unit is connected to the shielding unit, and the masking message transmits the masking message to an external server through the transmission unit.

在本發明中,其中該網路協定為有線或無線之傳輸協定。In the present invention, the network protocol is a wired or wireless transmission protocol.

在本發明中,其中該外部伺服器係為一報表伺服器或一雲端系統。本發明因應大量使用個人電腦的公司、團體之個資盤點工作,提出自動化個資盤點系統以輔助個資盤點工作,綜上所述,本發明具有以下下列優勢:In the present invention, the external server is a report server or a cloud system. The present invention proposes an automated personal inventory system to assist in the work of individual inventory points in response to the work of a company and a group of companies that use a large number of personal computers. In summary, the present invention has the following advantages:

(1)以電腦化之方式有效找出個資:不同以往人力搜尋方式,是一種更有效率、更精確的方式找出個資。(1) Effectively identify individual assets in a computerized way: different ways of manpower search in the past are a more efficient and accurate way to find out the capital.

(2)遮蔽個資:將搜尋到之個資,以一種屏蔽方式遮蓋住,避免搜尋到的個資被完整呈現出來,也避免稽核人員不小心將個資給洩露出去。(2) Shading the individual capital: the individual capital that will be searched will be covered by a shielding method, so that the searched individual capital will be completely presented, and the auditing personnel will be prevented from accidentally leaking the capital.

(3)傳輸資料,不經他手:最後以有線或無線方式傳送到伺服器做相關的動作如報表或其他指令,此時個資已被遮蔽破壞,以避免人為疏失將個資洩露。(3) Transfer data, without any other hand: Finally, it will be transmitted to the server by wire or wirelessly to do related actions such as statements or other instructions. At this time, the capital has been obscured to avoid the leakage of personal resources due to human error.

本發明的目的在於提供一種系統結構與方法,合乎科學,更能提高盤點效率和檔案精確度之個人資料篩選之系統與方法。The object of the present invention is to provide a system and method for system, which is scientific and can improve the system and method of personal data screening for inventory efficiency and file accuracy.

為達到上述目的,本發明採用如下技術方案:In order to achieve the above object, the present invention adopts the following technical solutions:

請參閱第1圖,係為本發明之個人資料分析與遮蔽之系統與方法之示意圖。如圖所示,本發明之個人資料分析與遮蔽之系統包含:一用戶主機1與盤點主機2。用戶主機1包含一第一傳輸介面12,且用戶主機1可為一般個人電腦、筆記型電腦、個人數位助理裝置或是任一種儲存檔案之裝置,而用戶主機1中具有複數個文字格式檔案11。盤點主機2更包含一第二傳輸介面21、一掃描單元22、一遮罩單元23以及一傳輸單元24,,且盤點主機2可以是一種筆記型電腦、準系統或具有可執行掃描、遮蔽與傳輸功能之裝置。第二傳輸介面21與掃描單元22相介接。第一傳輸介面12與第二傳輸介面可以是USB(通用串列匯流排)傳輸協定、有線或無線網路通訊協定。掃描單元22可將所欲篩選之檔案依條件來找搜尋出來,且掃描單元22與遮罩單元23相介接。遮罩單元23可將所搜尋出來的檔案之部分訊息給遮蔽,且不可還原。其中,盤點主機2更包含一傳輸單元24,傳輸單元24可將遮蔽後之資料傳送至一外部伺服器3,而外部伺服器3可以為一報表伺服器,以做成報表形式,或是一雲端系統,以供外部人員便於稽核或備存。Please refer to FIG. 1 , which is a schematic diagram of a system and method for analyzing and masking personal data of the present invention. As shown in the figure, the system for analyzing and masking personal data of the present invention comprises: a user host 1 and an inventory host 2. The user host 1 includes a first transmission interface 12, and the user host 1 can be a general personal computer, a notebook computer, a personal digital assistant device, or any device for storing files, and the user host 1 has a plurality of text format files 11 . The inventory host 2 further includes a second transmission interface 21, a scanning unit 22, a mask unit 23 and a transmission unit 24, and the inventory host 2 can be a notebook computer, a barebone system or have an executable scanning, shielding and A device that transmits functions. The second transmission interface 21 is in communication with the scanning unit 22. The first transmission interface 12 and the second transmission interface may be USB (Universal Serial Bus) transmission protocols, wired or wireless network communication protocols. The scanning unit 22 can search for the file to be screened according to the condition, and the scanning unit 22 interfaces with the mask unit 23. The mask unit 23 can mask part of the information of the searched file and cannot be restored. The inventory host 2 further includes a transmission unit 24, the transmission unit 24 can transmit the masked data to an external server 3, and the external server 3 can be a report server to form a report, or a Cloud system for external personnel to facilitate auditing or keeping.

盤點主機2以第二傳輸介面21與用戶主機1之第一傳輸介面12連結,使盤點主機2中之掃描單元22可以對用戶主機1中之複數個文字格式檔案11做掃描。掃描單元22是以各種個資之特徵為條件,將用戶主機1中之複數個文字檔案格式11做實地掃瞄,將可能為個資之檔案分辨出來,並集合成一系列個人資料訊息221,並傳送至遮罩單元23。遮罩單元23會將該系列個人資料訊息221中之部分訊息以破壞無法還原之方式遮蔽,以形成一遮蔽訊息231,且遮蔽係以如問號以及星號之特殊符號來做遮蔽,以此將來要針對搜尋出來之個資找尋相對應之人員時,方便查找。而盤點主機2更包含一傳輸單元24,當作成遮蔽訊息231後,會利用傳輸單元24傳送至外部伺服器3,外部伺服器3可為一報表伺服器或是雲端系統,以供日後稽核考證或備存所用。The inventory host 2 is coupled to the first transmission interface 12 of the user host 1 by the second transmission interface 21, so that the scanning unit 22 in the inventory host 2 can scan a plurality of text format files 11 in the user host 1. The scanning unit 22 performs on-the-spot scanning of the plurality of text file formats 11 in the user host 1 on the condition of various individual assets, and may distinguish the files of the individual assets and assemble them into a series of personal information messages 221, and Transfer to the mask unit 23. The mask unit 23 masks part of the information in the series of personal information messages 221 in a manner that cannot be restored to form a masking message 231, and the masking is masked by special symbols such as question marks and asterisks, so as to It is easy to find when looking for the corresponding personnel for the searched individuals. The inventory host 2 further includes a transmission unit 24, which is used as the masking message 231, and is transmitted to the external server 3 by using the transmission unit 24. The external server 3 can be a report server or a cloud system for future auditing. Or use it for storage.

綜合以上所述,本發明之個人資料分析與遮蔽之系統與方法提供了一種安全、快速之盤點系統,且若搜查結果外洩,但因搜尋出之個資已被遮蔽無法明確指示個資為誰,故安全性上較無虞。而為更進一步表明,請參閱第2圖,係為本發明之個人資料分析與遮蔽之系統與方法之流程圖,下列就以該流程圖來確實描述本發明之精神:首先,請參照S11,以盤點主機之第二傳輸介面與待掃描之用戶主機之第一傳輸介面相連結;接著,請參照S12,利用掃描模組將待掃描之用戶主機中之複數個文字格式檔案以各種個資特徵為其條件來加以搜索,以找出一系列個人資料訊息,並傳送到遮罩單元;接著,請參照S13,藉由遮罩單元,將該系列個人資料訊息之部分訊息以破壞性不可還原之方式做遮蔽,以產生一遮蔽訊息,並傳送至傳輸單元;接著,請參照S14,利用傳輸單元,將遮蔽訊息以有線或無線之傳輸協定傳送至一外部伺服器;以及最後,請參照S15,透過外部伺服器,可將遮蔽訊息做成報表、規格文件或是以雲端系統來做備存,以供日後人員之稽核或查找。In summary, the system and method for personal data analysis and obscuration of the present invention provides a safe and fast inventory system, and if the search results are leaked, but the search for the individual funds has been obscured, it is impossible to clearly indicate that the funds are Who is safer than innocent. For further explanation, please refer to FIG. 2, which is a flowchart of the system and method for analyzing and masking personal data of the present invention. The following is a description of the spirit of the present invention by using the flowchart: First, please refer to S11. The second transmission interface of the inventory host is connected to the first transmission interface of the user host to be scanned; then, referring to S12, the scanning module is used to display a plurality of text format files of the user host to be scanned with various characteristics. Search for the conditions to find a series of personal information messages, and send them to the mask unit; then, refer to S13, through the mask unit, the partial information of the series of personal information messages is destructive and irreversible. The method is masked to generate an obscuration message and transmitted to the transmission unit; then, referring to S14, the transmission unit transmits the obscuration message to an external server by wired or wireless transmission protocol; and finally, refer to S15. Through the external server, the obscured message can be made into a report, specification file or stored in the cloud system for auditing by future personnel or Find.

請參閱第3圖,並對照第1圖,第3圖係為本發明之個人資料篩選之系統與方法之第一實施例。如圖所示,其包含一個人電腦主機4、一筆記型電腦5與一伺服器6。個人電腦主機4係為一待盤點之主機,也就是第1圖中之用戶主機1,其主機4上具有一USB傳輸介面41,且個人電腦主機4具有複數個文字格式檔案11。筆記型電腦5同樣也具有一USB傳輸介面51,而筆記型電腦5係為一盤點之主機,如第1圖中之盤點主機2,且筆記型電腦5中具有掃描單元22、遮罩單元23以及傳輸單元24。當筆記型電腦5之USB傳輸介面51連結個人電腦主機4時,筆記型電腦5中之掃描單元22對個人電腦主機4中之複數個文字格式檔案11進行掃描,以找出對應各種個資特徵條件之文件檔案,並篩選出一系列個人資料訊息221(例如:F123456789,或是王曉明)。遮罩單元再接收到該系列個人資料訊息221時,會以問號或星號之特殊符號來遮蔽該系列個人資料訊息221之部分訊息,且屬於破壞性不可還原之遮蔽,以形成一遮蔽訊息231(例如:F1??????89,或是王*明等等)。最後,再透過傳輸模組24將遮蔽訊息231透過有線網路52來連接到一大型伺服主機6,以做備份以及日後稽核所使用。以上自筆記型電腦5所傳送出來的檔案由於皆被遮蔽,故如於傳送當中造成資料外洩之情況,也屬於已被遮蔽破壞之文件檔案,故無法被有心人士所利用。Please refer to FIG. 3, and in contrast to FIG. 1, FIG. 3 is a first embodiment of the system and method for screening personal data of the present invention. As shown, it includes a personal computer main unit 4, a notebook computer 5, and a server 6. The personal computer host 4 is a host to be counted, that is, the user host 1 in FIG. 1, the host 4 has a USB transmission interface 41, and the personal computer host 4 has a plurality of text format files 11. The notebook computer 5 also has a USB transmission interface 51, and the notebook computer 5 is a host of one inventory, such as the inventory host 2 in FIG. 1, and the notebook computer 5 has a scanning unit 22 and a mask unit 23 therein. And a transmission unit 24. When the USB transmission interface 51 of the notebook computer 5 is connected to the personal computer main unit 4, the scanning unit 22 in the notebook computer 5 scans a plurality of text format files 11 in the personal computer main unit 4 to find corresponding various characteristics. A file of conditions and a series of personal information messages 221 (for example: F123456789, or Wang Xiaoming). When the mask unit receives the series of personal information messages 221, a part of the series of personal information messages 221 is masked by a special symbol of a question mark or an asterisk, and is a destructive irreversible mask to form a masking message 231 ( For example: F1??????89, or Wang Ming, etc.). Finally, the masking message 231 is connected to a large server host 6 through the cable network 52 through the transmission module 24 for backup and later auditing. Since the files transmitted from the notebook computer 5 are all obscured, if the data is leaked during the transmission, it is also a file file that has been obscured and destroyed, so it cannot be used by those who are interested.

請參閱第4圖,係為本發明之個人資料篩選之系統與方法之第二實施例。如圖所示,一大型中央監控系統8以區域網路通訊協定71連結多台待稽核之主機7,且一外接式執行裝置9以USB傳輸介面91與大型中央監控系統8之USB傳輸介面做連結,藉由大型中央監控系統8來盤點多台待稽核之主機7。其中,外接式執行裝置9具有掃描單元以及遮罩單元。當外接式執行裝置9連結大型中央監控系統8時,外接式執行裝置9之掃描單元對多台待稽核之主機7進行掃描,並將符合個資條件之文字格式檔案形成一系列個人資料訊息。而外接式執行裝置9之遮罩模組將該系列個人資料訊息以破壞性不可還原之方式形成一遮蔽訊息,並傳送至一無線基地台100。無線基地台100將該遮蔽訊息發送至一雲端系統101做備存,以供日後稽核以及多方資料比對所用。Please refer to FIG. 4, which is a second embodiment of the system and method for screening personal data of the present invention. As shown in the figure, a large central monitoring system 8 connects a plurality of hosts 7 to be audited by a regional network communication protocol 71, and an external execution device 9 is implemented by a USB transmission interface 91 and a USB transmission interface of the large central monitoring system 8. Linking, through the large central monitoring system 8 to inventory a plurality of hosts 7 to be audited. The external actuator 9 has a scanning unit and a mask unit. When the external execution device 9 is connected to the large-scale central monitoring system 8, the scanning unit of the external execution device 9 scans a plurality of host computers 7 to be audited, and forms a series of personal data messages in a text format file conforming to the capital condition. The mask module of the external execution device 9 forms a mask message in a destructive and irreversible manner and transmits the message to a wireless base station 100. The radio base station 100 sends the obscuration message to a cloud system 101 for storage for later auditing and multi-party data comparison.

以上該僅為本發明之較佳實施例,並非用來限定本發明之實施範圍;如果不脫離本發明之精神和範圍,對本發明進行修改或者等同替換,均應涵蓋在本發明申請專利範圍的保護範圍當中。The above is only the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention; the modifications and equivalents of the present invention are intended to be included in the scope of the present invention without departing from the spirit and scope of the invention. Within the scope of protection.

1...用戶主機1. . . User host

11...複數個文字格式檔案11. . . Multiple text format files

12...第一傳輸介面12. . . First transmission interface

2...盤點主機2. . . Inventory host

21...第二傳輸介面twenty one. . . Second transmission interface

22...掃描單元twenty two. . . Scanning unit

221...一系列個人資料訊息221. . . a series of profile messages

23...遮蔽單元twenty three. . . Shading unit

231...遮蔽訊息231. . . Masking message

24...傳輸單元twenty four. . . Transmission unit

3...外部伺服器3. . . External server

4...個人電腦主機4. . . Personal computer host

41...USB傳輸介面41. . . USB transfer interface

5...筆記型電腦5. . . Notebook computer

51...USB傳輸介面51. . . USB transfer interface

52...有線網路52. . . Wired network

6...大型伺服主機6. . . Large servo host

7...多台待稽核之主機7. . . Multiple hosts to be audited

71...區域網路通訊協定71. . . Regional network protocol

8...大型中央監控系統8. . . Large central monitoring system

81...USB傳輸介面81. . . USB transfer interface

9...外接式執行裝置9. . . External actuator

91...USB傳輸介面91. . . USB transfer interface

100...無線基地台100. . . Wireless base station

101...雲端系統101. . . Cloud system

第1圖 係為本發明之個人資料分析與遮蔽之系統與方法之示意圖;1 is a schematic diagram of a system and method for analyzing and masking personal data of the present invention;

第2圖 係為本發明之個人資料分析與遮蔽之系統與方法之流程圖;2 is a flow chart of a system and method for analyzing and masking personal data of the present invention;

第3圖 係為本發明之個人資料分析與遮蔽之系統與方法之第一實施例;Figure 3 is a first embodiment of a system and method for personal data analysis and masking of the present invention;

第4圖 係為本發明之個人資料分析與遮蔽之系統與方法之第二實施例。Figure 4 is a second embodiment of the system and method for personal data analysis and masking of the present invention.

1...用戶主機1. . . User host

11...複數個文字格式檔案11. . . Multiple text format files

12...第一傳輸介面12. . . First transmission interface

2...盤點主機2. . . Inventory host

21...第二傳輸介面twenty one. . . Second transmission interface

22...掃描單元twenty two. . . Scanning unit

221...一系列個人資料訊息221. . . a series of profile messages

23...遮蔽單元twenty three. . . Shading unit

231...遮蔽訊息231. . . Masking message

24...傳輸單元twenty four. . . Transmission unit

3...外部伺服器3. . . External server

Claims (12)

一種個人資料分析與遮蔽之系統,其包含:一用戶主機,包含一第一傳輸介面,且該用戶主機包含複數個文字格式檔案;以及一盤點主機,包含相介接之一第二傳輸介面、一掃描單元以及一遮罩單元;其中,該盤點主機之該第二傳輸介面與該用戶主機之該第一傳輸介面相連結,並透過該掃描單元對該用戶主機中該複數個文字格式檔案進行篩選,以篩選出一系列個人資料訊息並傳送至該遮罩單元,而該系列個人資料訊息透過該遮罩單元以遮蔽該系列個人資料訊息之部分資訊,以形成一遮蔽訊息。A system for analyzing and masking personal data, comprising: a user host, comprising a first transmission interface, wherein the user host comprises a plurality of text format files; and an inventory host, comprising one of the second transmission interfaces, a scanning unit and a mask unit; wherein the second transmission interface of the inventory host is coupled to the first transmission interface of the user host, and the plurality of text format files in the user host are performed by the scanning unit Screening to screen out a series of personal information messages and transmit them to the mask unit, and the series of personal information messages are used to block part of the information of the series of personal information messages to form a masking message. 如申請專利範圍第1項所述之個人資料分析與遮蔽之系統,其中該遮蔽方法係利用一特殊符號來遮蔽該系列個人資料訊息之部分訊息,且屬於不可還原之遮蔽。The system for analyzing and masking personal data as described in claim 1, wherein the masking method uses a special symbol to mask part of the information of the series of personal information messages, and is an irreducible mask. 如申請專利範圍第2項所述之個人資料分析與遮蔽之系統,其中該特殊符號係為問號與星號之組合。The system for analyzing and masking personal data as described in claim 2, wherein the special symbol is a combination of a question mark and an asterisk. 如申請專利範圍第1項所述之個人資料分析與遮蔽之系統,其中該盤點主機更包含一傳輸單元,該傳輸單元與遮蔽單元相介接,該遮蔽訊息透過該傳輸單元將該遮蔽訊息傳送至一外部伺服器。The system for analyzing and masking personal data according to claim 1, wherein the inventory host further comprises a transmission unit, the transmission unit is connected to the shielding unit, and the shielding message is transmitted through the transmission unit. To an external server. 如申請專利範圍第4項所述之個人資料分析與遮蔽之系統,其中該傳輸模組為有線或無線之傳輸協定。The system for analyzing and masking personal data as described in claim 4, wherein the transmission module is a wired or wireless transmission protocol. 如申請專利範圍第4項所述之個人資料分析與遮蔽之系統,其中該外部伺服器係為一報表伺服器或一雲端系統。The system for analyzing and masking personal data as described in claim 4, wherein the external server is a report server or a cloud system. 一種個人資料分析與遮蔽之方法,其包含下列步驟:利用一盤點主機與具有複數個電子檔案之一用戶主機連結;藉由該盤點主機之一掃描模組之一掃描程序對該用戶主機之複數個電子檔案進行掃描,以掃瞄出一系列個人資料訊息,並將該系列個人資料訊息傳送至一遮罩模組;以及藉由該遮罩模組之一遮蔽方法覆蓋該系列個人資料訊息之部分資訊,以形成一遮蔽訊息。A method for analyzing and masking personal data, comprising the steps of: connecting with a user host having one of a plurality of electronic files by using an inventory host; and scanning the program for one of the scanning modules of one of the counting hosts Scanning electronic files to scan a series of personal information messages and transmitting the series of personal information messages to a mask module; and covering the series of personal data messages by one of the mask modules Part of the information to form a cover message. 如申請專利範圍第7項所述之個人資料分析與遮蔽之方法,其中更包含下列步驟:一特殊符號來遮蔽該系列個人資料訊息之部分訊息,且不可還原。The method for analyzing and masking personal data as described in claim 7 further includes the following steps: a special symbol to mask part of the information of the series of personal information, and cannot be restored. 如申請專利範圍第8項所述之個人資料分析與遮蔽之方法,其中該特殊符號為星號或問號之組合。The method for analyzing and masking personal data as described in claim 8 of the patent application, wherein the special symbol is a combination of an asterisk or a question mark. 如申請專利範圍第7項所述之個人資料分析與遮蔽之系統,其中該盤點主機更包含一傳輸單元,該傳輸單元與遮蔽單元相介接,該遮蔽訊息透過該傳輸單元將該遮蔽訊息傳送至一外部伺服器。The system for analyzing and masking personal data according to claim 7 , wherein the inventory host further comprises a transmission unit, the transmission unit is connected to the shielding unit, and the shielding message is transmitted through the transmission unit. To an external server. 如申請專利範圍第10項所述之個人資料分析與遮蔽之方法,其中該網路協定為有線或無線之傳輸協定。The method for analyzing and masking personal data as described in claim 10, wherein the network protocol is a wired or wireless transmission protocol. 如申請專利範圍第10項所述之個人資料分析與遮蔽之方法,其中該外部伺服器係為一報表伺服器或一雲端系統。The method for analyzing and masking personal data according to claim 10, wherein the external server is a report server or a cloud system.
TW101109801A 2012-03-22 2012-03-22 System and method of personal data analysis and screening TWI591506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW101109801A TWI591506B (en) 2012-03-22 2012-03-22 System and method of personal data analysis and screening

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101109801A TWI591506B (en) 2012-03-22 2012-03-22 System and method of personal data analysis and screening

Publications (2)

Publication Number Publication Date
TW201339882A true TW201339882A (en) 2013-10-01
TWI591506B TWI591506B (en) 2017-07-11

Family

ID=49770924

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101109801A TWI591506B (en) 2012-03-22 2012-03-22 System and method of personal data analysis and screening

Country Status (1)

Country Link
TW (1) TWI591506B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI737139B (en) * 2020-01-22 2021-08-21 黃柏舜 Personal data protection application system and personal data protection application method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI737139B (en) * 2020-01-22 2021-08-21 黃柏舜 Personal data protection application system and personal data protection application method

Also Published As

Publication number Publication date
TWI591506B (en) 2017-07-11

Similar Documents

Publication Publication Date Title
Schlette et al. A comparative study on cyber threat intelligence: The security incident response perspective
US9021260B1 (en) Malware data item analysis
Albakri et al. Security risk assessment framework for cloud computing environments
Suleiman et al. Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure
US20160004864A1 (en) Malware data item analysis
Abouzakhar et al. Internet of things security: A review of risks and threats to healthcare sector
Bugeja et al. IoTSM: an end-to-end security model for IoT ecosystems
Khan et al. Using critical information to strengthen pandemic preparedness: the role of national public health agencies
Francia III et al. Security best practices and risk assessment of SCADA and industrial control systems
Echeverría et al. Cybersecurity model based on hardening for secure internet of things implementation
Prakash et al. Cloud and edge computing-based computer forensics: Challenges and open problems
Taubenberger et al. Resolving vulnerability identification errors using security requirements on business process models
MEdina-Rodríguez et al. The cyber security in the age of telework: A descriptive research framework through science mapping
Briliyant et al. Towards an automated dissemination process of cyber threat intelligence data using stix
TWI591506B (en) System and method of personal data analysis and screening
Fritzen Remote working and cyber security threats in ireland. challenges and prospective solutions
US20220030035A1 (en) System security evaluation device and method
Axon et al. Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda
Magalini et al. Cyberthreats to hospitals: Panacea, a toolkit for people-centric cybersecurity
Llupià et al. SARS‐CoV2 hospital surveillance and control system with contact tracing for patients and health care workers at a large reference hospital in Spain during the first wave: An observational descriptive study
Verlande et al. Design of a Federated Learning System for IT Security: Towards Secure Human Resource Management
Romadhona et al. Evaluation of information security management in crisis response using KAMI index: The case of company XYZ
Popa et al. Audit Characteristics for Information System Security
Abdulrazeg et al. Extending V-model practices to support SRE to build secure web application
US20220150281A1 (en) System and method for securing computer infrastructure and devices that depend on cloud platforms