CN106485155A - A kind of encryption method annotated based on field and equipment - Google Patents

A kind of encryption method annotated based on field and equipment Download PDF

Info

Publication number
CN106485155A
CN106485155A CN201510524699.6A CN201510524699A CN106485155A CN 106485155 A CN106485155 A CN 106485155A CN 201510524699 A CN201510524699 A CN 201510524699A CN 106485155 A CN106485155 A CN 106485155A
Authority
CN
China
Prior art keywords
field
content
server
corresponding content
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510524699.6A
Other languages
Chinese (zh)
Inventor
吴龙飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510524699.6A priority Critical patent/CN106485155A/en
Publication of CN106485155A publication Critical patent/CN106485155A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of encryption method annotated based on field, methods described includes:The corresponding annotation information of arbitrary field for building table statement of the raw data table of user in server acquisition database;Whether the server judges the corresponding content of the field comprising sensitive information according to the annotation information;After judging the corresponding content of the field comprising sensitive information, the server generates encryption and indicates;The server is indicated to be encrypted the corresponding content of the field according to the encryption, the application need not require the normalization of field name and the regularity of field corresponding content it may determine that going out the corresponding content of the field with the presence or absence of sensitive information, alleviate the work load of the person that builds table, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.

Description

A kind of encryption method annotated based on field and equipment
Technical field
The application is related to field of computer technology, more particularly to a kind of encryption method annotated based on field And equipment.
Background technology
Under big data background, Ge great Internet firm all knows mass data, these data often by with To analyze user preference, distribution etc., the operation to product and popularization play the role of and its important.But Exchange in data, shared during, the privacy-sensitive information of user can be let out, therefore use The sensitive traffic data of the privacy-sensitive information at family and company need the protection for improving badly.Difference to be removed Privacy-sensitive information in data, it is important to privacy-sensitive information to be determined and its privacy-sensitive information Type, to take corresponding data ciphering method.
The method that commonly uses in the prior art has two kinds, and a kind of is to recognize word according to the field name of tables of data Recognizing privacy-sensitive information, such as " id " refers generally to major key to section content, and " age " refers generally to the age. Another kind is some data of sampling, recognizes privacy-sensitive information according to the form of content.
During the application is realized, it is found by the applicant that at least there is problems with prior art:
First kind of way excessively depends on the specification that user field is named, and field name needs to give expression to which The relevant information of content, and the title of field is typically only data, letter and underscore, this undoubtedly increases Add and built table person must bear;Another way excessively depends on the regularity of content, and this mode can be known Do not go out the data with universal law such as mailbox, telephone number, identification card number, if generally not advising The data of rule, this mode are just helpless, and such as turnover field, its content can be Arbitrary floating number, is difficult to out with the presence or absence of privacy-sensitive information according only to content.
Content of the invention
The purpose of the application is to provide a kind of encryption method annotated based on field and equipment, by obtaining In database, the corresponding annotation information of arbitrary field for building table statement of the raw data table of user, judges Whether sensitive information is included, and then the corresponding content of the field is carried out in the corresponding content of the field Encryption, the application need not require that the normalization of field name and the regularity of field corresponding content can just be sentenced Break and the corresponding content of the field with the presence or absence of sensitive information, the work load of the person that builds table is alleviated, also Field corresponding content can be recognized accurately with the presence or absence of sensitive information.
The technical scheme of the application is as follows:
A kind of encryption method annotated based on field, methods described are included:
The corresponding note of arbitrary field for building table statement of the raw data table of user in server acquisition database Release information;
Whether the server judges the corresponding content of the field comprising sensitive letter according to the annotation information Breath;
After judging the corresponding content of the field comprising sensitive information, the server generates encryption and refers to Show;
The server is indicated to be encrypted the corresponding content of the field according to the encryption.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
The server is indicated to be encrypted the corresponding content of the field according to the encryption, specially:
The server indicates to determine according to the encryption and the corresponding content of the field is encrypted;
The server is identified determining the content of the annotation information corresponding field to the annotation information Type;
The server determines the corresponding AES of the content according to the type of the content;
The server carried out according to the AES part or all of content corresponding to the field plus Close.
The AES is the calculation that corresponding for the field part or all of content is replaced with preset characters Method.
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered After row encryption, methods described also includes:
The server obtains the field pair that other of user's raw data table described in database build table statement The annotation information that answers, so that the server is believed according to other corresponding annotations of field for building table statement described Breath judges whether to be encrypted other corresponding contents of field for building table statement described.
A kind of server, the server include:
Acquisition module, the arbitrary field for building table statement for obtaining raw data table in database are corresponding Annotation information;
Whether judge module, for judging the corresponding content of the field comprising quick according to the annotation information Sense information;
Indicating module, for judging the corresponding content of the field comprising sensitive letter in the judge module Generate encryption to indicate after breath;
Encrypting module, for indicating to be encrypted the corresponding content of the field according to the encryption.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
The encrypting module specifically for:
Indicate to determine according to the encryption and the corresponding content of the field is encrypted;
The type of the content for the annotation information being identified determine the annotation information corresponding field;
Type according to the content determines the corresponding AES of the content;
It is encrypted according to the AES part or all of content corresponding to the field.
The AES is the calculation that corresponding for the field part or all of content is replaced with preset characters Method.
The acquisition module is additionally operable to:
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered After row encryption, other for obtaining raw data table in database build the corresponding annotation information of field of table statement, So that the server judges whether to institute according to other corresponding annotation information of field for building table statement described State the corresponding content of field that other build table statement to be encrypted.
The application is corresponded to by the arbitrary field for building table statement for obtaining the raw data table of user in database Annotation information, whether judge in the corresponding content of the field comprising sensitive information, and then to described The corresponding content of field is encrypted, and the application need not require that the normalization of field name is corresponding with field interior The regularity of appearance whether there is sensitive information it may determine that going out the corresponding content of the field, alleviates and builds The work load of table person, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Description of the drawings
In order to be illustrated more clearly that the application or technical scheme of the prior art, below will to the application or Needed for description of the prior art, accompanying drawing to be used is briefly described, it should be apparent that, in describing below Accompanying drawing be only some embodiments of the present application, for those of ordinary skill in the art, do not paying On the premise of going out creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of encryption method flow chart annotated based on field in the embodiment of the present application;
Fig. 2 is a kind of structural representation of the server in the embodiment of the present application.
Specific embodiment
Below in conjunction with the accompanying drawing in the application, the technical scheme in the application is carried out clear, complete Description, it is clear that described embodiment is a part of embodiment of the application, rather than whole enforcement Example.Based on the other embodiment that the embodiment in the application, those of ordinary skill in the art are obtained, all belong to Scope in the application protection.
In order to solve the problems, such as sensitive information leakage, present applicant proposes a kind of encryption annotated based on field Method is used for solving the problem, as shown in figure 1, the method comprising the steps of:
Step 101, server obtain arbitrary field for building table statement of the raw data table of user in database Corresponding annotation information.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
Specifically, described building in table statement at least includes:Field, data type, annotation information and content.
The field that builds in table statement is that data type is used for retouching for distinguishing different table statement of building The type of field corresponding content is stated, is not only in the annotation information concrete to the corresponding field for building table statement Description, the type of the field corresponding content, the annotation can also be obtained according to the annotation information The detailed description of the corresponding all the elements information of field is contained in information.
To build table statement " user_id (Identity, identity number) BIGINT COMMENT' As a example by member numeral ID' " and " reg_phone STRING COMMENT' landline telephone ' ", user_id It is all the field of building table statement with reg_phone, corresponding table statement can be built to which according to the two fields Make a distinction, by taking the corresponding data type of user_id and annotation information as an example, BIGINT represents field pair The data type of content is answered, COMMENT' member's numeral ID' is annotation information, in the annotation information Member numeral ID represent the purposes of the field be for describing member ID, and also can basis The annotation information obtains which kind of data type is the corresponding content of the field be, such as:Digital ID represents institute The data type for stating the corresponding content of field is numeral, therefore, it can according to the above-mentioned note that builds in table statement The information of releasing is determined with the presence or absence of sensitive information in the corresponding content of field, due to the above-mentioned word that builds in table statement Section belongs to the name of specification, can determine and whether there is in the corresponding content of the field from the field Sensitive information, when table statement is built for " u_id BIGINT COMMENT' member numeral ID' ", u_id For the field for building table statement, although can be made a distinction to building table statement according to the field, but from What the purposes that the field cannot be obtained in the field is, i.e., cannot show which kind of the field corresponds to Content, also cannot just judge with the presence or absence of sensitive information in the corresponding content of the field, and from the word Section corresponding annotation information " member numeral ID " can determine that the purposes of the field be to member ID Description, i.e., the corresponding content of described field is member ID, and can also be obtained according to the annotation information The data type of the corresponding content of the field is numeral, i.e., the corresponding content of described field is the one of member Group ID numeral.
According to the annotation information, step 102, the server judge whether the corresponding content of the field wraps Containing sensitive information, after judging the corresponding content of the field comprising sensitive information, then execution step 103; After judging the corresponding content of the field not comprising sensitive information, then terminate this ciphering process.
Specifically, the corresponding word of the annotation information can be obtained according to the corresponding annotation information of the field The purposes of section, i.e., can obtain, according to the annotation information, the description that the field is to which kind of information of user, So that ID is as sensitive information as an example, corresponding table statement of building is for " user_id BIGINT COMMENT ' member numeral ID' ", the annotation information in the sentence is:Member numeral ID, the annotation information are described The purposes of corresponding field, i.e. user_id are description IDs, and the field that builds in table statement is corresponded to Content be ID, therefore, whether the server includes in the corresponding content of field is judged During the sensitive information of user, the corresponding annotation information of the field can be obtained, be corresponded to according to the field Annotation information can determine the corresponding content of the field with the presence or absence of sensitive information.
The sensitive information can include:The contact method of user, mailbox, birthday, address, identity card Etc. information.
Step 103, the server generate encryption and indicate.
Step 104, the server according to described encryption indicate the corresponding content of the field is carried out plus Close.
The server is indicated to be encrypted the corresponding content of the field according to the encryption, specially:
The server indicates to determine according to the encryption and the corresponding content of the field is encrypted;
The server is identified determining the content of the annotation information corresponding field to the annotation information Type;
The server determines the corresponding AES of the content according to the type of the content;
The server carried out according to the AES part or all of content corresponding to the field plus Close.
Specifically, if there is sensitive information, i.e., indicate to determine according to the encryption and the field is corresponded to Content be encrypted after, as the corresponding AES of different types of content is distinct, for example: To numeral and word when being encrypted corresponding AES be different, therefore, institute is also predefined The data type of sensitive information is stated, to determine corresponding AES, due to permissible according to annotation information The corresponding type of content is obtained, therefore, also continues to be identified determining content according to the annotation information Corresponding data type, after the type for determining the corresponding content of the field, is also predefined the class The corresponding AES of type is being encrypted to the corresponding content of the field.
The full content of sensitive information can be carried out when the sensitive information to user is encrypted protection plus Close, but the partial content of sensitive information can also be encrypted, and both approaches can act as protecting The purpose of shield user's privacy-sensitive.
Wherein, the AES is that corresponding for the field part or all of content is replaced with predetermined word The algorithm of symbol, so that sensitive information is telephone number as an example, the telephone number for replacing with preset characters can be 159********, or 1593228****, or 159****3211 etc..
When being encrypted to sensitive information, the part or all of content in sensitive information can be replaced with Preset characters, part or all of content that will be in sensitive information replace with other guide, make the sensitivity Information is an information different from former sensitive information when showing, or the information of artificial None- identified, The purpose of the application be in order to former sensitive information to be substituted for the letter of an other information or user's None- identified Breath, therefore all technical schemes that can reach above-mentioned purpose belong to the protection domain of the application.
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered After row encryption, methods described also includes:
The server obtains the field pair that other of user's raw data table described in database build table statement The annotation information that answers, so that the server is believed according to other corresponding annotations of field for building table statement described Breath judges whether to be encrypted other corresponding contents of field for building table statement described.
After judging the corresponding content of one field of user with the presence or absence of sensitive information, in addition it is also necessary to judge institute The corresponding content of other fields of user is stated with the presence or absence of sensitive information, until the sensitivity letter to the user Breath is just permissible after being all encrypted.
By the corresponding annotation of the arbitrary field for building table statement for obtaining the raw data table of user in database Whether information, judge comprising sensitive information in the corresponding content of the field, and then to the field pair The content that answers is encrypted, and the application need not require the normalization of field name and the rule of field corresponding content Rule property it may determine that go out the corresponding content of the field with the presence or absence of sensitive information, alleviate build table person's Work load, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Conceived based on the application same with said method, the application also proposed a kind of server, such as Fig. 2 Described, the server includes:
Acquisition module 21, the arbitrary field for building table statement for obtaining raw data table in database are corresponded to Annotation information;
According to the annotation information, judge module 22, for judging whether the corresponding content of the field includes Sensitive information;
Indicating module 23, for judging the corresponding content of the field comprising sensitivity in the judge module Generate encryption to indicate after information;
Encrypting module 24, for indicating to be encrypted the corresponding content of the field according to the encryption.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
The encrypting module specifically for:
The type of the content for the annotation information being identified determine the annotation information corresponding field;
Type according to the content determines the corresponding AES of the content;
It is encrypted according to the AES part or all of content corresponding to the field.
The AES is the calculation that corresponding for the field part or all of content is replaced with preset characters Method.
The acquisition module is additionally operable to:
By the corresponding annotation of the arbitrary field for building table statement for obtaining the raw data table of user in database Whether information, judge comprising sensitive information in the corresponding content of the field, and then to the field pair The content that answers is encrypted, and the application need not require the normalization of field name and the rule of field corresponding content Rule property it may determine that go out the corresponding content of the field with the presence or absence of sensitive information, alleviate build table person's Work load, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Number of the application by data group in staqtistical data base and the attribute to the data group are carried out The first ratio that the sequence number produced by sequence is generated is determined in sequence with the number, is set in basis in advance Carrying out branch mailbox to data, the application can be in the case of without branch mailbox software, no for fixed depth threshold With the data derived in database, it is possible to directly the data in database are directly carried out with branch mailbox, improve The efficiency of branch mailbox, it is ensured that the correctness of branch mailbox result.
Through the above description of the embodiments, those skilled in the art can be understood that this Shen Please add the mode of required general hardware platform by software to realize, naturally it is also possible to by hardware, But the former is more preferably embodiment in many cases.Based on such understanding, the technical scheme of the application The part for substantially in other words prior art being contributed can be embodied in the form of software product, The computer software product is stored in a storage medium, is used so that a station terminal including some instructions It is each that equipment (can be mobile phone, personal computer, server, or network equipment etc.) executes the application Method described in individual embodiment.
The above is only the preferred embodiment of the application, it is noted that for the general of the art For logical technical staff, on the premise of without departing from the application principle, some improvement and profit can also be made Decorations, these improvements and modifications should also regard the protection domain of the application.
It will be appreciated by those skilled in the art that the module in device in embodiment can be described according to embodiment Carry out being distributed in the device of embodiment, it is also possible to carry out that respective change is disposed other than the present embodiment one In individual or multiple devices.The module of above-described embodiment can be integrated in one, it is also possible to be deployed separately;Can To merge into a module, it is also possible to be further split into multiple submodule.Above-mentioned the embodiment of the present application sequence Number for illustration only, do not represent the quality of embodiment.
The several specific embodiments for being only the application disclosed above, but, the application is not limited to this, The changes that any person skilled in the art can think of should all fall into the protection domain of the application.

Claims (10)

1. a kind of based on field annotate encryption method, it is characterised in that methods described includes:
The corresponding note of arbitrary field for building table statement of the raw data table of user in server acquisition database Release information;
Whether the server judges the corresponding content of the field comprising sensitive letter according to the annotation information Breath;
After judging the corresponding content of the field comprising sensitive information, the server generates encryption and refers to Show;
The server is indicated to be encrypted the corresponding content of the field according to the encryption.
2. method as claimed in claim 1, it is characterised in that the annotation information is to build predicative to correspondence The explanation of the field purposes of sentence.
3. method as claimed in claim 1, it is characterised in that the server is indicated according to the encryption The corresponding content of the field is encrypted, specially:
The server indicates to determine according to the encryption and the corresponding content of the field is encrypted;
The server is identified determining the content of the annotation information corresponding field to the annotation information Type;
The server determines the corresponding AES of the content according to the type of the content;
The server carried out according to the AES part or all of content corresponding to the field plus Close.
4. method as claimed in claim 3, it is characterised in that the AES be by the field pair The part or all of content that answers replaces with the algorithm of preset characters.
5. method as claimed in claim 1, it is characterised in that if the corresponding content of the field is not wrapped Containing sensitive information, or after being encrypted to the corresponding content of the field, methods described also includes:
The server obtains the field pair that other of user's raw data table described in database build table statement The annotation information that answers, so that the server is believed according to other corresponding annotations of field for building table statement described Breath judges whether to be encrypted other corresponding contents of field for building table statement described.
6. a kind of server, it is characterised in that the server includes:
Acquisition module, the arbitrary field for building table statement for obtaining raw data table in database are corresponding Annotation information;
Whether judge module, for judging the corresponding content of the field comprising quick according to the annotation information Sense information;
Indicating module, for judging the corresponding content of the field comprising sensitive letter in the judge module Generate encryption to indicate after breath;
Encrypting module, for indicating to be encrypted the corresponding content of the field according to the encryption.
7. server as claimed in claim 6, it is characterised in that the annotation information is to build table to correspondence The explanation of the field purposes of sentence.
8. server as claimed in claim 6, it is characterised in that the encrypting module specifically for:
Indicate to determine according to the encryption and the corresponding content of the field is encrypted;
The type of the content for the annotation information being identified determine the annotation information corresponding field;
Type according to the content determines the corresponding AES of the content;
It is encrypted according to the AES part or all of content corresponding to the field.
9. server as claimed in claim 8, it is characterised in that the AES be by the field Corresponding part or all of content replaces with the algorithm of preset characters.
10. server as claimed in claim 6, it is characterised in that the acquisition module is additionally operable to:
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered After row encryption, other for obtaining raw data table in database build the corresponding annotation information of field of table statement, So that the server judges whether to institute according to other corresponding annotation information of field for building table statement described State the corresponding content of field that other build table statement to be encrypted.
CN201510524699.6A 2015-08-24 2015-08-24 A kind of encryption method annotated based on field and equipment Pending CN106485155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510524699.6A CN106485155A (en) 2015-08-24 2015-08-24 A kind of encryption method annotated based on field and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510524699.6A CN106485155A (en) 2015-08-24 2015-08-24 A kind of encryption method annotated based on field and equipment

Publications (1)

Publication Number Publication Date
CN106485155A true CN106485155A (en) 2017-03-08

Family

ID=58234456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510524699.6A Pending CN106485155A (en) 2015-08-24 2015-08-24 A kind of encryption method annotated based on field and equipment

Country Status (1)

Country Link
CN (1) CN106485155A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537062A (en) * 2018-04-24 2018-09-14 山东华软金盾软件股份有限公司 A kind of method of database data dynamic encryption
CN108595971A (en) * 2018-04-25 2018-09-28 杭州闪捷信息科技股份有限公司 A kind of database adaptive refinement method
CN109101837A (en) * 2018-08-10 2018-12-28 郑州云海信息技术有限公司 A kind of date storage method and device
CN109788145A (en) * 2018-11-15 2019-05-21 西安天钥科技有限公司 Method of calling, the server that desensitizes, equipment of attending a banquet and computer readable storage medium
CN110990877A (en) * 2019-12-13 2020-04-10 中电健康云科技有限公司 Medical image file segmentation encryption and decryption system and method based on greenplus
CN111212033A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 Page display method and device based on combined web crawler defense technology and electronic equipment
CN111382121A (en) * 2020-03-04 2020-07-07 深圳乐信软件技术有限公司 Information management system and storage medium
WO2021099960A1 (en) * 2019-11-20 2021-05-27 International Business Machines Corporation Smart data protection
CN113127874A (en) * 2021-05-18 2021-07-16 中国银行股份有限公司 Method and device for processing intranet sensitive information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080046748A1 (en) * 2005-07-22 2008-02-21 Yukio Fujimoto Data Management Apparatus, Data Management Method, Data Processing Method,and Program
CN101263500A (en) * 2005-09-12 2008-09-10 诺基亚公司 Data access control
CN104063334A (en) * 2014-07-11 2014-09-24 中国人民公安大学 Encryption method and system based on data attributions
CN104601325A (en) * 2013-10-31 2015-05-06 华为技术有限公司 Data encryption method, device, equipment and system and data decryption method, device, equipment and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080046748A1 (en) * 2005-07-22 2008-02-21 Yukio Fujimoto Data Management Apparatus, Data Management Method, Data Processing Method,and Program
CN101263500A (en) * 2005-09-12 2008-09-10 诺基亚公司 Data access control
CN104601325A (en) * 2013-10-31 2015-05-06 华为技术有限公司 Data encryption method, device, equipment and system and data decryption method, device, equipment and system
CN104063334A (en) * 2014-07-11 2014-09-24 中国人民公安大学 Encryption method and system based on data attributions

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537062B (en) * 2018-04-24 2022-03-22 山东华软金盾软件股份有限公司 Dynamic encryption method for database data
CN108537062A (en) * 2018-04-24 2018-09-14 山东华软金盾软件股份有限公司 A kind of method of database data dynamic encryption
CN108595971A (en) * 2018-04-25 2018-09-28 杭州闪捷信息科技股份有限公司 A kind of database adaptive refinement method
CN109101837A (en) * 2018-08-10 2018-12-28 郑州云海信息技术有限公司 A kind of date storage method and device
CN109101837B (en) * 2018-08-10 2020-09-15 苏州浪潮智能科技有限公司 Data storage method and device
CN109788145A (en) * 2018-11-15 2019-05-21 西安天钥科技有限公司 Method of calling, the server that desensitizes, equipment of attending a banquet and computer readable storage medium
WO2021099960A1 (en) * 2019-11-20 2021-05-27 International Business Machines Corporation Smart data protection
US11520905B2 (en) 2019-11-20 2022-12-06 Kyndryl, Inc. Smart data protection
CN110990877A (en) * 2019-12-13 2020-04-10 中电健康云科技有限公司 Medical image file segmentation encryption and decryption system and method based on greenplus
CN111212033A (en) * 2019-12-16 2020-05-29 北京淇瑀信息科技有限公司 Page display method and device based on combined web crawler defense technology and electronic equipment
CN111382121A (en) * 2020-03-04 2020-07-07 深圳乐信软件技术有限公司 Information management system and storage medium
CN111382121B (en) * 2020-03-04 2023-08-25 深圳乐信软件技术有限公司 Information management system and storage medium
CN113127874A (en) * 2021-05-18 2021-07-16 中国银行股份有限公司 Method and device for processing intranet sensitive information

Similar Documents

Publication Publication Date Title
CN106485155A (en) A kind of encryption method annotated based on field and equipment
US8862460B2 (en) System, method, and program for processing text using object coreference technology
US9626622B2 (en) Training a question/answer system using answer keys based on forum content
US20170116474A1 (en) Enhanced Interpretation of Character Arrangements
US8254698B2 (en) Methods for document-to-template matching for data-leak prevention
CN108090351B (en) Method and apparatus for processing request message
CN107665306B (en) A kind of method, apparatus, client and the server of the injection of detection illegal file
CN103383638A (en) Voice entry of sensitive information
US11556812B2 (en) Method and device for acquiring data model in knowledge graph, and medium
CN106559555A (en) A kind of construction method of address list, device
Zinovatna et al. Reusing knowledge on delivering privacy and transparency together
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN107622208A (en) Note encryption and decryption method and related product
CN107644106A (en) The internuncial method of automatic mining business, terminal device and storage medium
US10430454B2 (en) Systems and methods for culling search results in electronic discovery
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
CN109726398B (en) Entity identification and attribute judgment method, system, equipment and medium
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN105354506B (en) The method and apparatus of hidden file
CN111221690A (en) Model determination method and device for integrated circuit design and terminal
CN106559554A (en) A kind of communication processing method, device
Shezan et al. NL2GDPR: Automatically develop GDPR compliant Android application features from natural language
CN110069604A (en) Text search method, apparatus and computer readable storage medium
US11436286B1 (en) System and method for using deconstructed document sections to generate report data structures
CN109543150A (en) A kind for the treatment of method and apparatus of court's trial notes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170308