CN106611129A - Data desensitization method, device and system - Google Patents

Data desensitization method, device and system Download PDF

Info

Publication number
CN106611129A
CN106611129A CN201611224390.6A CN201611224390A CN106611129A CN 106611129 A CN106611129 A CN 106611129A CN 201611224390 A CN201611224390 A CN 201611224390A CN 106611129 A CN106611129 A CN 106611129A
Authority
CN
China
Prior art keywords
data
desensitization
type
user role
action type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611224390.6A
Other languages
Chinese (zh)
Inventor
陈震
佟镝
黄晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Donghua Internet Ikea Data Services Co Ltd
Original Assignee
Donghua Internet Ikea Data Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Donghua Internet Ikea Data Services Co Ltd filed Critical Donghua Internet Ikea Data Services Co Ltd
Priority to CN201611224390.6A priority Critical patent/CN106611129A/en
Publication of CN106611129A publication Critical patent/CN106611129A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data desensitization method, device and system, and relates to the technical field of data processing. The data desensitization method comprises the following steps: at least obtaining a user role, an operation type and a data request; determining whether requested data need to be carried out with desensitization processing according to the user role and the operation type; and if the requested data need to be carried out with the desensitization processing, matching corresponding data fuzzy algorithms to carry out the desensitization processing on the requested data. The technical problems of core data leakage and loss or relatively poor readability which are easily caused due to a fact that data encryption and fuzzy processing are not considered comprehensively in the prior art are solved; and not only are the core data leakage and loss prevented, but also the readability of the data after being desensitized is improved.

Description

Data desensitization method, apparatus and system
Technical field
The present invention relates to technical field of data processing, more particularly, to a kind of data desensitization method, apparatus and system.
Background technology
Data desensitization is that it is to pass through data in order to ensure the use of the creation data under nonproductive environment is safer Certain algorithm becomes another kind of pattern, and this pattern is readable, and is of a sort with metadata.Traditional data Desensitisation regimens are primarily upon scene derived in data backstage batch, and for the data encryption and obfuscation in systemic-function at It is not thorough enough that reason considers, is easily caused leaking, being lost in or readable poor, if core data is leaked, flowed for core data Turn pale and easily cause larger property loss, if readable poor after desensitization, user of service possibly cannot use valid data solution Certainly practical business problem.
The content of the invention
In view of this, it is an object of the invention to provide a kind of data desensitization method, apparatus and system, to solve existing skill Not thorough enough is considered to data encryption and Fuzzy processing in art, causes core data to leak, be lost in or readable poor skill Art problem.
In a first aspect, embodiments providing a kind of data desensitization method, comprise the following steps:
At least obtain log-on message, action type and the request of data of user;
Determine whether requested data needs to carry out desensitization process according to user role, action type;
If requested data needs to carry out desensitization process, match corresponding data fuzzy algorithmic approach is carried out to requested data Desensitization process.
With reference in a first aspect, embodiments provide the first possible embodiment of first aspect, wherein, behaviour Making type at least includes business handling, batch query and derives data.
With reference in a first aspect, embodiments provide second possible embodiment of first aspect, wherein, remove Obtain user role, outside action type and request of data, also obtain function type and type of service that user selects, and according to Family role, action type, function type and type of service determine whether asked data need to carry out desensitization process.
With reference to first aspect and its possible embodiment, the third possibility of first aspect is embodiments provided Embodiment, wherein, data fuzzy algorithmic approach includes replacing, reset, encrypting, blocking, mask and date are offset in rounding extremely It is few two kinds.
Second aspect, the embodiment of the present invention also provides a kind of data desensitization device, including:
Data obtaining module, at least obtaining user role, action type and request of data;
Judge module, for determining whether requested data needs to carry out desensitization process according to user role, action type;
Desensitization module, for when requested data needs to carry out desensitization process, matching corresponding data fuzzy algorithmic approach pair Requested data carries out desensitization process.
The embodiment of the present invention desensitizes data together with systemic-function architecture combined, synchronously complete when product function is planned Into the planning of desensitisation regimens, and set corresponding desensitization method.The design of desensitization method has taken into full account the actual need of the system Ask, using key elements such as user role, action types as optional desensitization parameter, it is achieved thereby that in the same of assuring data security When, in turn ensure that the maximum of business information is readable.Change over derives the stage and does the tradition side that desensitizes in data inactivityization Formula, focuses on being processed in the data obfuscation of application level.
With reference to second aspect, the first possible embodiment of second aspect is embodiments provided, wherein, behaviour Making type at least includes business handling, batch query and derives data.
With reference to second aspect, second possible embodiment of second aspect is embodiments provided, wherein, letter Breath acquisition module is additionally operable to obtain function type and the type of service that user selects, and according to user role, action type, function Type and type of service determine whether asked data need to carry out desensitization process.
With reference to second aspect, the third possible embodiment of second aspect is embodiments provided, wherein, number Include replacing, reset, encrypting, blocking according to fuzzy algorithmic approach, mask and date offset in rounding at least two.
With reference to second aspect and its possible embodiment, the 4th kind of possibility of second aspect is embodiments provided Embodiment, wherein, log-on message association user role, and user role be stored in data desensitization device in.
The third aspect, embodiments provides data desensitization system, if including dry run terminal, and attended operation The data desensitization device as described in second aspect and its possible embodiment of terminal;
Operation terminal is used for the operation information of receiving user's input, and the data of display data desensitization device output.
The embodiment of the present invention brings following beneficial effect:
A kind of data desensitization method is embodiments provided, institute's number of request is determined according to user role, action type According to whether needing to carry out desensitization process;If requested data needs to carry out desensitization process, by corresponding data fuzzy algorithmic approach Desensitization process is carried out to requested data.Technical scheme described in the embodiment of the present invention passes through the various data obfuscations of integrated use Processing means, and the use scene with reference to data and data user of service, intelligently, flexibly determine to which data item, with what Kind of form carries out desensitization process, and changes over and derive the stage in data inactivityization and do the traditional approach that desensitizes, focuses on existing The data obfuscation of application level is processed.So as to prevent core data to leak, be lost in, the readability of data after desensitization is improve
Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims And in accompanying drawing specifically noted structure realizing and obtain.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Description of the drawings
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, below will be to concrete The accompanying drawing to be used needed for embodiment or description of the prior art is briefly described, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid Put, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is the flow chart of the first embodiment of the data desensitization method that the embodiment of the present invention 1 is provided;
Fig. 2 is the flow chart of second embodiment of the data desensitization method that the embodiment of the present invention 2 is provided;
Fig. 3 is the schematic diagram of the data desensitization device that the embodiment of the present invention 3 is provided;
Fig. 4 is the schematic diagram of the data desensitization system that the embodiment of the present invention 4 is provided.
Icon:1- data desensitization device;11- data obtaining modules;12- judge modules;13- desensitization modules;2- operations are eventually End.
Specific embodiment
To make purpose, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention Technical scheme be clearly and completely described, it is clear that described embodiment is a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Not thorough enough is considered to data encryption and Fuzzy processing in prior art, cause core data to leak, be lost in or Readable poor technical problem, based on this, a kind of data desensitization method provided in an embodiment of the present invention, apparatus and system, both Can prevent core data from leaking, being lost in, the readability of data after desensitization can be improved again.
For ease of understanding the embodiment of the present invention, first to a kind of data desensitization side disclosed in the embodiment of the present invention Method describes in detail.
Embodiment 1
As shown in figure 1, embodiments providing a kind of data desensitization method, comprise the following steps:
S11. user role, action type and request of data are at least obtained.
The log-on message association user role of user in the embodiment of the present invention, therefore can be according to user in operation terminal input Log-on message determine user role.
Action type in the embodiment of the present invention at least includes business handling, batch query and derivation
S12. determine whether requested data needs to carry out desensitization process according to user role, action type.
Whether need the embodiment that desensitized as a kind of possible determination data of the embodiment of the present invention, according to Family role determines its authority in selected action type, and according to authority the sensitive grade of asked data, root are determined Determine asked data for whether corresponding authority needs to carry out data desensitization according to sensitive grade.
Action type in the embodiment of the present invention at least includes type of service, batch query and derivation.
If S13. requested data needs to carry out desensitization process, corresponding data fuzzy algorithmic approach is matched, to institute's number of request According to carrying out desensitization process.
If requested data need not carry out desensitization process, directly export, desensitized if desired, then match phase The fuzzy algorithmic approach answered carries out Fuzzy Processing to the data asked, then by the data output after desensitization.
The fuzzy algorithmic approach of present embodiment includes replacing, reset, encrypting, blocking, mask and date are offset in rounding extremely Few two kinds, each fuzzy algorithmic approach principle is as follows:
Replace:Name in an account book for women is replaced with F by such as unification, and this method, can be with complete to internal staff more like " cover-up " All risk insurance holds information integrity.
Reset:Sequence number 12345 is rearranged to 54321, is upset in a certain order, like " replacement ", can need Prime information is conveniently gone back when wanting.
Mask:It is 1xxxx6 after 123456 masks, remains partial information, and ensure that the length consistency of information, Information holders are more easy to distinguish, such as identity information is obtained on train ticket.
Encryption:Numbering 12345 is encrypted as 23456, and safe coefficient depends on which kind of AES adopted, and is typically based on reality Depending on situation.
Block:13811001111 block as 138, give up necessary information to ensure the ambiguity of data, are the more commonly used Desensitization method, but it is often not friendly enough to production.
Date skew is rounded:2013052012:30:45 skews are 20,130,520 12 after rounding:00:00, give up precision Ensure the security of initial data, general this kind of method can protect the Annual distribution density of data.
By the various data obfuscation processing means of integrated use, and the use scene and data with reference to data uses people Which data item member, intelligence, flexibly determine to, carry out desensitization process in what manner, and changes over quiet in data Stateization derives the stage and does the traditional approach for desensitizing, and focuses on being processed in the data obfuscation of application level.Both core data had been prevented Leak, be lost in, improve again desensitization after data readability.
Embodiment 2
As shown in Fig. 2 embodiments providing a kind of data desensitization method, comprise the following steps:
S21. user login information, action type, function type, type of service and data are at least obtained by operation terminal Request.
The log-on message association user role of user in the embodiment of the present invention, therefore can be according to user in operation terminal input Log-on message determine user role.
Action type in the embodiment of the present invention at least includes business handling, batch query and derivation.Function type is at least Including business handling, batch query and derivation.
It should be noted that action type is application, can be expanded according to actually used scene, and be operated class The use of type generally needs to be realized by function type, such as, if a specific action type is related to inquiry, calling function Query function in type.
S22 determines user role according to subscriber identity information, and according to user role, action type, function type, business Type determines whether requested data needs to carry out desensitization process.
The log-on message association user role of user in the embodiment of the present invention, therefore can be according to user in operation terminal input Log-on message determine the role of user, then determined according to user role, action type, function type, type of service and asked Ask whether data need to carry out desensitization process.
The embodiment for desensitizing whether is needed as a kind of possible determination data of the embodiment of the present invention, according to user angle Color determines the authority in its certain type of service in selected certain action type belonged in certain function type, according to authority It is determined that the sensitive grade of the data asked, determine asked data for corresponding authority whether needs according to sensitive grade Carry out data desensitization.
If S23. requested data needs to carry out the desensitization process, corresponding data fuzzy algorithmic approach is matched, to asking Ask data to carry out desensitization process, and desensitization result is sent to operation terminal.
If requested data need not carry out desensitization process, it is directly output to operate terminal, line number is entered if desired According to desensitization, then matching data of the corresponding fuzzy algorithmic approach to being asked carries out Fuzzy Processing, then by the data output after desensitization To operation terminal.
The fuzzy algorithmic approach of present embodiment is preferably but not limited to replace, resets, encrypts, blocking, mask, date skew take It is whole, each fuzzy algorithmic approach principle with it is identical in embodiment 1, will not be described here.
Data obfuscation processing scheme can be refine to system each function by the embodiment of the present invention, and combine type of service The characteristics of decide whether and how to carry out data protection.Such as:When needing batch to browse user profile, identification card number is entered Row Fuzzy processing is protected;But when user needs to handle system of real name business, then ID card information is opened, to support corresponding industry Business scene, so as to realize, for diversified business, function are using otherness data safety standard, improving the guarantor to sensitive data Shield.
Embodiment 3
As shown in figure 3, a kind of data desensitization device is embodiments provided, including data obtaining module 11, judgement Module 12 and desensitization module 13, data obtaining module 11 is used at least obtain log-on message, action type and the data of user please Ask;Judge module 12 is used to determine whether requested data needs to carry out desensitization process according to user role, action type;Desensitization Module 13 is entered for matching corresponding data fuzzy algorithmic approach when requested data needs to carry out desensitization process to requested data Row desensitization process.
The embodiment of the present invention desensitizes data together with systemic-function architecture combined, synchronously complete when product function is planned Into the planning of desensitisation regimens, and set corresponding desensitization method.The design of desensitization method has taken into full account the actual need of the system Ask, using key elements such as user role, action types as optional desensitization parameter, it is achieved thereby that in the same of assuring data security When, in turn ensure that the maximum of business information is readable.Change over derives the stage and does the tradition side that desensitizes in data inactivityization Formula, focuses on being processed in the data obfuscation of application level.
Action type in the embodiment of the present invention at least includes business handling, batch query and derives data.
Fuzzy algorithmic approach in present embodiment preferably but be not limited only to replace, reset, encrypt, blocking, mask and date it is inclined Pipette whole, each fuzzy algorithmic approach principle is as described in Example 1.
Used as the preferred embodiment of the embodiment of the present invention, data obtaining module 11 is except obtaining relevant user angle Outside the parameter of color, action type and request of data, the function type and type of service parameter of user's selection can also be obtained, or Other such as operate terminal type, using the parameter of department, and according to above-mentioned parameter determine asked data whether need into Row desensitization process.If desired desensitize, the corresponding fuzzy algorithmic approach of 12 pairs of Data Matchings asked of judge module desensitizes to it Process, then by the data output after desensitization.
As a kind of embodiment of the embodiment of the present invention, function type parameter or industry are carried in action type parameter Service type parameter, or other specification, therefore, it can once get multiple authority assessment parameters.
Used as a kind of embodiment of the embodiment of the present invention, log-on message association user role, and user role are stored in In data desensitization device, the security of subscriber identity information can either be guaranteed, user role can be determined by log-on message again.
Data desensitization device provided in an embodiment of the present invention, the data desensitization method provided with above-described embodiment has identical Technical characteristic, so can also solve identical technical problem, reach identical technique effect.
Embodiment 4
As shown in figure 4, a kind of data desensitization system is embodiments provided, if including dry run terminal 2, Yi Jilian The data as described in Example 3 desensitization device 1 of operation terminal 2 is connect, operates terminal 2 to be used for the operation information of receiving user's input And the data of the display data desensitization output of device 1.
User is input into log-on message by operation terminal 2, and sends authentication request, number to the data desensitization device 1 According to desensitization device 1 user identity is verified according to authentication request, while determining user role, then obtain user and exist Function type, action type, type of service that operation terminal 2 is selected, then determine the user in above-mentioned behaviour according to user role Authority in work, it is then determined that sensitive grade of the requested data for the authority, if sensitive grade is zero, need not be carried out Desensitization, requested data is directly output to operate terminal 2, corresponding according to specific grade matching if sensitive grade is not zero Fuzzy algorithmic approach desensitization process is carried out to requested data, then by the data output after desensitization to operate terminal 2 shown.
Data desensitization system provided in an embodiment of the present invention, the data desensitization device 1 provided with above-described embodiment has phase Same technical characteristic, so can also solve identical technical problem, reaches identical technique effect, will not be described here.
Data desensitization method, the computer program of apparatus and system that the embodiment of the present invention is provided, including storage The computer-readable recording medium of program code, the instruction that described program code includes can be used to perform previous methods embodiments Described in method, implement and can be found in embodiment of the method, will not be described here.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, be will not be described here.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase Company ", " connection " should be interpreted broadly, for example, it may be being fixedly connected, or being detachably connected, or be integrally connected;Can Being to be mechanically connected, or electrically connect;Can be joined directly together, it is also possible to be indirectly connected to by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
If the function is realized and as independent production marketing or when using using in the form of SFU software functional unit, can be with In being stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
In describing the invention, it should be noted that term " " center ", " on ", D score, "left", "right", " vertical ", The orientation or position relationship of the instruction such as " level ", " interior ", " outward " be based on orientation shown in the drawings or position relationship, merely to Be easy to description the present invention and simplify description, rather than indicate or imply indication device or element must have specific orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.Additionally, term " first ", " second ", " the 3rd " is only used for describing purpose, and it is not intended that indicating or implying relative importance.
Finally it should be noted that:Embodiment described above, specific embodiment only of the invention, to illustrate the present invention Technical scheme, rather than a limitation, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this It is bright to be described in detail, it will be understood by those within the art that:Any those familiar with the art The invention discloses technical scope in, it still can modify to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of embodiment of the present invention technical scheme, should all cover the protection in the present invention Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of data desensitization method, it is characterised in that comprise the following steps:
At least obtain user role, action type and request of data;
Determine whether requested data needs to carry out desensitization process according to the user role, the action type;
If requested data needs to carry out the desensitization process, match corresponding data fuzzy algorithmic approach is carried out to requested data The desensitization process.
2. data desensitization method according to claim 1, it is characterised in that the action type is at least done including business Reason, batch query and derivation data.
3. data desensitization method according to claim 1, it is characterised in that obtain the user role, operation except described Outside type and request of data, function type and type of service that the user selects also are obtained, and according to the user role, institute State action type, the function type and the type of service and determine whether asked data need to carry out desensitization process.
4. the data desensitization method according to any one of claim 1-3, it is characterised in that the data fuzzy algorithmic approach includes Replace, reset, encrypting, blocking, mask and the date skew round at least two.
5. a kind of data desensitize device, it is characterised in that include:
Data obtaining module, at least obtaining user role, action type and request of data;
Judge module, for determining whether requested data needs to be desensitized according to the user role, the action type Process;
Desensitization module, for when requested data needs to carry out the desensitization process, matching corresponding data fuzzy algorithmic approach pair Requested data carries out the desensitization process.
6. data according to claim 5 desensitize device, it is characterised in that the action type is at least done including business Reason, batch query and derivation data.
7. data according to claim 5 desensitize device, it is characterised in that described information acquisition module is additionally operable to obtain and uses Function type and type of service that family selects, and according to the user role, the action type, the function type and described Type of service determines whether asked data need to carry out desensitization process.
8. data according to claim 5 desensitize device, it is characterised in that the data fuzzy algorithmic approach includes replacing, weight Arrange, encrypt, blocking, mask and the date skew round at least two.
9. the data desensitization device according to any one of claim 5-8, it is characterised in that user role association is logged in Information, and the user role is stored in data desensitization device.
10. a kind of data desensitize system, it is characterised in that if including dry run terminal, and connect the operation terminal as Data desensitization device described in any one of claim 5-9;
The operation terminal is used for the operation information of receiving user's input, and the number for showing the data desensitization device output According to.
CN201611224390.6A 2016-12-27 2016-12-27 Data desensitization method, device and system Pending CN106611129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611224390.6A CN106611129A (en) 2016-12-27 2016-12-27 Data desensitization method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611224390.6A CN106611129A (en) 2016-12-27 2016-12-27 Data desensitization method, device and system

Publications (1)

Publication Number Publication Date
CN106611129A true CN106611129A (en) 2017-05-03

Family

ID=58636133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611224390.6A Pending CN106611129A (en) 2016-12-27 2016-12-27 Data desensitization method, device and system

Country Status (1)

Country Link
CN (1) CN106611129A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107315972A (en) * 2017-06-01 2017-11-03 北京明朝万达科技股份有限公司 A kind of dynamic desensitization method of big data unstructured document and system
CN107609418A (en) * 2017-08-31 2018-01-19 深圳市牛鼎丰科技有限公司 Desensitization method, device, storage device and the computer equipment of text data
CN108304725A (en) * 2018-02-09 2018-07-20 山东汇贸电子口岸有限公司 A kind of method and system to the desensitization of government data resource
CN108664812A (en) * 2018-05-14 2018-10-16 阿里巴巴集团控股有限公司 Information desensitization method, apparatus and system
CN108681676A (en) * 2018-04-03 2018-10-19 北京市商汤科技开发有限公司 Data managing method and device, system, electronic equipment, program and storage medium
CN109284631A (en) * 2018-10-26 2019-01-29 中国电子科技网络信息安全有限公司 A kind of document desensitization system and method based on big data
CN109871711A (en) * 2019-01-23 2019-06-11 中国海洋大学 The shared distribution risk control model of ocean big data and method
CN109981619A (en) * 2019-03-13 2019-07-05 泰康保险集团股份有限公司 Data capture method, device, medium and electronic equipment
CN110019377A (en) * 2017-12-14 2019-07-16 中国移动通信集团山西有限公司 Dynamic desensitization method, device, equipment and medium
CN110162993A (en) * 2018-07-17 2019-08-23 腾讯科技(深圳)有限公司 Desensitization process method, model training method, device and computer equipment
CN110472434A (en) * 2019-07-12 2019-11-19 北京字节跳动网络技术有限公司 Data desensitization method, system, medium and electronic equipment
CN110532797A (en) * 2019-07-24 2019-12-03 方盈金泰科技(北京)有限公司 The desensitization method and system of big data
WO2020165756A1 (en) * 2019-02-15 2020-08-20 International Business Machines Corporation Secure, multi-level access to obfuscated data for analytics
CN111859448A (en) * 2020-07-02 2020-10-30 合肥森亿智能科技有限公司 Data export auditing method, system and terminal based on role authority setting
CN113157902A (en) * 2020-12-24 2021-07-23 中国能源建设股份有限公司 Inquiry mode for completing information desensitization examination and approval by utilizing multiple information means
CN113610623A (en) * 2021-07-21 2021-11-05 深圳天源新能源股份有限公司 Photovoltaic pumping system payment method, server and photovoltaic pumping inverter
CN114722412A (en) * 2022-04-15 2022-07-08 北京科杰科技有限公司 Data security storage method and device, electronic equipment and storage medium
CN115080987A (en) * 2021-03-11 2022-09-20 中国移动通信集团山东有限公司 Password management method, device, system, storage medium and computer equipment
CN115277047A (en) * 2022-05-31 2022-11-01 明珠数字科技股份有限公司 Message desensitization method, system and storage medium based on Spring Cloud Gateway
CN115277099A (en) * 2022-06-29 2022-11-01 锦图计算技术(深圳)有限公司 Function security method based on Android system and related equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203170A (en) * 2016-07-19 2016-12-07 北京同余科技有限公司 The Database Dynamic desensitization method of servicing of based role and system
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203170A (en) * 2016-07-19 2016-12-07 北京同余科技有限公司 The Database Dynamic desensitization method of servicing of based role and system
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107315972A (en) * 2017-06-01 2017-11-03 北京明朝万达科技股份有限公司 A kind of dynamic desensitization method of big data unstructured document and system
CN107609418A (en) * 2017-08-31 2018-01-19 深圳市牛鼎丰科技有限公司 Desensitization method, device, storage device and the computer equipment of text data
CN107609418B (en) * 2017-08-31 2019-12-10 深圳市牛鼎丰科技有限公司 Desensitization method and device of text data, storage device and computer device
CN110019377A (en) * 2017-12-14 2019-07-16 中国移动通信集团山西有限公司 Dynamic desensitization method, device, equipment and medium
CN110019377B (en) * 2017-12-14 2021-10-26 中国移动通信集团山西有限公司 Dynamic desensitization method, device, equipment and medium
CN108304725A (en) * 2018-02-09 2018-07-20 山东汇贸电子口岸有限公司 A kind of method and system to the desensitization of government data resource
CN108681676A (en) * 2018-04-03 2018-10-19 北京市商汤科技开发有限公司 Data managing method and device, system, electronic equipment, program and storage medium
CN108664812A (en) * 2018-05-14 2018-10-16 阿里巴巴集团控股有限公司 Information desensitization method, apparatus and system
CN110162993B (en) * 2018-07-17 2024-01-05 腾讯科技(深圳)有限公司 Desensitization processing method, model training device and computer equipment
CN110162993A (en) * 2018-07-17 2019-08-23 腾讯科技(深圳)有限公司 Desensitization process method, model training method, device and computer equipment
CN109284631A (en) * 2018-10-26 2019-01-29 中国电子科技网络信息安全有限公司 A kind of document desensitization system and method based on big data
CN109871711A (en) * 2019-01-23 2019-06-11 中国海洋大学 The shared distribution risk control model of ocean big data and method
CN109871711B (en) * 2019-01-23 2021-06-25 中国海洋大学 Ocean big data sharing and distributing risk control model and method
WO2020165756A1 (en) * 2019-02-15 2020-08-20 International Business Machines Corporation Secure, multi-level access to obfuscated data for analytics
GB2595167A (en) * 2019-02-15 2021-11-17 Ibm Secure, multi-level access to obfuscated data for analytics
US11416633B2 (en) 2019-02-15 2022-08-16 International Business Machines Corporation Secure, multi-level access to obfuscated data for analytics
CN109981619A (en) * 2019-03-13 2019-07-05 泰康保险集团股份有限公司 Data capture method, device, medium and electronic equipment
CN110472434B (en) * 2019-07-12 2021-09-14 北京字节跳动网络技术有限公司 Data desensitization method, system, medium, and electronic device
CN110472434A (en) * 2019-07-12 2019-11-19 北京字节跳动网络技术有限公司 Data desensitization method, system, medium and electronic equipment
CN110532797A (en) * 2019-07-24 2019-12-03 方盈金泰科技(北京)有限公司 The desensitization method and system of big data
CN111859448A (en) * 2020-07-02 2020-10-30 合肥森亿智能科技有限公司 Data export auditing method, system and terminal based on role authority setting
CN113157902A (en) * 2020-12-24 2021-07-23 中国能源建设股份有限公司 Inquiry mode for completing information desensitization examination and approval by utilizing multiple information means
CN115080987A (en) * 2021-03-11 2022-09-20 中国移动通信集团山东有限公司 Password management method, device, system, storage medium and computer equipment
CN113610623A (en) * 2021-07-21 2021-11-05 深圳天源新能源股份有限公司 Photovoltaic pumping system payment method, server and photovoltaic pumping inverter
CN114722412A (en) * 2022-04-15 2022-07-08 北京科杰科技有限公司 Data security storage method and device, electronic equipment and storage medium
CN114722412B (en) * 2022-04-15 2023-04-07 北京科杰科技有限公司 Data secure storage method and device, electronic equipment and storage medium
CN115277047A (en) * 2022-05-31 2022-11-01 明珠数字科技股份有限公司 Message desensitization method, system and storage medium based on Spring Cloud Gateway
CN115277099A (en) * 2022-06-29 2022-11-01 锦图计算技术(深圳)有限公司 Function security method based on Android system and related equipment

Similar Documents

Publication Publication Date Title
CN106611129A (en) Data desensitization method, device and system
CA2766491C (en) A method and system for securely and automatically downloading a master key in a bank card payment system
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
US11418499B2 (en) Password security
CN107871081A (en) A kind of computer information safe system
CN106063182A (en) Electronic signing methods, systems and apparatus
CN104794388B (en) application program access protection method and application program access protection device
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN105635168B (en) A kind of application method of offline transaction device and its security key
US8156548B2 (en) Identification and authentication system and method
CN105827582B (en) A kind of communication encrypting method, device and system
CN108768963A (en) The communication means and system of trusted application and safety element
CN104021332A (en) Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey
CN103220141A (en) Sensitive data protecting method and system based on group key strategy
CN108494783A (en) The guard method of high in the clouds data
CN106355418A (en) Anti-counterfeiting authentication method based on NFC tag
CN103152425A (en) Safety management system for mobile device based on cloud technology
CN105791277A (en) Identity authentication method
CN108965291A (en) Registration login method, system and the computer equipment of mixed application
CN109033784A (en) Identity identifying method and device in a communication network
CN109214221A (en) A kind of identity card reader verification method, host computer and identity card reader
CN108460597A (en) A kind of key management system and method
CN111046405A (en) Data processing method, device, equipment and storage medium
CN106713372B (en) A kind of method of controlling security and safety control system based on permission control
CN117332391A (en) Power distribution network data asset security access method and system considering authority hierarchical management and control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170503

RJ01 Rejection of invention patent application after publication