CN106611129A - Data desensitization method, device and system - Google Patents
Data desensitization method, device and system Download PDFInfo
- Publication number
- CN106611129A CN106611129A CN201611224390.6A CN201611224390A CN106611129A CN 106611129 A CN106611129 A CN 106611129A CN 201611224390 A CN201611224390 A CN 201611224390A CN 106611129 A CN106611129 A CN 106611129A
- Authority
- CN
- China
- Prior art keywords
- data
- desensitization
- type
- user role
- action type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data desensitization method, device and system, and relates to the technical field of data processing. The data desensitization method comprises the following steps: at least obtaining a user role, an operation type and a data request; determining whether requested data need to be carried out with desensitization processing according to the user role and the operation type; and if the requested data need to be carried out with the desensitization processing, matching corresponding data fuzzy algorithms to carry out the desensitization processing on the requested data. The technical problems of core data leakage and loss or relatively poor readability which are easily caused due to a fact that data encryption and fuzzy processing are not considered comprehensively in the prior art are solved; and not only are the core data leakage and loss prevented, but also the readability of the data after being desensitized is improved.
Description
Technical field
The present invention relates to technical field of data processing, more particularly, to a kind of data desensitization method, apparatus and system.
Background technology
Data desensitization is that it is to pass through data in order to ensure the use of the creation data under nonproductive environment is safer
Certain algorithm becomes another kind of pattern, and this pattern is readable, and is of a sort with metadata.Traditional data
Desensitisation regimens are primarily upon scene derived in data backstage batch, and for the data encryption and obfuscation in systemic-function at
It is not thorough enough that reason considers, is easily caused leaking, being lost in or readable poor, if core data is leaked, flowed for core data
Turn pale and easily cause larger property loss, if readable poor after desensitization, user of service possibly cannot use valid data solution
Certainly practical business problem.
The content of the invention
In view of this, it is an object of the invention to provide a kind of data desensitization method, apparatus and system, to solve existing skill
Not thorough enough is considered to data encryption and Fuzzy processing in art, causes core data to leak, be lost in or readable poor skill
Art problem.
In a first aspect, embodiments providing a kind of data desensitization method, comprise the following steps:
At least obtain log-on message, action type and the request of data of user;
Determine whether requested data needs to carry out desensitization process according to user role, action type;
If requested data needs to carry out desensitization process, match corresponding data fuzzy algorithmic approach is carried out to requested data
Desensitization process.
With reference in a first aspect, embodiments provide the first possible embodiment of first aspect, wherein, behaviour
Making type at least includes business handling, batch query and derives data.
With reference in a first aspect, embodiments provide second possible embodiment of first aspect, wherein, remove
Obtain user role, outside action type and request of data, also obtain function type and type of service that user selects, and according to
Family role, action type, function type and type of service determine whether asked data need to carry out desensitization process.
With reference to first aspect and its possible embodiment, the third possibility of first aspect is embodiments provided
Embodiment, wherein, data fuzzy algorithmic approach includes replacing, reset, encrypting, blocking, mask and date are offset in rounding extremely
It is few two kinds.
Second aspect, the embodiment of the present invention also provides a kind of data desensitization device, including:
Data obtaining module, at least obtaining user role, action type and request of data;
Judge module, for determining whether requested data needs to carry out desensitization process according to user role, action type;
Desensitization module, for when requested data needs to carry out desensitization process, matching corresponding data fuzzy algorithmic approach pair
Requested data carries out desensitization process.
The embodiment of the present invention desensitizes data together with systemic-function architecture combined, synchronously complete when product function is planned
Into the planning of desensitisation regimens, and set corresponding desensitization method.The design of desensitization method has taken into full account the actual need of the system
Ask, using key elements such as user role, action types as optional desensitization parameter, it is achieved thereby that in the same of assuring data security
When, in turn ensure that the maximum of business information is readable.Change over derives the stage and does the tradition side that desensitizes in data inactivityization
Formula, focuses on being processed in the data obfuscation of application level.
With reference to second aspect, the first possible embodiment of second aspect is embodiments provided, wherein, behaviour
Making type at least includes business handling, batch query and derives data.
With reference to second aspect, second possible embodiment of second aspect is embodiments provided, wherein, letter
Breath acquisition module is additionally operable to obtain function type and the type of service that user selects, and according to user role, action type, function
Type and type of service determine whether asked data need to carry out desensitization process.
With reference to second aspect, the third possible embodiment of second aspect is embodiments provided, wherein, number
Include replacing, reset, encrypting, blocking according to fuzzy algorithmic approach, mask and date offset in rounding at least two.
With reference to second aspect and its possible embodiment, the 4th kind of possibility of second aspect is embodiments provided
Embodiment, wherein, log-on message association user role, and user role be stored in data desensitization device in.
The third aspect, embodiments provides data desensitization system, if including dry run terminal, and attended operation
The data desensitization device as described in second aspect and its possible embodiment of terminal;
Operation terminal is used for the operation information of receiving user's input, and the data of display data desensitization device output.
The embodiment of the present invention brings following beneficial effect:
A kind of data desensitization method is embodiments provided, institute's number of request is determined according to user role, action type
According to whether needing to carry out desensitization process;If requested data needs to carry out desensitization process, by corresponding data fuzzy algorithmic approach
Desensitization process is carried out to requested data.Technical scheme described in the embodiment of the present invention passes through the various data obfuscations of integrated use
Processing means, and the use scene with reference to data and data user of service, intelligently, flexibly determine to which data item, with what
Kind of form carries out desensitization process, and changes over and derive the stage in data inactivityization and do the traditional approach that desensitizes, focuses on existing
The data obfuscation of application level is processed.So as to prevent core data to leak, be lost in, the readability of data after desensitization is improve
Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims
And in accompanying drawing specifically noted structure realizing and obtain.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate
Appended accompanying drawing, is described in detail below.
Description of the drawings
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, below will be to concrete
The accompanying drawing to be used needed for embodiment or description of the prior art is briefly described, it should be apparent that, in describing below
Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid
Put, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is the flow chart of the first embodiment of the data desensitization method that the embodiment of the present invention 1 is provided;
Fig. 2 is the flow chart of second embodiment of the data desensitization method that the embodiment of the present invention 2 is provided;
Fig. 3 is the schematic diagram of the data desensitization device that the embodiment of the present invention 3 is provided;
Fig. 4 is the schematic diagram of the data desensitization system that the embodiment of the present invention 4 is provided.
Icon:1- data desensitization device;11- data obtaining modules;12- judge modules;13- desensitization modules;2- operations are eventually
End.
Specific embodiment
To make purpose, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention
Technical scheme be clearly and completely described, it is clear that described embodiment is a part of embodiment of the invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Not thorough enough is considered to data encryption and Fuzzy processing in prior art, cause core data to leak, be lost in or
Readable poor technical problem, based on this, a kind of data desensitization method provided in an embodiment of the present invention, apparatus and system, both
Can prevent core data from leaking, being lost in, the readability of data after desensitization can be improved again.
For ease of understanding the embodiment of the present invention, first to a kind of data desensitization side disclosed in the embodiment of the present invention
Method describes in detail.
Embodiment 1
As shown in figure 1, embodiments providing a kind of data desensitization method, comprise the following steps:
S11. user role, action type and request of data are at least obtained.
The log-on message association user role of user in the embodiment of the present invention, therefore can be according to user in operation terminal input
Log-on message determine user role.
Action type in the embodiment of the present invention at least includes business handling, batch query and derivation
S12. determine whether requested data needs to carry out desensitization process according to user role, action type.
Whether need the embodiment that desensitized as a kind of possible determination data of the embodiment of the present invention, according to
Family role determines its authority in selected action type, and according to authority the sensitive grade of asked data, root are determined
Determine asked data for whether corresponding authority needs to carry out data desensitization according to sensitive grade.
Action type in the embodiment of the present invention at least includes type of service, batch query and derivation.
If S13. requested data needs to carry out desensitization process, corresponding data fuzzy algorithmic approach is matched, to institute's number of request
According to carrying out desensitization process.
If requested data need not carry out desensitization process, directly export, desensitized if desired, then match phase
The fuzzy algorithmic approach answered carries out Fuzzy Processing to the data asked, then by the data output after desensitization.
The fuzzy algorithmic approach of present embodiment includes replacing, reset, encrypting, blocking, mask and date are offset in rounding extremely
Few two kinds, each fuzzy algorithmic approach principle is as follows:
Replace:Name in an account book for women is replaced with F by such as unification, and this method, can be with complete to internal staff more like " cover-up "
All risk insurance holds information integrity.
Reset:Sequence number 12345 is rearranged to 54321, is upset in a certain order, like " replacement ", can need
Prime information is conveniently gone back when wanting.
Mask:It is 1xxxx6 after 123456 masks, remains partial information, and ensure that the length consistency of information,
Information holders are more easy to distinguish, such as identity information is obtained on train ticket.
Encryption:Numbering 12345 is encrypted as 23456, and safe coefficient depends on which kind of AES adopted, and is typically based on reality
Depending on situation.
Block:13811001111 block as 138, give up necessary information to ensure the ambiguity of data, are the more commonly used
Desensitization method, but it is often not friendly enough to production.
Date skew is rounded:2013052012:30:45 skews are 20,130,520 12 after rounding:00:00, give up precision
Ensure the security of initial data, general this kind of method can protect the Annual distribution density of data.
By the various data obfuscation processing means of integrated use, and the use scene and data with reference to data uses people
Which data item member, intelligence, flexibly determine to, carry out desensitization process in what manner, and changes over quiet in data
Stateization derives the stage and does the traditional approach for desensitizing, and focuses on being processed in the data obfuscation of application level.Both core data had been prevented
Leak, be lost in, improve again desensitization after data readability.
Embodiment 2
As shown in Fig. 2 embodiments providing a kind of data desensitization method, comprise the following steps:
S21. user login information, action type, function type, type of service and data are at least obtained by operation terminal
Request.
The log-on message association user role of user in the embodiment of the present invention, therefore can be according to user in operation terminal input
Log-on message determine user role.
Action type in the embodiment of the present invention at least includes business handling, batch query and derivation.Function type is at least
Including business handling, batch query and derivation.
It should be noted that action type is application, can be expanded according to actually used scene, and be operated class
The use of type generally needs to be realized by function type, such as, if a specific action type is related to inquiry, calling function
Query function in type.
S22 determines user role according to subscriber identity information, and according to user role, action type, function type, business
Type determines whether requested data needs to carry out desensitization process.
The log-on message association user role of user in the embodiment of the present invention, therefore can be according to user in operation terminal input
Log-on message determine the role of user, then determined according to user role, action type, function type, type of service and asked
Ask whether data need to carry out desensitization process.
The embodiment for desensitizing whether is needed as a kind of possible determination data of the embodiment of the present invention, according to user angle
Color determines the authority in its certain type of service in selected certain action type belonged in certain function type, according to authority
It is determined that the sensitive grade of the data asked, determine asked data for corresponding authority whether needs according to sensitive grade
Carry out data desensitization.
If S23. requested data needs to carry out the desensitization process, corresponding data fuzzy algorithmic approach is matched, to asking
Ask data to carry out desensitization process, and desensitization result is sent to operation terminal.
If requested data need not carry out desensitization process, it is directly output to operate terminal, line number is entered if desired
According to desensitization, then matching data of the corresponding fuzzy algorithmic approach to being asked carries out Fuzzy Processing, then by the data output after desensitization
To operation terminal.
The fuzzy algorithmic approach of present embodiment is preferably but not limited to replace, resets, encrypts, blocking, mask, date skew take
It is whole, each fuzzy algorithmic approach principle with it is identical in embodiment 1, will not be described here.
Data obfuscation processing scheme can be refine to system each function by the embodiment of the present invention, and combine type of service
The characteristics of decide whether and how to carry out data protection.Such as:When needing batch to browse user profile, identification card number is entered
Row Fuzzy processing is protected;But when user needs to handle system of real name business, then ID card information is opened, to support corresponding industry
Business scene, so as to realize, for diversified business, function are using otherness data safety standard, improving the guarantor to sensitive data
Shield.
Embodiment 3
As shown in figure 3, a kind of data desensitization device is embodiments provided, including data obtaining module 11, judgement
Module 12 and desensitization module 13, data obtaining module 11 is used at least obtain log-on message, action type and the data of user please
Ask;Judge module 12 is used to determine whether requested data needs to carry out desensitization process according to user role, action type;Desensitization
Module 13 is entered for matching corresponding data fuzzy algorithmic approach when requested data needs to carry out desensitization process to requested data
Row desensitization process.
The embodiment of the present invention desensitizes data together with systemic-function architecture combined, synchronously complete when product function is planned
Into the planning of desensitisation regimens, and set corresponding desensitization method.The design of desensitization method has taken into full account the actual need of the system
Ask, using key elements such as user role, action types as optional desensitization parameter, it is achieved thereby that in the same of assuring data security
When, in turn ensure that the maximum of business information is readable.Change over derives the stage and does the tradition side that desensitizes in data inactivityization
Formula, focuses on being processed in the data obfuscation of application level.
Action type in the embodiment of the present invention at least includes business handling, batch query and derives data.
Fuzzy algorithmic approach in present embodiment preferably but be not limited only to replace, reset, encrypt, blocking, mask and date it is inclined
Pipette whole, each fuzzy algorithmic approach principle is as described in Example 1.
Used as the preferred embodiment of the embodiment of the present invention, data obtaining module 11 is except obtaining relevant user angle
Outside the parameter of color, action type and request of data, the function type and type of service parameter of user's selection can also be obtained, or
Other such as operate terminal type, using the parameter of department, and according to above-mentioned parameter determine asked data whether need into
Row desensitization process.If desired desensitize, the corresponding fuzzy algorithmic approach of 12 pairs of Data Matchings asked of judge module desensitizes to it
Process, then by the data output after desensitization.
As a kind of embodiment of the embodiment of the present invention, function type parameter or industry are carried in action type parameter
Service type parameter, or other specification, therefore, it can once get multiple authority assessment parameters.
Used as a kind of embodiment of the embodiment of the present invention, log-on message association user role, and user role are stored in
In data desensitization device, the security of subscriber identity information can either be guaranteed, user role can be determined by log-on message again.
Data desensitization device provided in an embodiment of the present invention, the data desensitization method provided with above-described embodiment has identical
Technical characteristic, so can also solve identical technical problem, reach identical technique effect.
Embodiment 4
As shown in figure 4, a kind of data desensitization system is embodiments provided, if including dry run terminal 2, Yi Jilian
The data as described in Example 3 desensitization device 1 of operation terminal 2 is connect, operates terminal 2 to be used for the operation information of receiving user's input
And the data of the display data desensitization output of device 1.
User is input into log-on message by operation terminal 2, and sends authentication request, number to the data desensitization device 1
According to desensitization device 1 user identity is verified according to authentication request, while determining user role, then obtain user and exist
Function type, action type, type of service that operation terminal 2 is selected, then determine the user in above-mentioned behaviour according to user role
Authority in work, it is then determined that sensitive grade of the requested data for the authority, if sensitive grade is zero, need not be carried out
Desensitization, requested data is directly output to operate terminal 2, corresponding according to specific grade matching if sensitive grade is not zero
Fuzzy algorithmic approach desensitization process is carried out to requested data, then by the data output after desensitization to operate terminal 2 shown.
Data desensitization system provided in an embodiment of the present invention, the data desensitization device 1 provided with above-described embodiment has phase
Same technical characteristic, so can also solve identical technical problem, reaches identical technique effect, will not be described here.
Data desensitization method, the computer program of apparatus and system that the embodiment of the present invention is provided, including storage
The computer-readable recording medium of program code, the instruction that described program code includes can be used to perform previous methods embodiments
Described in method, implement and can be found in embodiment of the method, will not be described here.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description
With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, be will not be described here.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase
Company ", " connection " should be interpreted broadly, for example, it may be being fixedly connected, or being detachably connected, or be integrally connected;Can
Being to be mechanically connected, or electrically connect;Can be joined directly together, it is also possible to be indirectly connected to by intermediary, Ke Yishi
The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
If the function is realized and as independent production marketing or when using using in the form of SFU software functional unit, can be with
In being stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention.
And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
In describing the invention, it should be noted that term " " center ", " on ", D score, "left", "right", " vertical ",
The orientation or position relationship of the instruction such as " level ", " interior ", " outward " be based on orientation shown in the drawings or position relationship, merely to
Be easy to description the present invention and simplify description, rather than indicate or imply indication device or element must have specific orientation,
With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.Additionally, term " first ", " second ",
" the 3rd " is only used for describing purpose, and it is not intended that indicating or implying relative importance.
Finally it should be noted that:Embodiment described above, specific embodiment only of the invention, to illustrate the present invention
Technical scheme, rather than a limitation, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this
It is bright to be described in detail, it will be understood by those within the art that:Any those familiar with the art
The invention discloses technical scope in, it still can modify to the technical scheme described in previous embodiment or can be light
Change is readily conceivable that, or equivalent is carried out to which part technical characteristic;And these modifications, change or replacement, do not make
The essence of appropriate technical solution departs from the spirit and scope of embodiment of the present invention technical scheme, should all cover the protection in the present invention
Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.
Claims (10)
1. a kind of data desensitization method, it is characterised in that comprise the following steps:
At least obtain user role, action type and request of data;
Determine whether requested data needs to carry out desensitization process according to the user role, the action type;
If requested data needs to carry out the desensitization process, match corresponding data fuzzy algorithmic approach is carried out to requested data
The desensitization process.
2. data desensitization method according to claim 1, it is characterised in that the action type is at least done including business
Reason, batch query and derivation data.
3. data desensitization method according to claim 1, it is characterised in that obtain the user role, operation except described
Outside type and request of data, function type and type of service that the user selects also are obtained, and according to the user role, institute
State action type, the function type and the type of service and determine whether asked data need to carry out desensitization process.
4. the data desensitization method according to any one of claim 1-3, it is characterised in that the data fuzzy algorithmic approach includes
Replace, reset, encrypting, blocking, mask and the date skew round at least two.
5. a kind of data desensitize device, it is characterised in that include:
Data obtaining module, at least obtaining user role, action type and request of data;
Judge module, for determining whether requested data needs to be desensitized according to the user role, the action type
Process;
Desensitization module, for when requested data needs to carry out the desensitization process, matching corresponding data fuzzy algorithmic approach pair
Requested data carries out the desensitization process.
6. data according to claim 5 desensitize device, it is characterised in that the action type is at least done including business
Reason, batch query and derivation data.
7. data according to claim 5 desensitize device, it is characterised in that described information acquisition module is additionally operable to obtain and uses
Function type and type of service that family selects, and according to the user role, the action type, the function type and described
Type of service determines whether asked data need to carry out desensitization process.
8. data according to claim 5 desensitize device, it is characterised in that the data fuzzy algorithmic approach includes replacing, weight
Arrange, encrypt, blocking, mask and the date skew round at least two.
9. the data desensitization device according to any one of claim 5-8, it is characterised in that user role association is logged in
Information, and the user role is stored in data desensitization device.
10. a kind of data desensitize system, it is characterised in that if including dry run terminal, and connect the operation terminal as
Data desensitization device described in any one of claim 5-9;
The operation terminal is used for the operation information of receiving user's input, and the number for showing the data desensitization device output
According to.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611224390.6A CN106611129A (en) | 2016-12-27 | 2016-12-27 | Data desensitization method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611224390.6A CN106611129A (en) | 2016-12-27 | 2016-12-27 | Data desensitization method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106611129A true CN106611129A (en) | 2017-05-03 |
Family
ID=58636133
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611224390.6A Pending CN106611129A (en) | 2016-12-27 | 2016-12-27 | Data desensitization method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106611129A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107315972A (en) * | 2017-06-01 | 2017-11-03 | 北京明朝万达科技股份有限公司 | A kind of dynamic desensitization method of big data unstructured document and system |
CN107609418A (en) * | 2017-08-31 | 2018-01-19 | 深圳市牛鼎丰科技有限公司 | Desensitization method, device, storage device and the computer equipment of text data |
CN108304725A (en) * | 2018-02-09 | 2018-07-20 | 山东汇贸电子口岸有限公司 | A kind of method and system to the desensitization of government data resource |
CN108664812A (en) * | 2018-05-14 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Information desensitization method, apparatus and system |
CN108681676A (en) * | 2018-04-03 | 2018-10-19 | 北京市商汤科技开发有限公司 | Data managing method and device, system, electronic equipment, program and storage medium |
CN109284631A (en) * | 2018-10-26 | 2019-01-29 | 中国电子科技网络信息安全有限公司 | A kind of document desensitization system and method based on big data |
CN109871711A (en) * | 2019-01-23 | 2019-06-11 | 中国海洋大学 | The shared distribution risk control model of ocean big data and method |
CN109981619A (en) * | 2019-03-13 | 2019-07-05 | 泰康保险集团股份有限公司 | Data capture method, device, medium and electronic equipment |
CN110019377A (en) * | 2017-12-14 | 2019-07-16 | 中国移动通信集团山西有限公司 | Dynamic desensitization method, device, equipment and medium |
CN110162993A (en) * | 2018-07-17 | 2019-08-23 | 腾讯科技(深圳)有限公司 | Desensitization process method, model training method, device and computer equipment |
CN110472434A (en) * | 2019-07-12 | 2019-11-19 | 北京字节跳动网络技术有限公司 | Data desensitization method, system, medium and electronic equipment |
CN110532797A (en) * | 2019-07-24 | 2019-12-03 | 方盈金泰科技(北京)有限公司 | The desensitization method and system of big data |
WO2020165756A1 (en) * | 2019-02-15 | 2020-08-20 | International Business Machines Corporation | Secure, multi-level access to obfuscated data for analytics |
CN111859448A (en) * | 2020-07-02 | 2020-10-30 | 合肥森亿智能科技有限公司 | Data export auditing method, system and terminal based on role authority setting |
CN113157902A (en) * | 2020-12-24 | 2021-07-23 | 中国能源建设股份有限公司 | Inquiry mode for completing information desensitization examination and approval by utilizing multiple information means |
CN113610623A (en) * | 2021-07-21 | 2021-11-05 | 深圳天源新能源股份有限公司 | Photovoltaic pumping system payment method, server and photovoltaic pumping inverter |
CN114722412A (en) * | 2022-04-15 | 2022-07-08 | 北京科杰科技有限公司 | Data security storage method and device, electronic equipment and storage medium |
CN115080987A (en) * | 2021-03-11 | 2022-09-20 | 中国移动通信集团山东有限公司 | Password management method, device, system, storage medium and computer equipment |
CN115277047A (en) * | 2022-05-31 | 2022-11-01 | 明珠数字科技股份有限公司 | Message desensitization method, system and storage medium based on Spring Cloud Gateway |
CN115277099A (en) * | 2022-06-29 | 2022-11-01 | 锦图计算技术(深圳)有限公司 | Function security method based on Android system and related equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106203170A (en) * | 2016-07-19 | 2016-12-07 | 北京同余科技有限公司 | The Database Dynamic desensitization method of servicing of based role and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
-
2016
- 2016-12-27 CN CN201611224390.6A patent/CN106611129A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106203170A (en) * | 2016-07-19 | 2016-12-07 | 北京同余科技有限公司 | The Database Dynamic desensitization method of servicing of based role and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107315972A (en) * | 2017-06-01 | 2017-11-03 | 北京明朝万达科技股份有限公司 | A kind of dynamic desensitization method of big data unstructured document and system |
CN107609418A (en) * | 2017-08-31 | 2018-01-19 | 深圳市牛鼎丰科技有限公司 | Desensitization method, device, storage device and the computer equipment of text data |
CN107609418B (en) * | 2017-08-31 | 2019-12-10 | 深圳市牛鼎丰科技有限公司 | Desensitization method and device of text data, storage device and computer device |
CN110019377A (en) * | 2017-12-14 | 2019-07-16 | 中国移动通信集团山西有限公司 | Dynamic desensitization method, device, equipment and medium |
CN110019377B (en) * | 2017-12-14 | 2021-10-26 | 中国移动通信集团山西有限公司 | Dynamic desensitization method, device, equipment and medium |
CN108304725A (en) * | 2018-02-09 | 2018-07-20 | 山东汇贸电子口岸有限公司 | A kind of method and system to the desensitization of government data resource |
CN108681676A (en) * | 2018-04-03 | 2018-10-19 | 北京市商汤科技开发有限公司 | Data managing method and device, system, electronic equipment, program and storage medium |
CN108664812A (en) * | 2018-05-14 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Information desensitization method, apparatus and system |
CN110162993B (en) * | 2018-07-17 | 2024-01-05 | 腾讯科技(深圳)有限公司 | Desensitization processing method, model training device and computer equipment |
CN110162993A (en) * | 2018-07-17 | 2019-08-23 | 腾讯科技(深圳)有限公司 | Desensitization process method, model training method, device and computer equipment |
CN109284631A (en) * | 2018-10-26 | 2019-01-29 | 中国电子科技网络信息安全有限公司 | A kind of document desensitization system and method based on big data |
CN109871711A (en) * | 2019-01-23 | 2019-06-11 | 中国海洋大学 | The shared distribution risk control model of ocean big data and method |
CN109871711B (en) * | 2019-01-23 | 2021-06-25 | 中国海洋大学 | Ocean big data sharing and distributing risk control model and method |
WO2020165756A1 (en) * | 2019-02-15 | 2020-08-20 | International Business Machines Corporation | Secure, multi-level access to obfuscated data for analytics |
GB2595167A (en) * | 2019-02-15 | 2021-11-17 | Ibm | Secure, multi-level access to obfuscated data for analytics |
US11416633B2 (en) | 2019-02-15 | 2022-08-16 | International Business Machines Corporation | Secure, multi-level access to obfuscated data for analytics |
CN109981619A (en) * | 2019-03-13 | 2019-07-05 | 泰康保险集团股份有限公司 | Data capture method, device, medium and electronic equipment |
CN110472434B (en) * | 2019-07-12 | 2021-09-14 | 北京字节跳动网络技术有限公司 | Data desensitization method, system, medium, and electronic device |
CN110472434A (en) * | 2019-07-12 | 2019-11-19 | 北京字节跳动网络技术有限公司 | Data desensitization method, system, medium and electronic equipment |
CN110532797A (en) * | 2019-07-24 | 2019-12-03 | 方盈金泰科技(北京)有限公司 | The desensitization method and system of big data |
CN111859448A (en) * | 2020-07-02 | 2020-10-30 | 合肥森亿智能科技有限公司 | Data export auditing method, system and terminal based on role authority setting |
CN113157902A (en) * | 2020-12-24 | 2021-07-23 | 中国能源建设股份有限公司 | Inquiry mode for completing information desensitization examination and approval by utilizing multiple information means |
CN115080987A (en) * | 2021-03-11 | 2022-09-20 | 中国移动通信集团山东有限公司 | Password management method, device, system, storage medium and computer equipment |
CN113610623A (en) * | 2021-07-21 | 2021-11-05 | 深圳天源新能源股份有限公司 | Photovoltaic pumping system payment method, server and photovoltaic pumping inverter |
CN114722412A (en) * | 2022-04-15 | 2022-07-08 | 北京科杰科技有限公司 | Data security storage method and device, electronic equipment and storage medium |
CN114722412B (en) * | 2022-04-15 | 2023-04-07 | 北京科杰科技有限公司 | Data secure storage method and device, electronic equipment and storage medium |
CN115277047A (en) * | 2022-05-31 | 2022-11-01 | 明珠数字科技股份有限公司 | Message desensitization method, system and storage medium based on Spring Cloud Gateway |
CN115277099A (en) * | 2022-06-29 | 2022-11-01 | 锦图计算技术(深圳)有限公司 | Function security method based on Android system and related equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106611129A (en) | Data desensitization method, device and system | |
CA2766491C (en) | A method and system for securely and automatically downloading a master key in a bank card payment system | |
CN102831529B (en) | A kind of commodity information identification method based on radio frequency and system | |
US11418499B2 (en) | Password security | |
CN107871081A (en) | A kind of computer information safe system | |
CN106063182A (en) | Electronic signing methods, systems and apparatus | |
CN104794388B (en) | application program access protection method and application program access protection device | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN105635168B (en) | A kind of application method of offline transaction device and its security key | |
US8156548B2 (en) | Identification and authentication system and method | |
CN105827582B (en) | A kind of communication encrypting method, device and system | |
CN108768963A (en) | The communication means and system of trusted application and safety element | |
CN104021332A (en) | Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey | |
CN103220141A (en) | Sensitive data protecting method and system based on group key strategy | |
CN108494783A (en) | The guard method of high in the clouds data | |
CN106355418A (en) | Anti-counterfeiting authentication method based on NFC tag | |
CN103152425A (en) | Safety management system for mobile device based on cloud technology | |
CN105791277A (en) | Identity authentication method | |
CN108965291A (en) | Registration login method, system and the computer equipment of mixed application | |
CN109033784A (en) | Identity identifying method and device in a communication network | |
CN109214221A (en) | A kind of identity card reader verification method, host computer and identity card reader | |
CN108460597A (en) | A kind of key management system and method | |
CN111046405A (en) | Data processing method, device, equipment and storage medium | |
CN106713372B (en) | A kind of method of controlling security and safety control system based on permission control | |
CN117332391A (en) | Power distribution network data asset security access method and system considering authority hierarchical management and control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |
|
RJ01 | Rejection of invention patent application after publication |