CN107180200A - Data file customizable desensitization method and system - Google Patents
Data file customizable desensitization method and system Download PDFInfo
- Publication number
- CN107180200A CN107180200A CN201710262559.5A CN201710262559A CN107180200A CN 107180200 A CN107180200 A CN 107180200A CN 201710262559 A CN201710262559 A CN 201710262559A CN 107180200 A CN107180200 A CN 107180200A
- Authority
- CN
- China
- Prior art keywords
- file
- data
- desensitization
- xml
- configuration file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention belongs to information security field there is provided a kind of data file customizable desensitization method and system, wherein system includes:Sensitive information setting unit, being set for system operators needs child node to be protected and desensitization method name in data file under default situations;Format converter, for convert file formats;Data processing unit, for preserving desensitization function, verifies default configuration file integrality, and according to the desensitization rules modification XML file preserved in interim desensitization configuration file;Resolver, for parsing XML file;Desensitize rules customization unit, for setting interim desensitization configuration file.Simultaneously the invention discloses a kind of method, data processing unit obtains the document object and interim desensitization configuration file of XML document, and changes this document object according to DOM characteristics and node path.The present invention realizes the protection to sensitive data in data file, meets data user of service to the demand that can be desensitized during different third party's shared datas to being customized of sensitive data.
Description
Technical field
The invention belongs to information security field, it is related to the sensitive information desensitization protection technique in a kind of file to data type,
Specifically a kind of data file customizable desensitization method and system.
Background technology
In recent years along with the high speed development of internet, internet is also more and more closer with contacting for personal lifestyle.This is not
Traversal in life is only brought to user, enables people to carry out browsing webpage, inquiry problem, purchase commodity anywhere or anytime
Deng operation, while also making user generate the substantial amounts of behavioral data about individual privacy, these data are due to government regulation, business
It will be issued the need for industry purpose or research or be supplied to third party to use.These issues or shared data include user
Sensitive information, if data owner can cause substantial amounts of individual privacy to reveal, give directly by these data publications or shared
User, relate to thing unit and society brings ill effect;If the mode of data owner's improper use simultaneously is to sensitive data
Any processing is carried out, may make data consumer that data are carried out with the analysis of mistake, so that data consumer makes mistake
Decision-making, cause huge economic loss.
In order to prevent data publication and it is shared when reveal privacy information, have been proposed so far using anonymization
Mode is protected to data.According to incompletely statistics, at present on data publication and it is shared when data safety invention document
Have following.
1. the mixing randomization method for secret protection of social network data issue:This invention by the anonymous methods of existing K- and with
The method of machine is combined, and can be prevented to attack using the reorientation of structural context knowledge, be met social network user and privacy is pacified
Full demand.
2. the track based on frequency suppresses the system and method for data publication secret protection:This invention is according to data publication
Intimacy protection system, the method that locally suppressed using specific track carries out anonymous processing.
3. a kind of social network diagram data publication method for secret protection of optimization:This invention is hidden according to the data publication of proposition
The data that private guard method is issued to social networks carry out secret protection processing.
4. a kind of data publication method and device:This invention is clustered data to be released according to the attribute of known class
The classification of the attribute of data to be released is obtained after processing, then corresponding dissemination method is sent out according to the classification of different attribute
Cloth data to be released, secret protection is provided so as to the issue for data to be released.
More than invent, the data of data user of service operation are source datas, and the data after processing are directly issued or
Share to third party, it is impossible to the data protection demand when attacker is internal system data user of service is met, while also not
The demand that data user of service carries out different degrees of protection to the data shared to different grades of third party can be met.
The content of the invention
The technical assignment of the present invention is to be directed to above-mentioned the deficiencies in the prior art, in order to realize data user of service in different numbers
According to the safety of the sensitive data in usage scenario, even if while ensureing internal data user of service to initial data without any
Operation, can not obtaining the high data of some susceptibilitys, there is provided a kind of data file customizable desensitization method and system.
In order to realize above-mentioned target, the present invention is adopted the following technical scheme that.
1st, data file customizable desensitization system, it is characterised in that:System includes sensitive information setting unit(1), solution
Parser(2), format converter(3), data processing unit(4), desensitize rules customization unit(5);
Sensitive information setting unit(1):Initialization desensitization is carried out for system operators to the data file newly received to set,
Set to be directed under the data file default situations and need child node to be protected and the corresponding desensitization method name of the child node;
Resolver(2):For parsing XML file, obtain representing the document object of this XML file;
Format converter(3):Document format data for data to be provided to personnel's offer is converted to XML file format, simultaneously
Chosen whether to enter the file of output row format conversion by data user of service;
Data processing unit(4):For preserving desensitization function, the integrality of default configuration file is verified, acquisition represents XML file
Document object and interim desensitization configuration file, and according to the desensitization rules modification document pair preserved in interim desensitization configuration file
As most content writes back XML file in document object at last;
Desensitize rules customization unit(5):Default configuration file for showing the XML file, while for data user of service
Interim desensitization configuration file is set.
2nd, the sensitive information setting unit to the data file newly received initialize and taken off for system operators
It is quick to set, then configuration information is stored in default configuration file;Sensitive information setting unit is by the default configuration file
Content array is turned to after character string, and character string is calculated by setting hashing algorithm, then by XML file name and the hash
Character string is preserved in hashed value log file within the storage system.
3rd, the data processing unit reads the default configuration text of the XML file that data user of service selects in storage system
Part, if there is no the default configuration file, then give a warning prompting XML file no initializtion setting;Otherwise acquiescence is matched somebody with somebody
Put file and carry out integrity verification.
4th, the data processing unit is used for the document object and the configuration file that desensitizes temporarily for obtaining representing XML file, and
According to the content in interim desensitization configuration file, path is generated, and the sensitive data in document object is repaiied according to path
Change, document object content is finally write back into XML file.In store data user of service's sets in wherein interim desensitization configuration file
The default configuration information that confidence is ceased and system operators are set.
5th, the desensitization rules customization unit is used to read and show the content in default configuration file, while for data
User of service sets interim desensitization configuration file.Wherein, data user of service cannot be by the rules customization unit that desensitizes to being
The default configuration information of system operating personnel is modified.
6th, the data file transition that the format converter is used for the non-XML file format for providing personnel's offer by data is
XML file format, while the XML file after data processing unit is handled is converted to the data lattice of data user of service selection
Formula.
7th, data file customizable desensitization system, sensitive information setting unit(1), resolver(2), format converter
(3), data processing unit(4), desensitize rules customization unit(5);(2)With(4)It is connected,(3)With(4)It is connected,(4)With(5)Phase
Even.
8th, data file customizable desensitization method, it is characterised in that method includes two stages.
(1)The Initialize installation stage:
The first step:Data provide personnel and submit data file, and format converter judges whether this data file is XML file lattice
Data file, if XML file format, is then directly stored in storage system by formula;Otherwise, format converter is literary by this data
Part is converted in data file deposit storage system after XML file format;
Second step:System operators carry out initialization desensitization to the data file newly received and set;
System operators operate sensitive information setting unit, and set needs child node to be protected and the sub- section under default situations
The corresponding desensitization method name of point.Sensitive information setting unit preserves configuration information default configuration file within the storage system
In;Sensitive information setting unit turns to content array in default configuration file after character string, and character string is calculated by setting hash
Method is calculated, and then preserves XML file name and the hash character string in hashed value log file within the storage system.
(2)The data manipulation stage:Data user of service selects the XML files to be operated, and is set to S, and desensitization system is from storage
The XML file S are read in system, and following operation is done for this XML file S:
Step 1:Data processing unit reads the default configuration file of file S in storage system, if there is no default configuration text
Part, the then prompting XML file S no initializtions that give a warning are set;Otherwise content array in default configuration file is turned into character string
Afterwards, character string is calculated by setting hashing algorithm, then according to XML file S in hashed value log file within the storage system
Filename lookup and take out corresponding hashed value, two hashed values are compared, verify integrality, if the two is differed
Then verify and do not pass through, point out mistake, continue if the two is completely the same;
Step 2:Resolver parses XML file S, obtains representing XML file S document object, i.e. Document objects, is set to
W;
Step 3:The rules customization unit that desensitizes reads the default configuration file of the file S in storage system, and shows default configuration
All father nodes, child node, desensitized state and corresponding optional desensitization function in file, while desensitized state is labeled as
The field of "Yes" is shown as needing to desensitize and the inadvisable state that disappears, and by desensitizing, rules customization unit is configured, and is tied setting
Really it is stored in interim desensitization configuration file, and goes to step 4 and continues executing with;
Step 4:Data processing unit judges whether also have next line data in interim desensitization configuration file, if there is next line
Data, go to step 5 and continue executing with;If there is no next line data, go to step 7 and continue executing with;
Step 5:If this journey is the i-th row, obtains in interim desensitization configuration file the desensitized state of the i-th row and be defined as t, if t
For "No", then directly go to step 4 and continue executing with;Otherwise, the desensitization function F of the i-th row in interim desensitization configuration file is taken out, so
The father node for taking out the i-th row in interim desensitization configuration file afterwards is defined as a, and child node is defined as b, and node road is obtained according to a and b
Footpath d="/a/b " obtains the child node collection D corresponding to node path d in document object W(Specific method professional can compile
Cheng Shixian, will not be described here), go to step 6 and continue executing with;
Step 6:Judge to whether there is next child node in child node collection D, if it does, take out the child node and be defined as s,
Child node s data m is taken out, carrying out desensitization process to m using desensitization function F obtains M, i.e. M=F(m), child node s is replaced with M
In data value m, and go to step 6 and continue executing with;If next sub- node is not present in data set D, step 4 is gone to
Continue executing with;
Step 7:The document object W contents of desensitization are write back into XML file S, document object W is deleted, XML file is submitted into form
Converter;
Step 8:Format converter obtains the output file form that data user of service needs, and format converter turns XML file S
It is changed to output data file after corresponding file format.
The present invention is a kind of data file customizable desensitization method and system.Have compared with prior art following prominent
Advantage.
1. system operators can set special default configuration file for each XML file, it is ensured that to each
The different protections of XML file content.
2. in the case where not changing the corresponding default configuration file of XML file, data user of service can be to XML file
Being customized desensitization is set, and meets data safety demand of the data user of service under different pieces of information usage scenario.
3. for user and developer, to service data manipulating without the concern for the desensitization process to data, institute
Some desensitization operations are transparent to application layer developer and user.
Brief description of the drawings
Fig. 1 is data file customizable desensitization method of the present invention and the structure chart of system.
Fig. 2 is the flow chart that the XML file that desensitization system of the present invention is selected data user of service carries out desensitization process.
Fig. 3 is the storage format exemplary plot of default configuration file in the present invention.
Fig. 4 is the storage format exemplary plot of interim desensitization configuration file in the present invention.
Fig. 5 is the storage format exemplary plot of hashed value log file in the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.Fig. 1 is the structure chart of system, main to include number
According to processing unit, sensitive information setting unit, resolver, format converter and desensitization rules customization unit, wherein default configuration
File is stored within the storage system.Fig. 2 is the stream that the XML file that desensitization system is selected data user of service carries out desensitization process
Cheng Tu, the step of specific steps are by the data below operational phase is realized;Fig. 3 is the storage format example of default configuration file
Figure, the default configuration information set for storage system operation personnel.Fig. 4 is the storage format example of interim desensitization configuration file
Figure, judges whether XML file interior joint data are sensitive datas for data processing unit.Fig. 5 is hashed value log file
Storage format exemplary plot, it is literary to the corresponding default configuration of the XML file with according to setting hashing algorithm for storing XML file name
Part carries out hash and calculates obtained hashed value.
The Initialize installation stage.
The first step:Data provide personnel and submit data file, and format converter judges whether this data file is XML file
Data file, if XML file format, is then directly stored in storage system by form;Otherwise, format converter is by this data
File is converted in data file deposit storage system after XML file format.
Second step:System operators carry out initialization desensitization to the data file newly received and set, system operators
Sensitive information setting unit is operated, set needs child node to be protected and the corresponding desensitization method of the child node under default situations
Name.Configuration information is preserved in the default configuration file of the XML file within the storage system.
3rd step:Sensitive information setting unit turns to content array in default configuration file after character string, by character string
Calculated by setting hashing algorithm, the hashed value for then preserving XML file name and the hash character string within the storage system is remembered
Record in file.
The data manipulation stage.
The first step:Data user of service selects the XML file to be operated, and is set to S, and desensitization system is read from storage system
XML file S.
Second step:Data processing unit reads the default configuration file of XML file S in storage system, if there is no silent
Recognize configuration file, then the prompting XML file S no initializtions that give a warning are set;Otherwise by content array in default configuration file
After character string, character string is calculated by setting hashing algorithm.
3rd step:In the hashed value log file of data processing unit within the storage system according to S filename lookup simultaneously
Corresponding hashed value is taken out, two hashed values are compared, integrality is verified, verifies and do not pass through if the two is differed,
Mistake is pointed out, is continued if the two is completely the same.
4th step:Resolver parses XML file S, obtains representing this XML file S document object W, i.e., Document couples
As being set to W.
5th step:The rules customization unit that desensitizes reads the default configuration file of the XML file in storage system, and shows silent
Father nodes all in configuration file, child node, desensitized state and corresponding optional desensitization function are recognized, while by desensitized state mark
The node for being designated as "Yes" is shown as desensitization and the inadvisable state that disappears.
6th step:Data user of service is set by the rules customization unit that desensitizes, and result will be set to be stored in interim desensitization
In configuration file.
7th step:Data processing unit judges whether interim desensitization configuration file also has next line data, if there is under
Data line, goes to the 8th step and continues executing with;Otherwise the tenth step is gone to continue executing with.
8th step:If this journey is the i-th row in desensitization configuration file temporarily, obtains the desensitized state of the i-th row and be defined as t,
If t is "No", directly goes to the 7th step and continue executing with;Otherwise, the desensitization function F of the i-th row is taken out, the i-th row is then taken out
Father node be defined as a, child node is defined as b, according to a and b obtain node path d="/a/b ", in document object W obtain
Child node collection D corresponding to node path d(Specific method professional may be programmed and realize, will not be described here), go to the 9th
Step is continued executing with.
9th step:Judge to whether there is next child node in child node collection D, if it does, taking out the child node and fixed
Justice is s, takes out child node s data m, and carrying out desensitization process to m using desensitization function F obtains M, i.e. M=F(m), son is replaced with M
Data value m in node s, and go to the 9th step and continue executing with;If next sub- node is not present in data set D, go to
7th step is continued executing with.
Tenth step:The document object W contents of desensitization are write back XML file S by data processing unit, delete document object W, and
XML file submits to format converter.
11st step:Format converter obtains the file format that data users of service needs to export, and format converter is by XML
File S is converted to output data file after corresponding file format.
Claims (8)
- The system 1. data file customizable desensitizes, it is characterised in that:System includes sensitive information setting unit(1), resolver (2), format converter(3), data processing unit(4), desensitize rules customization unit(5);Sensitive information setting unit(1):Initialization desensitization is carried out for system operators to the data file newly received to set, Set to be directed under the data file default situations and need child node to be protected and the corresponding desensitization method name of the child node;Resolver(2):For parsing XML file, obtain representing the document object of this XML file;Format converter(3):Document format data for data to be provided to personnel's offer is converted to XML file format, simultaneously Chosen whether to enter the file of output row format conversion by data user of service;Data processing unit(4):For preserving desensitization function, the integrality of default configuration file is verified, acquisition represents XML file Document object and interim desensitization configuration file, and according to the desensitization rules modification document pair preserved in interim desensitization configuration file As most content writes back XML file in document object at last;Desensitize rules customization unit(5):Default configuration file for showing the XML file, while for data user of service Interim desensitization configuration file is set.
- The system 2. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:The sensitive information setting unit is used for system operators and initialization desensitization setting is carried out to the data file newly received, Then configuration information is stored in default configuration file;Sensitive information setting unit is by content array in the default configuration file Turn to after character string, character string is calculated by setting hashing algorithm, then protect XML file name and the hash character string Deposit in hashed value log file within the storage system.
- The system 3. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:The data processing unit reads the default configuration file of the XML file that data user of service selects in storage system, such as The default configuration file is not present in fruit, then give a warning prompting XML file no initializtion setting;Otherwise by default configuration file Carry out integrity verification.
- The system 4. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:The data processing unit is used for the document object for obtaining representing XML file and interim desensitization configuration file, and according to facing When desensitization configuration file in content, generate path, and the sensitive data in document object modified according to path, finally Document object content is write back into XML file, wherein temporarily desensitization configuration file in store data user of service configuration information The default configuration information set with system operators.
- The system 5. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:The desensitization rules customization unit is used to read and show the content in default configuration file, while for data user Member sets interim desensitization configuration file, wherein, data user of service cannot be by the rules customization unit that desensitizes to system operatio The default configuration information of personnel is modified.
- The system 6. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:It is XML texts that the format converter, which is used to provide the data file transition for the non-XML file format that personnel provide by data, Part form, while the XML file after data processing unit is handled is converted to the data format of data user of service selection.
- The system 7. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:Data file customizable desensitization system, sensitive information setting unit(1), resolver(2), format converter(3), data Processing unit(4), desensitize rules customization unit(5);(2)With(4)It is connected,(3)With(4)It is connected,(4)With(5)It is connected.
- 8. data file customizable desensitization method, it is characterised in that method includes two stages:(1)The Initialize installation stage:The first step:Data provide personnel and submit data file, and format converter judges whether this data file is XML file lattice Data file, if XML file format, is then directly stored in storage system by formula;Otherwise, format converter is literary by this data Part is converted in data file deposit storage system after XML file format;Second step:System operators carry out initialization desensitization to the data file newly received and set;System operators operate sensitive information setting unit, and set needs child node to be protected and the sub- section under default situations The corresponding desensitization method name of point;3rd step:Sensitive information setting unit preserves configuration information in default configuration file within the storage system;Sensitivity letter Breath setting unit turns to content array in default configuration file after character string, character string is calculated by setting hashing algorithm, so XML file name and the hash character string are preserved in hashed value log file within the storage system afterwards;(2)The data manipulation stage:Data user of service selects the XML files to be operated, and is set to S, and desensitization system is from storage system Middle reading XML file S, and do following operation for this XML file S:Step 1:Data processing unit reads the default configuration file of file S in storage system, if there is no default configuration text Part, the then prompting XML file S no initializtions that give a warning are set;Otherwise content array in default configuration file is turned into character string Afterwards, character string is calculated by setting hashing algorithm, then according to XML file S in hashed value log file within the storage system Filename lookup and take out corresponding hashed value, two hashed values are compared, verify integrality, if the two is differed Then verify and do not pass through, point out mistake, continue if the two is completely the same;Step 2:Resolver parses XML file S, obtains representing XML file S document object, i.e. Document objects, is set to W;Step 3:The rules customization unit that desensitizes reads the default configuration file of the file S in storage system, and shows default configuration All father nodes, child node, desensitized state and corresponding optional desensitization function in file, while desensitized state is labeled as The field of "Yes" is shown as needing to desensitize and the inadvisable state that disappears, and by desensitizing, rules customization unit is configured, and is tied setting Really it is stored in interim desensitization configuration file, and goes to step 4 and continues executing with;Step 4:Data processing unit judges whether also have next line data in interim desensitization configuration file, if there is next line Data, go to step 5 and continue executing with;If there is no next line data, go to step 7 and continue executing with;Step 5:If this journey is the i-th row, obtains in interim desensitization configuration file the desensitized state of the i-th row and be defined as t, if t For "No", then directly go to step 4 and continue executing with;Otherwise, the desensitization function F of the i-th row in interim desensitization configuration file is taken out, so The father node for taking out the i-th row in interim desensitization configuration file afterwards is defined as a, and child node is defined as b, and node road is obtained according to a and b Footpath d="/a/b " obtains the child node collection D corresponding to node path d in document object W(Specific method professional can compile Cheng Shixian, will not be described here), go to step 6 and continue executing with;Step 6:Judge to whether there is next child node in child node collection D, if it does, take out the child node and be defined as s, Child node s data m is taken out, carrying out desensitization process to m using desensitization function F obtains M, i.e. M=F(m), child node s is replaced with M In data value m, and go to step 6 and continue executing with;If next sub- node is not present in data set D, step 4 is gone to Continue executing with;Step 7:The document object W contents of desensitization are write back into XML file S, document object W is deleted, XML file is submitted into form Converter;Step 8:Format converter obtains the output file form that data user of service needs, and format converter turns XML file S It is changed to output data file after corresponding file format.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710262559.5A CN107180200B (en) | 2017-04-20 | 2017-04-20 | Customizable desensitization method and system for data files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710262559.5A CN107180200B (en) | 2017-04-20 | 2017-04-20 | Customizable desensitization method and system for data files |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107180200A true CN107180200A (en) | 2017-09-19 |
CN107180200B CN107180200B (en) | 2020-06-09 |
Family
ID=59832047
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710262559.5A Active CN107180200B (en) | 2017-04-20 | 2017-04-20 | Customizable desensitization method and system for data files |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107180200B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109190405A (en) * | 2018-09-03 | 2019-01-11 | 佛山科学技术学院 | A kind of government affairs big data desensitization process method and device |
CN109190404A (en) * | 2018-07-18 | 2019-01-11 | 安徽云图信息技术有限公司 | A kind of data desensitization system |
WO2019134339A1 (en) * | 2018-01-03 | 2019-07-11 | 平安科技(深圳)有限公司 | Desensitization method and procedure, application server and computer readable storage medium |
CN110210009A (en) * | 2018-02-28 | 2019-09-06 | 中兴通讯股份有限公司 | Annotation process method, device and equipment, computer readable storage medium |
CN110222282A (en) * | 2019-04-17 | 2019-09-10 | 深圳壹账通智能科技有限公司 | Data processing method, device, server and storage medium |
CN110348239A (en) * | 2019-06-13 | 2019-10-18 | 平安普惠企业管理有限公司 | Desensitize regular configuration method and data desensitization method, system, computer equipment |
CN110443058A (en) * | 2018-05-02 | 2019-11-12 | 中兴通讯股份有限公司 | A kind of method and device of XML document desensitization |
CN111291410A (en) * | 2020-02-13 | 2020-06-16 | 支付宝(杭州)信息技术有限公司 | Desensitization processing method and device for electronic document |
CN113434908A (en) * | 2021-08-30 | 2021-09-24 | 四川新网银行股份有限公司 | Data desensitization method based on Logback log component |
CN113591150A (en) * | 2021-08-03 | 2021-11-02 | 浙江图盛输变电工程有限公司温州科技分公司 | Desensitization processing method for sensitive data |
CN114866532A (en) * | 2022-04-25 | 2022-08-05 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
CN115114669A (en) * | 2022-08-23 | 2022-09-27 | 山东双仁信息技术有限公司 | Interactive content desensitization method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070110224A1 (en) * | 2005-11-14 | 2007-05-17 | Accenture Global Services Gmbh | Data masking application |
US20080133934A1 (en) * | 2006-10-10 | 2008-06-05 | Infosys Technologies Ltd. | Configurable data masking for software testing |
US20090254572A1 (en) * | 2007-01-05 | 2009-10-08 | Redlich Ron M | Digital information infrastructure and method |
US20140123303A1 (en) * | 2012-10-31 | 2014-05-01 | Tata Consultancy Services Limited | Dynamic data masking |
US20140310231A1 (en) * | 2013-04-16 | 2014-10-16 | Cognizant Technology Solutions India Pvt. Ltd. | System and method for automating data warehousing processes |
CN104572122A (en) * | 2015-01-28 | 2015-04-29 | 中国工商银行股份有限公司 | Software application data generating device and method |
CN106203170A (en) * | 2016-07-19 | 2016-12-07 | 北京同余科技有限公司 | The Database Dynamic desensitization method of servicing of based role and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
CN106529329A (en) * | 2016-10-11 | 2017-03-22 | 中国电子科技网络信息安全有限公司 | Desensitization system and desensitization method used for big data |
-
2017
- 2017-04-20 CN CN201710262559.5A patent/CN107180200B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070110224A1 (en) * | 2005-11-14 | 2007-05-17 | Accenture Global Services Gmbh | Data masking application |
US20080133934A1 (en) * | 2006-10-10 | 2008-06-05 | Infosys Technologies Ltd. | Configurable data masking for software testing |
US20090254572A1 (en) * | 2007-01-05 | 2009-10-08 | Redlich Ron M | Digital information infrastructure and method |
US20140123303A1 (en) * | 2012-10-31 | 2014-05-01 | Tata Consultancy Services Limited | Dynamic data masking |
US20140310231A1 (en) * | 2013-04-16 | 2014-10-16 | Cognizant Technology Solutions India Pvt. Ltd. | System and method for automating data warehousing processes |
CN104572122A (en) * | 2015-01-28 | 2015-04-29 | 中国工商银行股份有限公司 | Software application data generating device and method |
CN106203170A (en) * | 2016-07-19 | 2016-12-07 | 北京同余科技有限公司 | The Database Dynamic desensitization method of servicing of based role and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
CN106529329A (en) * | 2016-10-11 | 2017-03-22 | 中国电子科技网络信息安全有限公司 | Desensitization system and desensitization method used for big data |
Non-Patent Citations (3)
Title |
---|
焦伟 等: ""测试数据脱敏技术框架的研究与探讨"", 《中国金融电脑》 * |
臧昊 等: ""基于XML的电子病历隐私数据脱敏技术的研究与设计"", 《信息技术与信息化》 * |
陈天莹 等: ""大数据环境下的智能数据脱敏系统"", 《通信技术》 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019134339A1 (en) * | 2018-01-03 | 2019-07-11 | 平安科技(深圳)有限公司 | Desensitization method and procedure, application server and computer readable storage medium |
CN110210009A (en) * | 2018-02-28 | 2019-09-06 | 中兴通讯股份有限公司 | Annotation process method, device and equipment, computer readable storage medium |
CN110443058A (en) * | 2018-05-02 | 2019-11-12 | 中兴通讯股份有限公司 | A kind of method and device of XML document desensitization |
CN109190404A (en) * | 2018-07-18 | 2019-01-11 | 安徽云图信息技术有限公司 | A kind of data desensitization system |
CN109190405A (en) * | 2018-09-03 | 2019-01-11 | 佛山科学技术学院 | A kind of government affairs big data desensitization process method and device |
CN110222282A (en) * | 2019-04-17 | 2019-09-10 | 深圳壹账通智能科技有限公司 | Data processing method, device, server and storage medium |
CN110348239A (en) * | 2019-06-13 | 2019-10-18 | 平安普惠企业管理有限公司 | Desensitize regular configuration method and data desensitization method, system, computer equipment |
CN110348239B (en) * | 2019-06-13 | 2023-10-27 | 张建军 | Desensitization rule configuration method, data desensitization method, system and computer equipment |
CN111291410B (en) * | 2020-02-13 | 2021-09-07 | 支付宝(杭州)信息技术有限公司 | Desensitization processing method and device for electronic document |
CN111291410A (en) * | 2020-02-13 | 2020-06-16 | 支付宝(杭州)信息技术有限公司 | Desensitization processing method and device for electronic document |
CN113591150A (en) * | 2021-08-03 | 2021-11-02 | 浙江图盛输变电工程有限公司温州科技分公司 | Desensitization processing method for sensitive data |
CN113591150B (en) * | 2021-08-03 | 2024-04-26 | 浙江图盛输变电工程有限公司温州科技分公司 | Desensitization processing method for sensitive data |
CN113434908A (en) * | 2021-08-30 | 2021-09-24 | 四川新网银行股份有限公司 | Data desensitization method based on Logback log component |
CN114866532A (en) * | 2022-04-25 | 2022-08-05 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
CN114866532B (en) * | 2022-04-25 | 2023-11-10 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
CN115114669A (en) * | 2022-08-23 | 2022-09-27 | 山东双仁信息技术有限公司 | Interactive content desensitization method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107180200B (en) | 2020-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107180200A (en) | Data file customizable desensitization method and system | |
US7730011B1 (en) | Attributes of captured objects in a capture system | |
CN108133008B (en) | Method, device, equipment and storage medium for processing service data in database | |
WO2018041066A1 (en) | Data processing method, apparatus and system based on block chain technology | |
EP3012754B1 (en) | Searchable symmetric encryption processing system | |
CN1776701B (en) | Techniques for defining, using and manipulating rights management data structures | |
CN102541995B (en) | To index and the inquiry of hash sequence matrix | |
US20170277773A1 (en) | Systems and methods for secure storage of user information in a user profile | |
CA3184248A1 (en) | Document processing and response generation system | |
US9940459B1 (en) | Methods and devices for detection of malware | |
CN103703459A (en) | Method and system for text message normalization based on character transformation and unsupervised of web data | |
CN107423632A (en) | Customizable sensitive data desensitization method and system | |
CN109522328B (en) | Data processing method and device, medium and terminal thereof | |
JP2009252145A (en) | Data creating apparatus and data creating method | |
JP2011081030A (en) | Searchable color-encoded file-composing method and searchable color-encoded file system | |
Mihajloska et al. | Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3 | |
CN103336761A (en) | Interference filtration matching algorithm based on dynamic partitioning and semantic weighting | |
JP4266144B2 (en) | Electronic communication apparatus, electronic communication system, electronic communication method, program for causing computer to execute the method, and storage medium storing the program | |
Huang et al. | Efficient privacy-preserving content-based image retrieval in the cloud | |
JP2008140053A (en) | Information management system, information management method, program and storage medium | |
CN107026841A (en) | The method and apparatus for issuing works in a network | |
RuiJin et al. | Instance attack: an explanation-based vulnerability analysis framework against dnns for malware detection | |
Dandass et al. | An empirical analysis of disk sector hashes for data carving | |
Shah et al. | Design and development of an algorithm to secure big data on cloud computing | |
CN106446608A (en) | Copyright protection method and system for Epub (electronic publication) document |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200514 Address after: Room 601, floor 6, building 1, Lane ditch 1, Haidian District, Beijing 100089 Applicant after: BEIJING SHUKE WANGWEI TECHNOLOGY Co.,Ltd. Address before: 100044 Beijing City, Haidian District Xizhimen North Street No. 41 days trillion homes 3-B-1902 Applicant before: BEIJING SECSMARTS TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |