CN107180200A - Data file customizable desensitization method and system - Google Patents

Data file customizable desensitization method and system Download PDF

Info

Publication number
CN107180200A
CN107180200A CN201710262559.5A CN201710262559A CN107180200A CN 107180200 A CN107180200 A CN 107180200A CN 201710262559 A CN201710262559 A CN 201710262559A CN 107180200 A CN107180200 A CN 107180200A
Authority
CN
China
Prior art keywords
file
data
desensitization
xml
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710262559.5A
Other languages
Chinese (zh)
Other versions
CN107180200B (en
Inventor
付海涛
赵小录
芦效峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING SHUKE WANGWEI TECHNOLOGY Co.,Ltd.
Original Assignee
BEIJING TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TECHNOLOGY Co Ltd filed Critical BEIJING TECHNOLOGY Co Ltd
Priority to CN201710262559.5A priority Critical patent/CN107180200B/en
Publication of CN107180200A publication Critical patent/CN107180200A/en
Application granted granted Critical
Publication of CN107180200B publication Critical patent/CN107180200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention belongs to information security field there is provided a kind of data file customizable desensitization method and system, wherein system includes:Sensitive information setting unit, being set for system operators needs child node to be protected and desensitization method name in data file under default situations;Format converter, for convert file formats;Data processing unit, for preserving desensitization function, verifies default configuration file integrality, and according to the desensitization rules modification XML file preserved in interim desensitization configuration file;Resolver, for parsing XML file;Desensitize rules customization unit, for setting interim desensitization configuration file.Simultaneously the invention discloses a kind of method, data processing unit obtains the document object and interim desensitization configuration file of XML document, and changes this document object according to DOM characteristics and node path.The present invention realizes the protection to sensitive data in data file, meets data user of service to the demand that can be desensitized during different third party's shared datas to being customized of sensitive data.

Description

Data file customizable desensitization method and system
Technical field
The invention belongs to information security field, it is related to the sensitive information desensitization protection technique in a kind of file to data type, Specifically a kind of data file customizable desensitization method and system.
Background technology
In recent years along with the high speed development of internet, internet is also more and more closer with contacting for personal lifestyle.This is not Traversal in life is only brought to user, enables people to carry out browsing webpage, inquiry problem, purchase commodity anywhere or anytime Deng operation, while also making user generate the substantial amounts of behavioral data about individual privacy, these data are due to government regulation, business It will be issued the need for industry purpose or research or be supplied to third party to use.These issues or shared data include user Sensitive information, if data owner can cause substantial amounts of individual privacy to reveal, give directly by these data publications or shared User, relate to thing unit and society brings ill effect;If the mode of data owner's improper use simultaneously is to sensitive data Any processing is carried out, may make data consumer that data are carried out with the analysis of mistake, so that data consumer makes mistake Decision-making, cause huge economic loss.
In order to prevent data publication and it is shared when reveal privacy information, have been proposed so far using anonymization Mode is protected to data.According to incompletely statistics, at present on data publication and it is shared when data safety invention document Have following.
1. the mixing randomization method for secret protection of social network data issue:This invention by the anonymous methods of existing K- and with The method of machine is combined, and can be prevented to attack using the reorientation of structural context knowledge, be met social network user and privacy is pacified Full demand.
2. the track based on frequency suppresses the system and method for data publication secret protection:This invention is according to data publication Intimacy protection system, the method that locally suppressed using specific track carries out anonymous processing.
3. a kind of social network diagram data publication method for secret protection of optimization:This invention is hidden according to the data publication of proposition The data that private guard method is issued to social networks carry out secret protection processing.
4. a kind of data publication method and device:This invention is clustered data to be released according to the attribute of known class The classification of the attribute of data to be released is obtained after processing, then corresponding dissemination method is sent out according to the classification of different attribute Cloth data to be released, secret protection is provided so as to the issue for data to be released.
More than invent, the data of data user of service operation are source datas, and the data after processing are directly issued or Share to third party, it is impossible to the data protection demand when attacker is internal system data user of service is met, while also not The demand that data user of service carries out different degrees of protection to the data shared to different grades of third party can be met.
The content of the invention
The technical assignment of the present invention is to be directed to above-mentioned the deficiencies in the prior art, in order to realize data user of service in different numbers According to the safety of the sensitive data in usage scenario, even if while ensureing internal data user of service to initial data without any Operation, can not obtaining the high data of some susceptibilitys, there is provided a kind of data file customizable desensitization method and system.
In order to realize above-mentioned target, the present invention is adopted the following technical scheme that.
1st, data file customizable desensitization system, it is characterised in that:System includes sensitive information setting unit(1), solution Parser(2), format converter(3), data processing unit(4), desensitize rules customization unit(5);
Sensitive information setting unit(1):Initialization desensitization is carried out for system operators to the data file newly received to set, Set to be directed under the data file default situations and need child node to be protected and the corresponding desensitization method name of the child node;
Resolver(2):For parsing XML file, obtain representing the document object of this XML file;
Format converter(3):Document format data for data to be provided to personnel's offer is converted to XML file format, simultaneously Chosen whether to enter the file of output row format conversion by data user of service;
Data processing unit(4):For preserving desensitization function, the integrality of default configuration file is verified, acquisition represents XML file Document object and interim desensitization configuration file, and according to the desensitization rules modification document pair preserved in interim desensitization configuration file As most content writes back XML file in document object at last;
Desensitize rules customization unit(5):Default configuration file for showing the XML file, while for data user of service Interim desensitization configuration file is set.
2nd, the sensitive information setting unit to the data file newly received initialize and taken off for system operators It is quick to set, then configuration information is stored in default configuration file;Sensitive information setting unit is by the default configuration file Content array is turned to after character string, and character string is calculated by setting hashing algorithm, then by XML file name and the hash Character string is preserved in hashed value log file within the storage system.
3rd, the data processing unit reads the default configuration text of the XML file that data user of service selects in storage system Part, if there is no the default configuration file, then give a warning prompting XML file no initializtion setting;Otherwise acquiescence is matched somebody with somebody Put file and carry out integrity verification.
4th, the data processing unit is used for the document object and the configuration file that desensitizes temporarily for obtaining representing XML file, and According to the content in interim desensitization configuration file, path is generated, and the sensitive data in document object is repaiied according to path Change, document object content is finally write back into XML file.In store data user of service's sets in wherein interim desensitization configuration file The default configuration information that confidence is ceased and system operators are set.
5th, the desensitization rules customization unit is used to read and show the content in default configuration file, while for data User of service sets interim desensitization configuration file.Wherein, data user of service cannot be by the rules customization unit that desensitizes to being The default configuration information of system operating personnel is modified.
6th, the data file transition that the format converter is used for the non-XML file format for providing personnel's offer by data is XML file format, while the XML file after data processing unit is handled is converted to the data lattice of data user of service selection Formula.
7th, data file customizable desensitization system, sensitive information setting unit(1), resolver(2), format converter (3), data processing unit(4), desensitize rules customization unit(5);(2)With(4)It is connected,(3)With(4)It is connected,(4)With(5)Phase Even.
8th, data file customizable desensitization method, it is characterised in that method includes two stages.
(1)The Initialize installation stage:
The first step:Data provide personnel and submit data file, and format converter judges whether this data file is XML file lattice Data file, if XML file format, is then directly stored in storage system by formula;Otherwise, format converter is literary by this data Part is converted in data file deposit storage system after XML file format;
Second step:System operators carry out initialization desensitization to the data file newly received and set;
System operators operate sensitive information setting unit, and set needs child node to be protected and the sub- section under default situations The corresponding desensitization method name of point.Sensitive information setting unit preserves configuration information default configuration file within the storage system In;Sensitive information setting unit turns to content array in default configuration file after character string, and character string is calculated by setting hash Method is calculated, and then preserves XML file name and the hash character string in hashed value log file within the storage system.
(2)The data manipulation stage:Data user of service selects the XML files to be operated, and is set to S, and desensitization system is from storage The XML file S are read in system, and following operation is done for this XML file S:
Step 1:Data processing unit reads the default configuration file of file S in storage system, if there is no default configuration text Part, the then prompting XML file S no initializtions that give a warning are set;Otherwise content array in default configuration file is turned into character string Afterwards, character string is calculated by setting hashing algorithm, then according to XML file S in hashed value log file within the storage system Filename lookup and take out corresponding hashed value, two hashed values are compared, verify integrality, if the two is differed Then verify and do not pass through, point out mistake, continue if the two is completely the same;
Step 2:Resolver parses XML file S, obtains representing XML file S document object, i.e. Document objects, is set to W;
Step 3:The rules customization unit that desensitizes reads the default configuration file of the file S in storage system, and shows default configuration All father nodes, child node, desensitized state and corresponding optional desensitization function in file, while desensitized state is labeled as The field of "Yes" is shown as needing to desensitize and the inadvisable state that disappears, and by desensitizing, rules customization unit is configured, and is tied setting Really it is stored in interim desensitization configuration file, and goes to step 4 and continues executing with;
Step 4:Data processing unit judges whether also have next line data in interim desensitization configuration file, if there is next line Data, go to step 5 and continue executing with;If there is no next line data, go to step 7 and continue executing with;
Step 5:If this journey is the i-th row, obtains in interim desensitization configuration file the desensitized state of the i-th row and be defined as t, if t For "No", then directly go to step 4 and continue executing with;Otherwise, the desensitization function F of the i-th row in interim desensitization configuration file is taken out, so The father node for taking out the i-th row in interim desensitization configuration file afterwards is defined as a, and child node is defined as b, and node road is obtained according to a and b Footpath d="/a/b " obtains the child node collection D corresponding to node path d in document object W(Specific method professional can compile Cheng Shixian, will not be described here), go to step 6 and continue executing with;
Step 6:Judge to whether there is next child node in child node collection D, if it does, take out the child node and be defined as s, Child node s data m is taken out, carrying out desensitization process to m using desensitization function F obtains M, i.e. M=F(m), child node s is replaced with M In data value m, and go to step 6 and continue executing with;If next sub- node is not present in data set D, step 4 is gone to Continue executing with;
Step 7:The document object W contents of desensitization are write back into XML file S, document object W is deleted, XML file is submitted into form Converter;
Step 8:Format converter obtains the output file form that data user of service needs, and format converter turns XML file S It is changed to output data file after corresponding file format.
The present invention is a kind of data file customizable desensitization method and system.Have compared with prior art following prominent Advantage.
1. system operators can set special default configuration file for each XML file, it is ensured that to each The different protections of XML file content.
2. in the case where not changing the corresponding default configuration file of XML file, data user of service can be to XML file Being customized desensitization is set, and meets data safety demand of the data user of service under different pieces of information usage scenario.
3. for user and developer, to service data manipulating without the concern for the desensitization process to data, institute Some desensitization operations are transparent to application layer developer and user.
Brief description of the drawings
Fig. 1 is data file customizable desensitization method of the present invention and the structure chart of system.
Fig. 2 is the flow chart that the XML file that desensitization system of the present invention is selected data user of service carries out desensitization process.
Fig. 3 is the storage format exemplary plot of default configuration file in the present invention.
Fig. 4 is the storage format exemplary plot of interim desensitization configuration file in the present invention.
Fig. 5 is the storage format exemplary plot of hashed value log file in the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.Fig. 1 is the structure chart of system, main to include number According to processing unit, sensitive information setting unit, resolver, format converter and desensitization rules customization unit, wherein default configuration File is stored within the storage system.Fig. 2 is the stream that the XML file that desensitization system is selected data user of service carries out desensitization process Cheng Tu, the step of specific steps are by the data below operational phase is realized;Fig. 3 is the storage format example of default configuration file Figure, the default configuration information set for storage system operation personnel.Fig. 4 is the storage format example of interim desensitization configuration file Figure, judges whether XML file interior joint data are sensitive datas for data processing unit.Fig. 5 is hashed value log file Storage format exemplary plot, it is literary to the corresponding default configuration of the XML file with according to setting hashing algorithm for storing XML file name Part carries out hash and calculates obtained hashed value.
The Initialize installation stage.
The first step:Data provide personnel and submit data file, and format converter judges whether this data file is XML file Data file, if XML file format, is then directly stored in storage system by form;Otherwise, format converter is by this data File is converted in data file deposit storage system after XML file format.
Second step:System operators carry out initialization desensitization to the data file newly received and set, system operators Sensitive information setting unit is operated, set needs child node to be protected and the corresponding desensitization method of the child node under default situations Name.Configuration information is preserved in the default configuration file of the XML file within the storage system.
3rd step:Sensitive information setting unit turns to content array in default configuration file after character string, by character string Calculated by setting hashing algorithm, the hashed value for then preserving XML file name and the hash character string within the storage system is remembered Record in file.
The data manipulation stage.
The first step:Data user of service selects the XML file to be operated, and is set to S, and desensitization system is read from storage system XML file S.
Second step:Data processing unit reads the default configuration file of XML file S in storage system, if there is no silent Recognize configuration file, then the prompting XML file S no initializtions that give a warning are set;Otherwise by content array in default configuration file After character string, character string is calculated by setting hashing algorithm.
3rd step:In the hashed value log file of data processing unit within the storage system according to S filename lookup simultaneously Corresponding hashed value is taken out, two hashed values are compared, integrality is verified, verifies and do not pass through if the two is differed, Mistake is pointed out, is continued if the two is completely the same.
4th step:Resolver parses XML file S, obtains representing this XML file S document object W, i.e., Document couples As being set to W.
5th step:The rules customization unit that desensitizes reads the default configuration file of the XML file in storage system, and shows silent Father nodes all in configuration file, child node, desensitized state and corresponding optional desensitization function are recognized, while by desensitized state mark The node for being designated as "Yes" is shown as desensitization and the inadvisable state that disappears.
6th step:Data user of service is set by the rules customization unit that desensitizes, and result will be set to be stored in interim desensitization In configuration file.
7th step:Data processing unit judges whether interim desensitization configuration file also has next line data, if there is under Data line, goes to the 8th step and continues executing with;Otherwise the tenth step is gone to continue executing with.
8th step:If this journey is the i-th row in desensitization configuration file temporarily, obtains the desensitized state of the i-th row and be defined as t, If t is "No", directly goes to the 7th step and continue executing with;Otherwise, the desensitization function F of the i-th row is taken out, the i-th row is then taken out Father node be defined as a, child node is defined as b, according to a and b obtain node path d="/a/b ", in document object W obtain Child node collection D corresponding to node path d(Specific method professional may be programmed and realize, will not be described here), go to the 9th Step is continued executing with.
9th step:Judge to whether there is next child node in child node collection D, if it does, taking out the child node and fixed Justice is s, takes out child node s data m, and carrying out desensitization process to m using desensitization function F obtains M, i.e. M=F(m), son is replaced with M Data value m in node s, and go to the 9th step and continue executing with;If next sub- node is not present in data set D, go to 7th step is continued executing with.
Tenth step:The document object W contents of desensitization are write back XML file S by data processing unit, delete document object W, and XML file submits to format converter.
11st step:Format converter obtains the file format that data users of service needs to export, and format converter is by XML File S is converted to output data file after corresponding file format.

Claims (8)

  1. The system 1. data file customizable desensitizes, it is characterised in that:System includes sensitive information setting unit(1), resolver (2), format converter(3), data processing unit(4), desensitize rules customization unit(5);
    Sensitive information setting unit(1):Initialization desensitization is carried out for system operators to the data file newly received to set, Set to be directed under the data file default situations and need child node to be protected and the corresponding desensitization method name of the child node;
    Resolver(2):For parsing XML file, obtain representing the document object of this XML file;
    Format converter(3):Document format data for data to be provided to personnel's offer is converted to XML file format, simultaneously Chosen whether to enter the file of output row format conversion by data user of service;
    Data processing unit(4):For preserving desensitization function, the integrality of default configuration file is verified, acquisition represents XML file Document object and interim desensitization configuration file, and according to the desensitization rules modification document pair preserved in interim desensitization configuration file As most content writes back XML file in document object at last;
    Desensitize rules customization unit(5):Default configuration file for showing the XML file, while for data user of service Interim desensitization configuration file is set.
  2. The system 2. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:
    The sensitive information setting unit is used for system operators and initialization desensitization setting is carried out to the data file newly received, Then configuration information is stored in default configuration file;Sensitive information setting unit is by content array in the default configuration file Turn to after character string, character string is calculated by setting hashing algorithm, then protect XML file name and the hash character string Deposit in hashed value log file within the storage system.
  3. The system 3. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:
    The data processing unit reads the default configuration file of the XML file that data user of service selects in storage system, such as The default configuration file is not present in fruit, then give a warning prompting XML file no initializtion setting;Otherwise by default configuration file Carry out integrity verification.
  4. The system 4. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:
    The data processing unit is used for the document object for obtaining representing XML file and interim desensitization configuration file, and according to facing When desensitization configuration file in content, generate path, and the sensitive data in document object modified according to path, finally Document object content is write back into XML file, wherein temporarily desensitization configuration file in store data user of service configuration information The default configuration information set with system operators.
  5. The system 5. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:
    The desensitization rules customization unit is used to read and show the content in default configuration file, while for data user Member sets interim desensitization configuration file, wherein, data user of service cannot be by the rules customization unit that desensitizes to system operatio The default configuration information of personnel is modified.
  6. The system 6. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:
    It is XML texts that the format converter, which is used to provide the data file transition for the non-XML file format that personnel provide by data, Part form, while the XML file after data processing unit is handled is converted to the data format of data user of service selection.
  7. The system 7. data file customizable as claimed in claim 1 desensitizes, it is characterised in that:
    Data file customizable desensitization system, sensitive information setting unit(1), resolver(2), format converter(3), data Processing unit(4), desensitize rules customization unit(5);(2)With(4)It is connected,(3)With(4)It is connected,(4)With(5)It is connected.
  8. 8. data file customizable desensitization method, it is characterised in that method includes two stages:
    (1)The Initialize installation stage:
    The first step:Data provide personnel and submit data file, and format converter judges whether this data file is XML file lattice Data file, if XML file format, is then directly stored in storage system by formula;Otherwise, format converter is literary by this data Part is converted in data file deposit storage system after XML file format;
    Second step:System operators carry out initialization desensitization to the data file newly received and set;
    System operators operate sensitive information setting unit, and set needs child node to be protected and the sub- section under default situations The corresponding desensitization method name of point;
    3rd step:Sensitive information setting unit preserves configuration information in default configuration file within the storage system;Sensitivity letter Breath setting unit turns to content array in default configuration file after character string, character string is calculated by setting hashing algorithm, so XML file name and the hash character string are preserved in hashed value log file within the storage system afterwards;
    (2)The data manipulation stage:Data user of service selects the XML files to be operated, and is set to S, and desensitization system is from storage system Middle reading XML file S, and do following operation for this XML file S:
    Step 1:Data processing unit reads the default configuration file of file S in storage system, if there is no default configuration text Part, the then prompting XML file S no initializtions that give a warning are set;Otherwise content array in default configuration file is turned into character string Afterwards, character string is calculated by setting hashing algorithm, then according to XML file S in hashed value log file within the storage system Filename lookup and take out corresponding hashed value, two hashed values are compared, verify integrality, if the two is differed Then verify and do not pass through, point out mistake, continue if the two is completely the same;
    Step 2:Resolver parses XML file S, obtains representing XML file S document object, i.e. Document objects, is set to W;
    Step 3:The rules customization unit that desensitizes reads the default configuration file of the file S in storage system, and shows default configuration All father nodes, child node, desensitized state and corresponding optional desensitization function in file, while desensitized state is labeled as The field of "Yes" is shown as needing to desensitize and the inadvisable state that disappears, and by desensitizing, rules customization unit is configured, and is tied setting Really it is stored in interim desensitization configuration file, and goes to step 4 and continues executing with;
    Step 4:Data processing unit judges whether also have next line data in interim desensitization configuration file, if there is next line Data, go to step 5 and continue executing with;If there is no next line data, go to step 7 and continue executing with;
    Step 5:If this journey is the i-th row, obtains in interim desensitization configuration file the desensitized state of the i-th row and be defined as t, if t For "No", then directly go to step 4 and continue executing with;Otherwise, the desensitization function F of the i-th row in interim desensitization configuration file is taken out, so The father node for taking out the i-th row in interim desensitization configuration file afterwards is defined as a, and child node is defined as b, and node road is obtained according to a and b Footpath d="/a/b " obtains the child node collection D corresponding to node path d in document object W(Specific method professional can compile Cheng Shixian, will not be described here), go to step 6 and continue executing with;
    Step 6:Judge to whether there is next child node in child node collection D, if it does, take out the child node and be defined as s, Child node s data m is taken out, carrying out desensitization process to m using desensitization function F obtains M, i.e. M=F(m), child node s is replaced with M In data value m, and go to step 6 and continue executing with;If next sub- node is not present in data set D, step 4 is gone to Continue executing with;
    Step 7:The document object W contents of desensitization are write back into XML file S, document object W is deleted, XML file is submitted into form Converter;
    Step 8:Format converter obtains the output file form that data user of service needs, and format converter turns XML file S It is changed to output data file after corresponding file format.
CN201710262559.5A 2017-04-20 2017-04-20 Customizable desensitization method and system for data files Active CN107180200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710262559.5A CN107180200B (en) 2017-04-20 2017-04-20 Customizable desensitization method and system for data files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710262559.5A CN107180200B (en) 2017-04-20 2017-04-20 Customizable desensitization method and system for data files

Publications (2)

Publication Number Publication Date
CN107180200A true CN107180200A (en) 2017-09-19
CN107180200B CN107180200B (en) 2020-06-09

Family

ID=59832047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710262559.5A Active CN107180200B (en) 2017-04-20 2017-04-20 Customizable desensitization method and system for data files

Country Status (1)

Country Link
CN (1) CN107180200B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190405A (en) * 2018-09-03 2019-01-11 佛山科学技术学院 A kind of government affairs big data desensitization process method and device
CN109190404A (en) * 2018-07-18 2019-01-11 安徽云图信息技术有限公司 A kind of data desensitization system
WO2019134339A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Desensitization method and procedure, application server and computer readable storage medium
CN110210009A (en) * 2018-02-28 2019-09-06 中兴通讯股份有限公司 Annotation process method, device and equipment, computer readable storage medium
CN110222282A (en) * 2019-04-17 2019-09-10 深圳壹账通智能科技有限公司 Data processing method, device, server and storage medium
CN110348239A (en) * 2019-06-13 2019-10-18 平安普惠企业管理有限公司 Desensitize regular configuration method and data desensitization method, system, computer equipment
CN110443058A (en) * 2018-05-02 2019-11-12 中兴通讯股份有限公司 A kind of method and device of XML document desensitization
CN111291410A (en) * 2020-02-13 2020-06-16 支付宝(杭州)信息技术有限公司 Desensitization processing method and device for electronic document
CN113434908A (en) * 2021-08-30 2021-09-24 四川新网银行股份有限公司 Data desensitization method based on Logback log component
CN113591150A (en) * 2021-08-03 2021-11-02 浙江图盛输变电工程有限公司温州科技分公司 Desensitization processing method for sensitive data
CN114866532A (en) * 2022-04-25 2022-08-05 安天科技集团股份有限公司 Method, device, equipment and medium for uploading security check result information of endpoint file
CN115114669A (en) * 2022-08-23 2022-09-27 山东双仁信息技术有限公司 Interactive content desensitization method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070110224A1 (en) * 2005-11-14 2007-05-17 Accenture Global Services Gmbh Data masking application
US20080133934A1 (en) * 2006-10-10 2008-06-05 Infosys Technologies Ltd. Configurable data masking for software testing
US20090254572A1 (en) * 2007-01-05 2009-10-08 Redlich Ron M Digital information infrastructure and method
US20140123303A1 (en) * 2012-10-31 2014-05-01 Tata Consultancy Services Limited Dynamic data masking
US20140310231A1 (en) * 2013-04-16 2014-10-16 Cognizant Technology Solutions India Pvt. Ltd. System and method for automating data warehousing processes
CN104572122A (en) * 2015-01-28 2015-04-29 中国工商银行股份有限公司 Software application data generating device and method
CN106203170A (en) * 2016-07-19 2016-12-07 北京同余科技有限公司 The Database Dynamic desensitization method of servicing of based role and system
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system
CN106529329A (en) * 2016-10-11 2017-03-22 中国电子科技网络信息安全有限公司 Desensitization system and desensitization method used for big data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070110224A1 (en) * 2005-11-14 2007-05-17 Accenture Global Services Gmbh Data masking application
US20080133934A1 (en) * 2006-10-10 2008-06-05 Infosys Technologies Ltd. Configurable data masking for software testing
US20090254572A1 (en) * 2007-01-05 2009-10-08 Redlich Ron M Digital information infrastructure and method
US20140123303A1 (en) * 2012-10-31 2014-05-01 Tata Consultancy Services Limited Dynamic data masking
US20140310231A1 (en) * 2013-04-16 2014-10-16 Cognizant Technology Solutions India Pvt. Ltd. System and method for automating data warehousing processes
CN104572122A (en) * 2015-01-28 2015-04-29 中国工商银行股份有限公司 Software application data generating device and method
CN106203170A (en) * 2016-07-19 2016-12-07 北京同余科技有限公司 The Database Dynamic desensitization method of servicing of based role and system
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system
CN106529329A (en) * 2016-10-11 2017-03-22 中国电子科技网络信息安全有限公司 Desensitization system and desensitization method used for big data

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
焦伟 等: ""测试数据脱敏技术框架的研究与探讨"", 《中国金融电脑》 *
臧昊 等: ""基于XML的电子病历隐私数据脱敏技术的研究与设计"", 《信息技术与信息化》 *
陈天莹 等: ""大数据环境下的智能数据脱敏系统"", 《通信技术》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019134339A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Desensitization method and procedure, application server and computer readable storage medium
CN110210009A (en) * 2018-02-28 2019-09-06 中兴通讯股份有限公司 Annotation process method, device and equipment, computer readable storage medium
CN110443058A (en) * 2018-05-02 2019-11-12 中兴通讯股份有限公司 A kind of method and device of XML document desensitization
CN109190404A (en) * 2018-07-18 2019-01-11 安徽云图信息技术有限公司 A kind of data desensitization system
CN109190405A (en) * 2018-09-03 2019-01-11 佛山科学技术学院 A kind of government affairs big data desensitization process method and device
CN110222282A (en) * 2019-04-17 2019-09-10 深圳壹账通智能科技有限公司 Data processing method, device, server and storage medium
CN110348239A (en) * 2019-06-13 2019-10-18 平安普惠企业管理有限公司 Desensitize regular configuration method and data desensitization method, system, computer equipment
CN110348239B (en) * 2019-06-13 2023-10-27 张建军 Desensitization rule configuration method, data desensitization method, system and computer equipment
CN111291410B (en) * 2020-02-13 2021-09-07 支付宝(杭州)信息技术有限公司 Desensitization processing method and device for electronic document
CN111291410A (en) * 2020-02-13 2020-06-16 支付宝(杭州)信息技术有限公司 Desensitization processing method and device for electronic document
CN113591150A (en) * 2021-08-03 2021-11-02 浙江图盛输变电工程有限公司温州科技分公司 Desensitization processing method for sensitive data
CN113591150B (en) * 2021-08-03 2024-04-26 浙江图盛输变电工程有限公司温州科技分公司 Desensitization processing method for sensitive data
CN113434908A (en) * 2021-08-30 2021-09-24 四川新网银行股份有限公司 Data desensitization method based on Logback log component
CN114866532A (en) * 2022-04-25 2022-08-05 安天科技集团股份有限公司 Method, device, equipment and medium for uploading security check result information of endpoint file
CN114866532B (en) * 2022-04-25 2023-11-10 安天科技集团股份有限公司 Method, device, equipment and medium for uploading security check result information of endpoint file
CN115114669A (en) * 2022-08-23 2022-09-27 山东双仁信息技术有限公司 Interactive content desensitization method and system

Also Published As

Publication number Publication date
CN107180200B (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN107180200A (en) Data file customizable desensitization method and system
US7730011B1 (en) Attributes of captured objects in a capture system
CN108133008B (en) Method, device, equipment and storage medium for processing service data in database
WO2018041066A1 (en) Data processing method, apparatus and system based on block chain technology
EP3012754B1 (en) Searchable symmetric encryption processing system
CN1776701B (en) Techniques for defining, using and manipulating rights management data structures
CN102541995B (en) To index and the inquiry of hash sequence matrix
US20170277773A1 (en) Systems and methods for secure storage of user information in a user profile
CA3184248A1 (en) Document processing and response generation system
US9940459B1 (en) Methods and devices for detection of malware
CN103703459A (en) Method and system for text message normalization based on character transformation and unsupervised of web data
CN107423632A (en) Customizable sensitive data desensitization method and system
CN109522328B (en) Data processing method and device, medium and terminal thereof
JP2009252145A (en) Data creating apparatus and data creating method
JP2011081030A (en) Searchable color-encoded file-composing method and searchable color-encoded file system
Mihajloska et al. Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3
CN103336761A (en) Interference filtration matching algorithm based on dynamic partitioning and semantic weighting
JP4266144B2 (en) Electronic communication apparatus, electronic communication system, electronic communication method, program for causing computer to execute the method, and storage medium storing the program
Huang et al. Efficient privacy-preserving content-based image retrieval in the cloud
JP2008140053A (en) Information management system, information management method, program and storage medium
CN107026841A (en) The method and apparatus for issuing works in a network
RuiJin et al. Instance attack: an explanation-based vulnerability analysis framework against dnns for malware detection
Dandass et al. An empirical analysis of disk sector hashes for data carving
Shah et al. Design and development of an algorithm to secure big data on cloud computing
CN106446608A (en) Copyright protection method and system for Epub (electronic publication) document

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200514

Address after: Room 601, floor 6, building 1, Lane ditch 1, Haidian District, Beijing 100089

Applicant after: BEIJING SHUKE WANGWEI TECHNOLOGY Co.,Ltd.

Address before: 100044 Beijing City, Haidian District Xizhimen North Street No. 41 days trillion homes 3-B-1902

Applicant before: BEIJING SECSMARTS TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant