CN107609418B - Desensitization method and device of text data, storage device and computer device - Google Patents

Desensitization method and device of text data, storage device and computer device Download PDF

Info

Publication number
CN107609418B
CN107609418B CN201710773075.7A CN201710773075A CN107609418B CN 107609418 B CN107609418 B CN 107609418B CN 201710773075 A CN201710773075 A CN 201710773075A CN 107609418 B CN107609418 B CN 107609418B
Authority
CN
China
Prior art keywords
text
encrypted
encryption
library
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710773075.7A
Other languages
Chinese (zh)
Other versions
CN107609418A (en
Inventor
杨明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dingfeng Cattle Technology Co Ltd
Original Assignee
Shenzhen Dingfeng Cattle Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dingfeng Cattle Technology Co Ltd filed Critical Shenzhen Dingfeng Cattle Technology Co Ltd
Priority to CN201710773075.7A priority Critical patent/CN107609418B/en
Publication of CN107609418A publication Critical patent/CN107609418A/en
Application granted granted Critical
Publication of CN107609418B publication Critical patent/CN107609418B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a desensitization method, a desensitization device, storage equipment and computer equipment of text data, wherein the desensitization method of the text data comprises the following steps: acquiring a text to be encrypted; determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted; and encrypting the text to be encrypted according to the encryption strategy. According to the method and the device, the corresponding encryption strategy is determined according to the text type and the text length of the text to be encrypted, and the text to be encrypted is encrypted, so that the data structure of the original text is not changed, the original text is prevented from being damaged, and the security of the encryption of the text data is improved.

Description

desensitization method and device of text data, storage device and computer device
Technical Field
the invention relates to the technical field of data processing, in particular to a desensitization method and device of text data, storage equipment and computer equipment.
Background
data desensitization refers to that sensitive information contained in data is specially processed through a desensitization rule to achieve the effect of data deformation, so that an attacker cannot directly obtain the sensitive information from the desensitization rule, and the desensitization data is restored when being applied. Data desensitization has wide application in many industries such as finance, medical treatment, telecommunication, electric power, etc. Desensitization of text data is a key application field of data desensitization, desensitization is carried out by using a desensitization algorithm during text data storage, and reduction is carried out by using the desensitization algorithm during text data extraction and application.
there are some reversible encryption and decryption algorithms available as text data desensitization algorithms, but these algorithms have two disadvantages in data desensitization applications: firstly, the encryption and decryption algorithm changes the data structure of the original text and has damage to the original text; secondly, if a fixed key is used, leakage is easily caused, and if a variable key is used, key maintenance cost is high under the condition of large data volume.
disclosure of Invention
Based on this, it is necessary to provide a desensitization method and apparatus for text data, a storage device, and a computer device, aiming at the problems existing in the current text data desensitization algorithm.
A method of desensitizing textual data, comprising:
Acquiring a text to be encrypted;
Determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted;
And encrypting the text to be encrypted according to the encryption strategy.
in one embodiment, determining an encryption policy corresponding to a text type of a text to be encrypted according to the text type and the text length of the text to be encrypted includes:
Determining text attributes according to the text type and the text length of the text to be encrypted;
Determining a corresponding segmented encryption strategy according to the text attribute;
The encrypting the text to be encrypted according to the encryption strategy comprises the following steps:
respectively reading corresponding key libraries according to the sectional encryption strategy, and performing sectional encryption on the text to be encrypted;
and combining the segmented encrypted data to obtain the encrypted text.
in one embodiment, the text type of the text to be encrypted includes: letters, numbers, Chinese characters, and symbols.
in one embodiment, before obtaining the text to be encrypted, the method further includes: the keystore is initialized.
in one embodiment, initializing the keystore comprises:
Establishing a corresponding dictionary library according to the text type and the text length;
randomly scrambling the dictionary library to generate an index library;
And mapping the index library and the corresponding dictionary library to form a key library.
In one embodiment, mapping the index library and the corresponding dictionary library to form a key library includes:
Establishing a connection relation between the index library and a corresponding dictionary library through an encrypted ciphertext encrypted by an AES (advanced encryption standard) to generate a key library;
And encrypting the key bank and storing in a sub-bank mode.
in one embodiment, after the encryption is performed according to the encryption policy, the method further includes:
determining the text attribute of the encrypted text according to the text type and the text length of the encrypted text;
determining a corresponding segmentation decryption strategy according to the text attribute;
respectively reading corresponding key libraries according to the sectional decryption strategy, and performing sectional decryption on the encrypted text;
And combining the segmented decrypted data to obtain the decrypted text.
Apparatus for desensitizing textual data, comprising:
the acquisition module is used for acquiring a text to be encrypted;
the encryption strategy determining module is used for determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted;
And the encryption module is used for encrypting the text to be encrypted according to the encryption strategy.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as described above.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the program.
The method and the device for desensitizing the text data, the storage equipment and the computer equipment determine a corresponding encryption strategy according to the text type and the text length of the text to be encrypted, and encrypt the text to be encrypted, so that the data structure of the original text cannot be changed, the original text is prevented from being damaged, and the security of encrypting the text data is improved.
Drawings
FIG. 1 is a flow diagram of a method of desensitization of textual data in one embodiment;
FIG. 2 is a flow diagram of a method of desensitization of textual data in one embodiment;
FIG. 3 is a flow diagram of a method of desensitization of textual data in one embodiment;
FIG. 4 is a flow diagram of a method of desensitization of textual data in one embodiment;
FIG. 5 is a flow diagram of a method of desensitization of textual data in one embodiment;
FIG. 6 is a flow diagram of a method of desensitization of textual data in one embodiment;
FIG. 7 is a flow diagram of a method of desensitization of textual data in one embodiment;
Fig. 8 is a schematic structural diagram of a desensitizing apparatus of text data in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention.
the embodiment of the invention provides a text data desensitization method, which comprises the following steps of:
Step S101, obtaining a text to be encrypted.
In this embodiment, the text data is desensitized by the encryption/decryption server. When text data needs to be encrypted, the text to be encrypted can be obtained through the encryption and decryption server.
And S102, determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted.
The text type of the text to be encrypted can comprise types such as letters, numbers, Chinese characters, symbols and the like; the text length can be digits of numbers, numbers of Chinese characters, numbers of symbols, digits of letters and the like; the encryption strategy can be a mode of converting letters, numbers, Chinese characters, symbols and the like in the text to be encrypted into the encrypted letters, numbers, Chinese characters and symbols according to an encryption and decryption algorithm by a certain rule.
In this embodiment, in order to avoid the original text from being damaged without changing the data structure of the original text, an encryption policy corresponding to the text type of the text to be encrypted may be determined according to the text type and the text length of the obtained text to be encrypted.
And S103, encrypting the text to be encrypted according to the encryption strategy.
in this embodiment, the text to be encrypted is encrypted according to the encryption policy, so that the original data type and data length of the text are not changed, the structure of the original text data can be maintained, and the original text is not damaged.
In one embodiment, as shown in fig. 2, before obtaining the text to be encrypted, the method may further include:
step S201 initializes the keystore.
in this embodiment, a corresponding dictionary library may be established in advance according to the text type and the text length. For example, for text with a text type of number, a one-digit dictionary library {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}, a two-digit dictionary library {10, 11, 12, …, 99} and a three-digit dictionary library {100, 101, 102, …, 999} can be respectively established according to the text length, i.e., the length of the number. For the text with the text type of Chinese characters, the Chinese character dictionary can be directly used as a corresponding dictionary library.
and randomly scrambling the established dictionary base to generate a corresponding index base. In this embodiment, the index library and the corresponding dictionary library are mapped to form a key library. Specifically, a connection relationship between the index library and a corresponding dictionary library can be established through a ciphertext encrypted by an Advanced Encryption Standard (AES for short) to generate a key library, and the key library is encrypted and stored in a sub-library manner, so that the security of the key library is ensured.
In one embodiment, as shown in fig. 3, determining an encryption policy corresponding to a text type of a text to be encrypted according to the text type and a text length of the text to be encrypted includes:
Step S301, determining text attributes according to the text type and the text length of the text to be encrypted.
in this embodiment, the logical relationship among the text type, the text length, and the text attribute may be set in advance in the encryption and decryption server, so that when the text to be encrypted is encrypted, the text attribute may be determined according to the text type and the text length of the text to be encrypted. Specifically, if the text type of the text to be encrypted is a number and the text length is 2 digits, the encryption and decryption server identifies that the text attribute is 2 digits; if the text type of the text to be encrypted is a number and the text length is 11 digits, the encryption and decryption server identifies that the text attribute is a mobile phone number; if the text type of the text to be encrypted is a number and the text length is 6 bits, the encryption and decryption server identifies the text attribute as a postcode; and if the text type of the text to be encrypted is Chinese character and the text length is 2 bits, 3 bits or 4 bits, the encryption and decryption server identifies the text attribute as name.
Step S302, determining a corresponding segmented encryption strategy according to the text attribute.
The segmented encryption may be to use different key banks according to the position of the string to be encrypted in the text. For example, if the string to be encrypted includes chinese characters and numbers, respectively, the chinese character keystore may be used to encrypt the chinese characters in the string to be encrypted, and the number keystore may be used to encrypt the numbers in the string to be encrypted, thereby implementing the block encryption. And if the string to be encrypted is the text with the selected attribute, encrypting by adopting a corresponding sectional encryption strategy.
in this embodiment, the correspondence between the text attribute and the segment encryption policy may be set in advance. For example, for a text to be encrypted with a mobile phone number as a text attribute, the corresponding segmented encryption policy is "3 +3+ 5", that is, the first three bits are not encrypted, the middle three bits are encrypted by using a key bank composed of a three-bit dictionary bank and a corresponding index bank, and the last five bits are encrypted by using a key bank composed of a five-bit dictionary bank and a corresponding index bank. For a text to be encrypted with a text attribute of name, the corresponding segmented encryption strategy is 'family name + first name', namely, the family name can be encrypted by adopting a key bank consisting of a common family name dictionary bank and a corresponding index bank, and the first name can be encrypted according to the key bank consisting of a Chinese character dictionary bank and a corresponding index bank. Therefore, the type and the length of the original text data are not changed in the encryption process, and the encrypted data have the same data structure as the original text.
In one embodiment, as shown in fig. 4, encrypting the text to be encrypted according to the encryption policy includes:
Step S401, respectively reading corresponding key banks according to the sectional encryption strategy, and performing sectional encryption on the text to be encrypted.
In this embodiment, the encryption and decryption servers respectively read the corresponding key banks according to the segment encryption policy, and perform segment encryption on the text to be encrypted. For example, if a two-digit text to be encrypted is encrypted, a two-digit key library (i.e., a key library composed of a two-digit dictionary library and a corresponding index library) is used to encrypt the text to be encrypted.
as shown in fig. 5, if the mobile phone number "15823471924" needs to be encrypted, the corresponding segmented encryption policy "3 +3+ 5" is adopted, that is, the first three bits "158" are not encrypted (i.e., the original text is kept), the middle three bits "234" adopt the three-bit dictionary base and search the corresponding index base through the AES encryption ciphertext to obtain the encrypted value "546", and the last five bits "71924" adopt the five-bit dictionary base and search the corresponding index base through the AES encryption ciphertext to obtain the encrypted value "18456" to complete the segmented encryption.
Step S402, combining the data encrypted in segments to obtain an encrypted text.
in this embodiment, the data after the segment encryption is combined according to the original sequence, so as to obtain the encrypted text. Continuing with the above embodiment of encrypting the mobile phone number as an example, in the above embodiment, the mobile phone number "15823471924" is encrypted by dividing the mobile phone number into three segments according to the segmentation policy of "3 +3+ 5", where the value of the first segment after the segmentation encryption is "158", the value of the second segment after the segmentation encryption is "546", and the value of the third segment after the segmentation encryption is "18456", and the encrypted text data is "15854618456" after the combination of the two segments according to the original sequence.
In one embodiment, as shown in fig. 6, after the encrypting according to the encryption policy, the method further includes:
Step S601, determining a text attribute of the encrypted text according to the text type and the text length of the encrypted text.
In this embodiment, after encrypting the text to be encrypted, if the original text needs to be used, the encrypted text needs to be decrypted. The decryption process is the reverse process of encryption. Specifically, the logical relationship among the text type, the text length, and the text attribute may be set in advance in the encryption and decryption server, and therefore, when the encrypted text needs to be decrypted, the text attribute corresponding to the encrypted text may be determined according to the text type and the text length of the encrypted text and the logical relationship.
Step S602, determining a corresponding segment decryption strategy according to the text attribute.
in this embodiment, the correspondence between the text attribute and the segment decryption policy may be preset, so that the segment decryption policy corresponding to the text attribute may be used to decrypt the text to be decrypted.
And step S603, respectively reading corresponding key libraries according to the segmented decryption strategy, and performing segmented decryption on the encrypted text.
In this embodiment, the encryption and decryption server respectively reads the corresponding key banks according to the segment decryption policy, and performs segment decryption on the encrypted text.
Step S604, combining the data decrypted by the segments to obtain the decrypted text.
in this embodiment, the data after the segmented decryption is combined according to the original order, so as to obtain the decrypted text.
For example, as shown in fig. 7, if the text to be decrypted is "15854618456", the encryption and decryption server parses the text to be decrypted, determines that the text type of the text is a number, and determines that the text attribute of the text is a mobile phone number according to a preset logical relationship because the length of the text is 11 bits. And then according to the corresponding relation between the preset text attribute and the segmentation decryption strategy, determining that the segmentation decryption strategy corresponding to the mobile phone number is '3 +3+ 5', namely the first three bits '158' are not decrypted (namely the original text is kept), the middle three bits '546' adopt a three-bit mobile phone number index stock and retrieve the corresponding dictionary base through an AES encrypted ciphertext so as to obtain the decryption value '234', and the last five bits '18456' adopt a five-bit mobile phone number index stock and retrieve the corresponding dictionary base through the AES encrypted ciphertext so as to obtain the decryption value '71924', so as to finish the segmentation decryption. The fragmented decrypted data is combined in the original order "158 +234+ 71924" to obtain the decrypted text "15823471924" (i.e., the original).
The method of the embodiment determines the segmentation decryption strategy according to the text type and the text length of the text to be decrypted so as to decrypt according to the segmentation decryption strategy, thereby ensuring that the type and the length of the text data are not changed in the decryption process.
The embodiment of the present invention further provides a desensitization apparatus for text data, as shown in fig. 8, including an obtaining module 801, an encryption policy determining module 802, and an encryption module 803, where: an obtaining module 801, configured to obtain a text to be encrypted; an encryption policy determining module 802, configured to determine, according to the text type and the text length of the text to be encrypted, an encryption policy corresponding to the text type of the text to be encrypted; and the encryption module 803 is configured to encrypt the text to be encrypted according to the encryption policy.
In one embodiment, determining an encryption policy corresponding to a text type of a text to be encrypted according to the text type and the text length of the text to be encrypted includes: determining text attributes according to the text type and the text length of the text to be encrypted; determining a corresponding segmented encryption strategy according to the text attribute; encrypting the text to be encrypted according to the encryption strategy, comprising: respectively reading corresponding key libraries according to the sectional encryption strategy, and performing sectional encryption on the text to be encrypted; and combining the segmented encrypted data to obtain the encrypted text.
an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps: acquiring a text to be encrypted; determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted; and encrypting the text to be encrypted according to the encryption strategy.
In one embodiment, determining an encryption policy corresponding to a text type of a text to be encrypted according to the text type and the text length of the text to be encrypted includes: determining text attributes according to the text type and the text length of the text to be encrypted; determining a corresponding segmented encryption strategy according to the text attribute; encrypting the text to be encrypted according to the encryption strategy, comprising: respectively reading corresponding key libraries according to the sectional encryption strategy, and performing sectional encryption on the text to be encrypted; and combining the segmented encrypted data to obtain the encrypted text.
in one embodiment, the text types of the text to be encrypted include: letters, numbers, Chinese characters, and symbols.
In one embodiment, before obtaining the text to be encrypted, the method further comprises: the keystore is initialized. Initializing the keystore may specifically include: establishing a corresponding dictionary library according to the text type and the text length; randomly scrambling the dictionary library to generate an index library; and mapping the index library and the corresponding dictionary library to form a key library.
in one embodiment, mapping the index library with the corresponding dictionary library to form a key library comprises: establishing a connection relation between the index library and a corresponding dictionary library through an encrypted ciphertext encrypted by an AES (advanced encryption standard) to generate a key library; and encrypting the key bank and storing in a sub-bank mode.
In one embodiment, after the encrypting according to the encryption policy, the method further includes: determining the text attribute of the encrypted text according to the text type and the text length of the encrypted text; determining a corresponding segmentation decryption strategy according to the text attribute; respectively reading corresponding key libraries according to the sectional decryption strategy, and performing sectional decryption on the encrypted text; and combining the segmented decrypted data to obtain the decrypted text.
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and the following steps are implemented when the processor executes the program: acquiring a text to be encrypted; determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted; and encrypting the text to be encrypted according to the encryption strategy.
in one embodiment, determining an encryption policy corresponding to a text type of a text to be encrypted according to the text type and the text length of the text to be encrypted includes: determining text attributes according to the text type and the text length of the text to be encrypted; determining a corresponding segmented encryption strategy according to the text attribute; encrypting the text to be encrypted according to the encryption strategy, comprising: respectively reading corresponding key libraries according to the sectional encryption strategy, and performing sectional encryption on the text to be encrypted; and combining the segmented encrypted data to obtain the encrypted text.
in one embodiment, the text types of the text to be encrypted include: letters, numbers, Chinese characters, and symbols.
In one embodiment, before obtaining the text to be encrypted, the method further comprises: the keystore is initialized. Initializing the keystore may specifically include: establishing a corresponding dictionary library according to the text type and the text length; randomly scrambling the dictionary library to generate an index library; and mapping the index library and the corresponding dictionary library to form a key library.
In one embodiment, mapping the index library with the corresponding dictionary library to form a key library comprises: establishing a connection relation between the index library and a corresponding dictionary library through an encrypted ciphertext encrypted by an AES (advanced encryption standard) to generate a key library; and encrypting the key bank and storing in a sub-bank mode.
in one embodiment, after the encrypting according to the encryption policy, the method further includes: determining the text attribute of the encrypted text according to the text type and the text length of the encrypted text; determining a corresponding segmentation decryption strategy according to the text attribute; respectively reading corresponding key libraries according to the sectional decryption strategy, and performing sectional decryption on the encrypted text; and combining the segmented decrypted data to obtain the decrypted text.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. a method of desensitizing textual data, comprising:
acquiring a text to be encrypted;
determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted;
Encrypting the text to be encrypted according to the encryption strategy;
before the obtaining of the text to be encrypted, an initialization key bank is further included, and the initialization key bank includes: establishing a corresponding dictionary library according to the text type and the text length; randomly scrambling the dictionary library to generate an index library; and mapping the index library and the corresponding dictionary library to form a key library.
2. the desensitization method of text data according to claim 1, wherein said determining an encryption policy corresponding to a text type of the text to be encrypted according to the text type and text length of the text to be encrypted comprises:
determining text attributes according to the text type and the text length of the text to be encrypted;
Determining a corresponding segmented encryption strategy according to the text attribute;
The encrypting the text to be encrypted according to the encryption strategy comprises the following steps:
respectively reading corresponding key libraries according to the sectional encryption strategy, and performing sectional encryption on the text to be encrypted;
And combining the segmented encrypted data to obtain the encrypted text.
3. A method of desensitizing textual data according to claim 1 or 2, characterized in that said text type of the text to be encrypted comprises: letters, numbers, Chinese characters, and symbols.
4. The method of desensitizing textual data according to claim 3, wherein said mapping said index repository to a corresponding dictionary repository into a keystore comprises:
Establishing a connection relation between the index library and a corresponding dictionary library through an encrypted ciphertext encrypted by an AES (advanced encryption standard) to generate a key library;
And encrypting and storing the key bank in a sub-bank mode.
5. A method of desensitizing textual data according to claim 3, wherein said encrypting according to said encryption policy further comprises, after said encrypting:
Determining the text attribute of the encrypted text according to the text type and the text length of the encrypted text;
determining a corresponding segmentation decryption strategy according to the text attribute;
Respectively reading corresponding key libraries according to the segmented decryption strategy, and carrying out segmented decryption on the encrypted text;
And combining the segmented decrypted data to obtain the decrypted text.
6. Apparatus for desensitizing textual data, comprising:
The acquisition module is used for acquiring a text to be encrypted;
The encryption strategy determining module is used for determining an encryption strategy corresponding to the text type of the text to be encrypted according to the text type and the text length of the text to be encrypted;
The encryption module is used for encrypting the text to be encrypted according to the encryption strategy;
The key bank initialization module is used for establishing a corresponding dictionary bank according to the text type and the text length; randomly scrambling the dictionary library to generate an index library; and mapping the index library and the corresponding dictionary library to form a key library.
7. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
8. a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 5 when executing the program.
CN201710773075.7A 2017-08-31 2017-08-31 Desensitization method and device of text data, storage device and computer device Expired - Fee Related CN107609418B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710773075.7A CN107609418B (en) 2017-08-31 2017-08-31 Desensitization method and device of text data, storage device and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710773075.7A CN107609418B (en) 2017-08-31 2017-08-31 Desensitization method and device of text data, storage device and computer device

Publications (2)

Publication Number Publication Date
CN107609418A CN107609418A (en) 2018-01-19
CN107609418B true CN107609418B (en) 2019-12-10

Family

ID=61057152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710773075.7A Expired - Fee Related CN107609418B (en) 2017-08-31 2017-08-31 Desensitization method and device of text data, storage device and computer device

Country Status (1)

Country Link
CN (1) CN107609418B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108446571A (en) * 2018-03-22 2018-08-24 安徽八六物联科技有限公司 A kind of big data desensitization method
CN108681676B (en) * 2018-04-03 2022-10-04 北京市商汤科技开发有限公司 Data management method and apparatus, system, electronic device, program, and storage medium
CN108776762B (en) * 2018-06-08 2022-01-28 北京中电普华信息技术有限公司 Data desensitization processing method and device
CN109460676A (en) * 2018-10-30 2019-03-12 全球能源互联网研究院有限公司 A kind of desensitization method of blended data, desensitization device and desensitization equipment
CN109766713B (en) * 2018-12-15 2021-01-12 中国大唐集团科学技术研究院有限公司 Method for realizing dynamic rapid desensitization of data based on proxy
CN109815742B (en) * 2019-02-22 2021-07-09 蔷薇智慧科技有限公司 Data desensitization method and device
CN110008744B (en) * 2019-03-28 2022-04-01 平安科技(深圳)有限公司 Data desensitization method and related apparatus
CN110457949A (en) * 2019-08-14 2019-11-15 于向东 A kind of data desensitization method of holding uniqueness based on data dictionary, integrality, relevance
CN112784291B (en) * 2019-11-05 2023-08-08 天翼云科技有限公司 Big data desensitization method and system
US11520905B2 (en) * 2019-11-20 2022-12-06 Kyndryl, Inc. Smart data protection
CN111158857B (en) * 2019-12-24 2024-05-24 深信服科技股份有限公司 Data encryption method, device, equipment and storage medium
CN111814164A (en) * 2020-07-07 2020-10-23 亿度慧达教育科技(北京)有限公司 Information encryption method, decryption method, desensitization method and related devices
CN112287394B (en) * 2020-12-15 2021-04-06 深圳市深圳通有限公司 Card number desensitization method, device, equipment and storage medium
CN112765641B (en) * 2021-02-03 2022-10-11 兴业证券股份有限公司 Efficient desensitization method and device
CN115952854B (en) * 2023-03-14 2023-06-16 杭州太美星程医药科技有限公司 Training method of text desensitization model, text desensitization method and application

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345609A (en) * 2013-06-06 2013-10-09 深圳市大成天下信息技术有限公司 Method and device for text encryption and decryption
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN105376051A (en) * 2014-08-29 2016-03-02 宇龙计算机通信科技(深圳)有限公司 Encryption method and apparatus, and terminal
CN105426445A (en) * 2015-11-06 2016-03-23 天津佳宁坤祥科技有限公司 Format-preserving data desensitization method
CN105468990A (en) * 2014-09-04 2016-04-06 中国移动通信集团安徽有限公司 Sensitive information management control method and apparatus
CN106611129A (en) * 2016-12-27 2017-05-03 东华互联宜家数据服务有限公司 Data desensitization method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345609A (en) * 2013-06-06 2013-10-09 深圳市大成天下信息技术有限公司 Method and device for text encryption and decryption
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN105376051A (en) * 2014-08-29 2016-03-02 宇龙计算机通信科技(深圳)有限公司 Encryption method and apparatus, and terminal
CN105468990A (en) * 2014-09-04 2016-04-06 中国移动通信集团安徽有限公司 Sensitive information management control method and apparatus
CN105426445A (en) * 2015-11-06 2016-03-23 天津佳宁坤祥科技有限公司 Format-preserving data desensitization method
CN106611129A (en) * 2016-12-27 2017-05-03 东华互联宜家数据服务有限公司 Data desensitization method, device and system

Also Published As

Publication number Publication date
CN107609418A (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN107609418B (en) Desensitization method and device of text data, storage device and computer device
US9736142B2 (en) Tokenization using multiple reversible transformations
US9634838B2 (en) Complex format-preserving encryption scheme
KR102051720B1 (en) Method and apparatus for encrypting/decrypting data on mobile terminal
CN111199053B (en) System and method for multi-character wildcard search of encrypted data
US20150134971A1 (en) Apparatus and method for decrypting encrypted file
CN110636070B (en) Data sending method, data query method, device, electronic equipment and system
CN112202729B (en) Dynamic obfuscated encryption and decryption method and device
US10083194B2 (en) Process for obtaining candidate data from a remote storage server for comparison to a data to be identified
US10742400B2 (en) Datastream block encryption
US8462948B2 (en) System and method for protecting data of mobile phone
CN112492352A (en) Video encryption and decryption method and device, electronic equipment and storage medium
US11809603B2 (en) Systems and methods for real-time encryption of sensitive data
US20180309579A1 (en) Secure representation via a format preserving hash function
CN110008724B (en) Solid state hard disk controller safe loading method and device and storage medium
CN115757535A (en) Data query method, data storage method and device and electronic equipment
CN105678185A (en) Data security protection method and intelligent terminal management system
KR20170053056A (en) Security server using case based reasoning engine and storage medium for installing security function
US20230169186A1 (en) Method to secure computer code
CN106570410B (en) Data encryption method, data decryption method, device and system
CN114629643B (en) Key processing method, device and medium
CN107943876B (en) Page response method and system
CN115242540B (en) Data processing method and system
KR102505587B1 (en) Private key protection method against cache side channel attack
Skillen Deniable storage encryption for mobile devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191210

Termination date: 20200831