CN107885876A - A kind of dynamic desensitization method rewritten based on SQL statement - Google Patents
A kind of dynamic desensitization method rewritten based on SQL statement Download PDFInfo
- Publication number
- CN107885876A CN107885876A CN201711222369.7A CN201711222369A CN107885876A CN 107885876 A CN107885876 A CN 107885876A CN 201711222369 A CN201711222369 A CN 201711222369A CN 107885876 A CN107885876 A CN 107885876A
- Authority
- CN
- China
- Prior art keywords
- word
- desensitization
- query statement
- statement
- sql
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The present invention relates to a kind of dynamic desensitization method rewritten based on SQL statement, its technical characterstic is to comprise the following steps:When whether judge current statement be query statement, if query statement, then participle operation is carried out, and indicate its Type Length information according to the order of sql sentences, the structured message after generation participle;Sql sentences after participle are analyzed, therefrom identify sensitive field, if sensitive character string, then according to the rule for combining user's setting, sensitive character string are done into corresponding replacement, most query statement replaces with desensitization sentence at last;Desensitization sentence is performed on the database, the final field that desensitizes returns to desensitization result.The present invention is reasonable in design, and its treatment effeciency is high, can be directly applied in production environment, by the control of authority to user, realize the dynamic protection function to sensitive data.
Description
Technical field
The invention belongs to field of information security technology, is related to a kind of database sensitive information protection technique, especially a kind of
The dynamic desensitization method rewritten based on SQL statement.
Background technology
Database (Database) is to come tissue, storage and the warehouse for managing data according to data structure.For relationship type
Database, no matter using command mode, or using client utility, all realize that the data of correlation are grasped by sql sentences
Make.
With the development of enterprise, business datum constantly increases, and the thing followed is the development of data related work.Increasingly
More analyses and data mining are carried out based on true creation data, and data in use, face data safety
The problem of.To ensure use of the data analyst to data, while the risk of leaking data is reduced, so needing dynamic to desensitize
Demand.
And dynamic desensitizes and result set can be desensitized, sql sentences can also be replaced, reach the effect of desensitization
Fruit.Both desensitization methods are contrasted, the method to be desensitized to result set, desensitization time is the quantity positive correlation with result set
's.And sql sentences are replaced, desensitization time should be the value of a relative constancy in theory.Therefore, how efficiently, peace
The problem of protection is in the urgent need to address at present is carried out to sensitive data entirely.
The content of the invention
It is an object of the invention to overcome the deficiencies in the prior art, proposes a kind of reasonable in design, highly effective and safe based on SQL
The dynamic desensitization method of paraphrasing.
The present invention solves its technical problem and takes following technical scheme to realize:
A kind of dynamic desensitization method rewritten based on SQL statement, is comprised the following steps:
Step 1:When whether judge current statement be query statement, if query statement, then participle operation is carried out, and press
Its Type Length information is indicated according to the order of sql sentences, generates the structured message after participle;
Step 2:Sql sentences after participle are analyzed, therefrom identify sensitive field, if sensitive character
String, the then rule set according to user is combined, does corresponding replacement, most query statement replaces with desensitization language at last by sensitive character string
Sentence.
Step 3, the sentence that will desensitize perform on the database, and the final field that desensitizes returns to desensitization result.
The participle operation is carried out for query statement;One, which is obtained, for query statement specifies various types of words
Language chained list;For full table query statement, it is necessary to which by the field included in current table, all tissue is into this query statement, then
Word segmentation processing is carried out to this sentence again.
The rule that the user is set includes sensitive field and sensitive algorithm.
The advantages and positive effects of the present invention are:
1st, the object of this dynamic desensitization algorithm operating is query statement, in the ideal situation, time and the desensitization word of consumption
The number direct proportionality of section, because it is not influenceed by the result set size inquired about, therefore efficiency can be higher.
2nd, this dynamic desensitization algorithm can be directly applied in production environment, pass through the control of authority to user, realization pair
The dynamic protection function of sensitive data.
Brief description of the drawings
Fig. 1 is the logical flow chart that the present invention is segmented to query statement;
Fig. 2 is the master processor program of the present invention;
Fig. 3 is the query processing logic of the present invention;
Fig. 4 is the string processing subfunction of the present invention.
Embodiment
The present invention is further described below in conjunction with accompanying drawing.
The present invention is that sql sentences are marked as into various types of objects, by defining the different attribute of different objects, with reference to
The rule (sensitive field, desensitize algorithm) that user is set identifies sensitive field, and the rule that terminal customers are set
Sensitive field in sql sentences is replaced.
The present invention includes two partial contents, and Part I is participle, and Part II is that logic is replaced in desensitization.Below to dividing
The principle of word illustrates, and is defined as follows concept first:
General character string (BS):Meet the general character string that data base key defines.
Comparison operator (CO):Be more than, be less than, being equal to, being not equal to, BETWEEN, LIKE, EXISTS, IN, NOT,
ISNULL、CASE、WHEN、DECODE。
Field terminal symbol (EO):The termination of identification field, including:Comma, FROM, THEN, ELSE, ', |.
Keep alias symbol (AO):Mark keeps the character of alias, including:Space, new-line, TAB, AS, END.
Alias character string (AS):Numerical value, right parenthesis, general character string (BS), single quotation marks, double quotation marks, NULL.
NUL (NS):Space, new-line, TAB.
The discarded symbol (DS) of field:When a general character string is followed by these characters, the general character string is represented not
It can be used to desensitize, such character includes:Left bracket.
Alias terminal symbol (EA):Comma and FROM.
Alias starting character (SA):
oracle:SELECT, DISTINCT, UNIQUE, ALL, comma.
mysql:ALL、DISTINCT、DISTINCTROW、HIGH_PRIORITY、STRAIGHT_JOIN、SQL_SMALL_
RESULT、SQL_BIG_RESULT、SQL_BUFFER_RESULT、SQL_CACHE、SQL_NO_CACHE、SQL_CALC_
FOUND_ROWS, comma, LOW_PRIORITY.
KS:Refer to the reserved word in associated databases.There is individual reserved word SYSDATE in oracle, this reserved word can
To appear in the form of fields in sql sentences.
The participle is carried out for query statement.One is obtained for query statement use above concept to specify respectively
The word chained list of type.Wherein there is a kind of query statement of specific type, i.e., full table (select*from tab) inquiry, this
, it is necessary to which the field included in current table is all organized into this query statement in the case of kind.Then this sentence is entered again
Row word segmentation processing.
It is a very important link in desensitization that logic is replaced in the desensitization.After desensitization replaces logic to participle
Sql sentences are analyzed, and it is sensitive field finally to judge which character string., then, will be quick according to rule if sensitive character string
Sense character string does corresponding replacement, and most query statement replaces with desensitization sentence at last.Sentence after replacement can perform on the database,
Final desensitization field returns to desensitization result.
In the present embodiment, following variable declaration is provided:
LL:The count value of left bracket, initial value 0
FC:FROM keyword count values, initial value 0
WC:WHERE keyword count values, initial value 0
AF:Alias marks, and=0 mark is not that the mark of alias=1 is alias
CF:Comparison operator marks ,=0 be not=1 be comparison operators
VM:Verification whether the mark that can be desensitized, acquiescence be 0- do not verify 1- verification
VM_RES:The result of verification desensitization mark.0- does not know (default value) 1- desensitizations -1 and not desensitized
M_POS:Need the cutting word position of keyword desensitized.
CL:CASE value is recorded, initial value is 0 (from increasing 1 when meeting case, subtracting certainly when running into end)
EA_F:Alias terminal symbol marks, and initial value 0,1- is alias terminal symbol
SA_F:Alias starting character, initial value 0,1- are alias starting characters
WA:With ... as count value, initial value 0
OB:ORDER BY count values
LW:Last word whether last word 0:It is not;1:It is
Need the variable returned:
Havestar:There are * labelled notations
WORDINFO:It is the storage organization body in SQL statement after each word participle.
Based on above-mentioned variable declaration, the dynamic desensitization method based on SQL statement rewriting that the present embodiment provides is including following
Step:
Step 1:When whether judge current statement be query statement, if query statement, then participle operation is carried out.
As shown in figure 1, in this step, first determine whether current statement is query statement, if not query statement,
Do not enter participle operation.If query statement, then enter participle operation, will segment and indicate it according to the order of sql sentences
The information such as Type Length, generate the structured message after participle.
One, which is obtained, for query statement use above concept specifies various types of word chained lists.For specific type
Query statement, i.e. full table (select*from tab) inquiry is in this case, it is necessary to complete by the field included in current table
Organize into this query statement in portion.Then word segmentation processing is carried out to this sentence again.
Step 2:Carried out taking word according to the information of generating structure, if currently taking word content to include select, entered
Step 3 carries out query processing, otherwise continues to take word.
As shown in Fig. 2 in this step, to take word to start, after taking word, judge whether current word is select, if
Select, then into step 3;If not select, then judge whether current word is left bracket, if not left bracket, after
It is continuous to take next word, go to determine whether select;If left bracket, then continue to take word, if it is space to take word content,
Continue to take word, after taking word, judge whether current word is SELECT, if SELECT, then into step 3, otherwise continue to take word,
Carry out the judgement of select or left bracket.
Step 3:Query processing step, specific handling process is as shown in figure 3, including following process:
1st, first determine whether current word is alias starting character.
By " starting point 2 ", judging whether current word (WORDINFO) is empty, if empty, enter and takes word logic;
If not sky, but current word is NUL, or annotation, or general character string, then enters and take word logic;
If current word is not alias starting character, alias starting character (SA_F=0) is set to 0, and is entered and taken word logic;
If current word is alias starting character, alias starting character (SA_F=1) puts 1, and enters and take word logic;
2nd, after taking word, desensitization process logic by mistake is entered;
Whether desensitization mark (vm) is 0, then enters the 3rd step;
Whether desensitization mark (vm) is 1, and current word is null character string, then enters and take word logic;
Current word is not null character string, and current word is the discarded symbol of field, then it is 0 to put desensitization mark (vm), alias terminal symbol
It is 0 to mark (EA_F), and the result (VM_RES) of verification desensitization mark is set to -1, without desensitization.And returning to needs to desensitize
Keyword cutting word position (M_POS), continue this position from M_POS and take word;
Current word is not the discarded symbol of field, then it is 0 to put desensitization mark (vm), and the result (VM_RES) of verification desensitization mark is put
For 1;
If current word is not null character string, nor during annotation, the cutting word position for the keyword for needing to desensitize is returned to
(M_POS) is put, continues this position from M_POS and takes word;
Otherwise, current word is alias terminal symbol, and it is 1 to put alias terminal symbol mark (EA_F);
Current word is not alias terminal symbol, and it is 0 to put alias terminal symbol mark (EA_F);Return to the keyword for needing to desensitize
Cutting word position (M_POS), continue this position from M_POS and take word;
Take after word, it is necessary to judge whether current word is last word, if last word is, it is necessary to put, last word
It is 1 to mark (LW).
The 3rd, if current word is SELECT, recursive call query processing function;Otherwise the 4th step is entered.
If the 4, current word is left bracket,
Word is taken, if the word got is not space, judges whether current word is select;
If the word got is space, continue to take word to operate, judge whether current word is select;
If select, alias mark (AF) is set to 1, then calls query processing function;
If not select, put left bracket counting (LL) and add 1 certainly;
Current word is WITH, the as that puts with ... count value (WA) value from plus 1, and return to and take word part.
Current word is not WITH, enters the 5th step.
5th, current word is not right parenthesis, enters the 6th step logic.
Current word is right parenthesis, if current left bracket, which counts, is more than 0, left bracket counts subtracts 1 certainly, and enters the 6th
Walk logic.
If current left bracket, which counts, is not more than 0, current function is exited, return to upper strata takes lexeme to put.
6th, current word is not CASE, enters the 7th step.
Current word is CASE, then the value (CL) for recording CASE adds 1 certainly.Enter the 7th step.
7th, current word is not END, into the 8th step.
Current word is END, and the value for recording CASE is more than 0, then the value for recording CASE subtracts 1 certainly;Into the 8th step.
The value for recording CASE is not more than 0, into the 8th step.
8th, current word is not AS, enters the 9th step.
Current word is AS, and with ... as count value is more than 0, then with ... as count value subtracts 1 certainly;Enter
9 steps.
With ... as count value is not more than 0, enters the 9th step.
9th, current word is not order by, enters the 10th step.
Current word is order by, then ORDER BY count values enter the 10th step from adding 1.
10th, current word is not star, enters the 11st step.
Current word is star, preserves result set, preserves current word scene, takes word,
It is space, continues to take word,
Current word is not alias terminal symbol (EA), restoration result collection, current word scene, enters the 11st step.
Current word is alias terminal symbol (EA), and the part of speech type for setting wordinfo* is none, restoration result collection, current word
Scene, enter the 11st step.
It is not space,
It is alias terminal symbol (EA), the part of speech type for setting wordinfo* is none, restoration result collection, current word scene, is entered
Enter to the 11st step.
It is not alias terminal symbol (EA), restoration result collection, current word scene, enters the 11st step.
11st, current word is not FROM, enters the 12nd step;
Current word is FROM, and it is 1 to put FROM keyword counts value (FC), and alias mark (AF) is 0, comparison operator mark
(CF) it is 0, returns to starting point 2.
12nd, current word is not WHERE,
FROM keyword counts value (FC) is not more than 0, enters string processing logical program (step 4);
FROM keyword counts value (FC) is more than 0,
Current word is UNION,
The count value (LL) of left bracket is not more than 0, exits function, return to upper strata takes word;
The count value (LL) of left bracket is more than 0, return to origin 2;
Current word is not UNION,
ORDER BY count values are not more than 0, return to origin 2;
ORDER BY count values are more than 0, enter string processing logical program (step 4);
13rd, current word is WHERE, and it is 0 to set alias to mark (AF), enters the 14th step.
14th, word is taken,
Current word is left bracket, and the count value (LL) of left bracket continues to take word from adding 1;
Current word is not left bracket,
Current word is right parenthesis,
The count value (LL) of left bracket is more than 0, then the count value (LL) of left bracket subtracts 1 certainly, continues to take word;
The count value (LL) of left bracket is not more than 0, then exits function, return to upper strata takes word.
Current word is not right parenthesis,
Current word is not UNION, continues to take word;
Current word is UNION,
The count value (LL) of left bracket is more than 0, continues to take word;
The count value (LL) of left bracket is not more than 0, exits function, returns to upper strata value.
Step 4:String processing step, specific handling process is as shown in figure 4, including following process:
1st, since starting point 3, current word is not comparison operator (CO), enters the 2nd step;
Current word is comparison operator (CO), and it is 1 to set comparison operator to mark (CF), and alias mark (AF) is 0;Return
To the starting point 2 of step 3.
2nd, current word is not field terminal symbol (EO), enters the 3rd step;
Current word is field terminal symbol (EO), and it is 0 to set comparison operator to mark (CF), and alias mark (AF) is 0;Return
To the starting point 2 of step 3.
3rd, current word is general character string (BS), enters the 4th step;
Current word is not general character string (BS),
Current word is that alias keeps symbol (AO), returns to the starting point 2 of step 3.
Current word is not that alias keeps symbol (AO), and it is 0 to set alias to mark (AF);
Current word is alias character string (AS), and it is 1 to set alias to mark (AF);Return to the starting point 2 of step 3.
Current word is not alias character string (AS),
Current word is not star (*) number, returns to the starting point 2 of step 3.
Current word is star (*) number, and it is 1 to set asterisk identifier (havestar), returns to the starting point 2 of step 3.
4th, it is not 1 that the state of current word, which sets alias to mark (AF), enters the 5th step.
It is 1 that the state of current word, which sets alias to mark (AF), and it is 0 to set alias to mark (AF);
Return to the starting point 2 of step 3.
5th, current word with ... as count value (WA) is not 1, enters the 6th step;
6th, current word with ... as count value (WA) is 1, returns to the starting point 2 of step 3.
7th, current word does not refer to the reserved word (KS) in associated databases, enters the 7th step.
Current word refers to the reserved word (KS) in associated databases, enters the 12nd step;
8th, current word is desensitization keyword, enters the 8th step;
Current word is not desensitization keyword, enters the 12nd step;
9th, the comparison operator mark (CF) of current word is 0, enters the 9th step;
The comparison operator mark (CF) of current word is not 0, enters the 12nd step;
10th, the result (VM_RES) of the verification desensitization mark of current word is -1, sets the result (VM_ of verification desensitization mark
RES it is) 0, the mark (VM) whether verify can desensitize is 0;Enter the 12nd step;
11st, the result (VM_RES) of the verification desensitization mark of current word is 0, sets the result (VM_ of verification desensitization mark
RES it is) 0, the mark (VM) whether verify can desensitize is 1;M_POS records the position of current word.
If current word is not last word, the starting point 2 of step 3 is returned to.
If current word is last word, the 11st step is entered.
12nd, the result (VM_RES) of the verification desensitization mark of current word is 0, sets the result (VM_ of verification desensitization mark
RES it is) 0, the mark (VM) whether verify can desensitize is 0;Desensitized using desensitization function to field;
The value (CL) that the count value (LL) of the left bracket of current word is more than 0 or record CASE is more than 0,
Current word is not alias character string (AS), returns to the starting point 2 of step 3.
Current word is alias character string (AS), and it is 1 to set alias to mark (AF), returns to the starting point 2 of step 3.
Otherwise,
If alias terminal symbol mark (EA_F) is 1, and alias starting character (SA_F) is 1, sets alias;Enter
12 steps;
Otherwise, the 12nd step is entered;
13rd, current word is not alias character string (AS), returns to the starting point 2 of step 3.
Current word is alias character string (AS), and it is 1 to set alias to mark (AF), returns to the starting point 2 of step 3.
It is emphasized that embodiment of the present invention is illustrative, rather than it is limited, therefore present invention bag
Include and be not limited to embodiment described in embodiment, it is every by those skilled in the art's technique according to the invention scheme
The other embodiment drawn, also belongs to the scope of protection of the invention.
Claims (3)
1. a kind of dynamic desensitization method rewritten based on SQL statement, it is characterised in that comprise the following steps:
Step 1:When whether judge current statement be query statement, if query statement, then participle operation is carried out, and according to
The order of sql sentences indicates its Type Length information, generates the structured message after participle;
Step 2:Sql sentences after participle are analyzed, therefrom identify sensitive field, if sensitive character string, then
The rule set according to user is combined, does corresponding replacement, most query statement replaces with desensitization sentence at last by sensitive character string;
Step 3, the sentence that will desensitize perform on the database, and the final field that desensitizes returns to desensitization result.
A kind of 2. dynamic desensitization method rewritten based on SQL statement according to claim 1, it is characterised in that:Described point
Word operation is carried out for query statement;One, which is obtained, for query statement specifies various types of word chained lists;For complete
Table query statement is, it is necessary to which by the field included in current table, all tissue is into this query statement, then again to this sentence
Carry out word segmentation processing.
A kind of 3. dynamic desensitization method rewritten based on SQL statement according to claim 1, it is characterised in that:The use
The rule that family is set includes sensitive field and sensitive algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711222369.7A CN107885876A (en) | 2017-11-29 | 2017-11-29 | A kind of dynamic desensitization method rewritten based on SQL statement |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711222369.7A CN107885876A (en) | 2017-11-29 | 2017-11-29 | A kind of dynamic desensitization method rewritten based on SQL statement |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107885876A true CN107885876A (en) | 2018-04-06 |
Family
ID=61775824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711222369.7A Pending CN107885876A (en) | 2017-11-29 | 2017-11-29 | A kind of dynamic desensitization method rewritten based on SQL statement |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107885876A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108776762A (en) * | 2018-06-08 | 2018-11-09 | 北京中电普华信息技术有限公司 | A kind of processing method and processing device of data desensitization |
CN109344370A (en) * | 2018-08-23 | 2019-02-15 | 阿里巴巴集团控股有限公司 | Sensitive content desensitization, restoring method, device and equipment |
CN111177788A (en) * | 2020-01-07 | 2020-05-19 | 北京启明星辰信息安全技术有限公司 | Hive dynamic desensitization method and dynamic desensitization system |
CN112765658A (en) * | 2021-01-15 | 2021-05-07 | 杭州数梦工场科技有限公司 | Data desensitization method and device, electronic equipment and storage medium |
CN112989412A (en) * | 2021-03-18 | 2021-06-18 | 城云科技(中国)有限公司 | Data desensitization method and device based on SQL statement analysis |
CN113392425A (en) * | 2020-03-12 | 2021-09-14 | 中移物联网有限公司 | Data desensitization processing method and device, edge computing node and server |
CN113722348A (en) * | 2021-06-24 | 2021-11-30 | 马上消费金融股份有限公司 | Processing method and device for Structured Query Language (SQL) statement and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609462A (en) * | 2012-01-14 | 2012-07-25 | 杭州安恒信息技术有限公司 | Method for compressed storage of massive SQL (structured query language) by means of extracting SQL models |
CN104077284A (en) * | 2013-03-26 | 2014-10-01 | 中国移动通信集团湖北有限公司 | Data security access method and data security access system |
CN106033461A (en) * | 2015-03-19 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Sensitive information query method and apparatus |
CN106203170A (en) * | 2016-07-19 | 2016-12-07 | 北京同余科技有限公司 | The Database Dynamic desensitization method of servicing of based role and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
CN107292167A (en) * | 2017-06-27 | 2017-10-24 | 北京计算机技术及应用研究所 | Based on the SQL statement safety detection method for simplifying syntax tree |
-
2017
- 2017-11-29 CN CN201711222369.7A patent/CN107885876A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609462A (en) * | 2012-01-14 | 2012-07-25 | 杭州安恒信息技术有限公司 | Method for compressed storage of massive SQL (structured query language) by means of extracting SQL models |
CN104077284A (en) * | 2013-03-26 | 2014-10-01 | 中国移动通信集团湖北有限公司 | Data security access method and data security access system |
CN106033461A (en) * | 2015-03-19 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Sensitive information query method and apparatus |
CN106203170A (en) * | 2016-07-19 | 2016-12-07 | 北京同余科技有限公司 | The Database Dynamic desensitization method of servicing of based role and system |
CN106228084A (en) * | 2016-07-19 | 2016-12-14 | 北京同余科技有限公司 | Data guard method that the sensitive field of based role dynamically adjusts and system |
CN107292167A (en) * | 2017-06-27 | 2017-10-24 | 北京计算机技术及应用研究所 | Based on the SQL statement safety detection method for simplifying syntax tree |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108776762A (en) * | 2018-06-08 | 2018-11-09 | 北京中电普华信息技术有限公司 | A kind of processing method and processing device of data desensitization |
CN108776762B (en) * | 2018-06-08 | 2022-01-28 | 北京中电普华信息技术有限公司 | Data desensitization processing method and device |
CN109344370A (en) * | 2018-08-23 | 2019-02-15 | 阿里巴巴集团控股有限公司 | Sensitive content desensitization, restoring method, device and equipment |
CN111177788A (en) * | 2020-01-07 | 2020-05-19 | 北京启明星辰信息安全技术有限公司 | Hive dynamic desensitization method and dynamic desensitization system |
CN113392425A (en) * | 2020-03-12 | 2021-09-14 | 中移物联网有限公司 | Data desensitization processing method and device, edge computing node and server |
CN112765658A (en) * | 2021-01-15 | 2021-05-07 | 杭州数梦工场科技有限公司 | Data desensitization method and device, electronic equipment and storage medium |
CN112989412A (en) * | 2021-03-18 | 2021-06-18 | 城云科技(中国)有限公司 | Data desensitization method and device based on SQL statement analysis |
CN113722348A (en) * | 2021-06-24 | 2021-11-30 | 马上消费金融股份有限公司 | Processing method and device for Structured Query Language (SQL) statement and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107885876A (en) | A kind of dynamic desensitization method rewritten based on SQL statement | |
KR102537275B1 (en) | Obfuscation of user content in structured user data files | |
CN107402995B (en) | Distributed newSQL database system and method | |
US11138162B2 (en) | Computer-implemented method for storing unlimited amount of data as a mind map in relational database systems | |
CN109582861B (en) | Data privacy information detection system | |
WO2021032002A1 (en) | Big data processing method based on heterogeneous distributed knowledge graph, device, and medium | |
CN106611037A (en) | Method and device for distributed diagram calculation | |
TW201423447A (en) | Dynamic data masking method and data library system | |
CN107590254B (en) | Big data support platform with merging processing method | |
CN113360676A (en) | Method and device for determining potential relation of enterprise based on knowledge graph | |
TW202101252A (en) | Method and device for displaying conversation information | |
CN107832440A (en) | A kind of data digging method, device, server and computer-readable recording medium | |
CN107526627A (en) | A kind of virtual resource life cycle information management method and device | |
CN106874394A (en) | A kind of method and apparatus of file packing pretreatment | |
CN109542418B (en) | Service code generation method and computer terminal | |
CN112258244B (en) | Method, device, equipment and storage medium for determining task to which target object belongs | |
CN103942056B (en) | A kind of man-machine interaction method and device based on scene | |
CN113779030B (en) | Enumeration value query method, readable storage medium, and computer program product | |
CN115098503A (en) | Null value data processing method and device, computer equipment and storage medium | |
CN115269654A (en) | Data cache supplementing method, device, equipment and medium | |
CN114185958A (en) | Blood relationship generation method and device, computer equipment and storage medium | |
CN110502731B (en) | Spreadsheet defect detection method based on refined cell clustering | |
CN110019828B (en) | Knowledge graph-based reference implementation verification method and system | |
CN110262792A (en) | The method that visualization deletes and adds key-value pair is realized by Angular | |
US11704094B2 (en) | Data integrity analysis tool |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180406 |