CN108289095A - A kind of sensitive data storage method, apparatus and system - Google Patents

A kind of sensitive data storage method, apparatus and system Download PDF

Info

Publication number
CN108289095A
CN108289095A CN201810002930.9A CN201810002930A CN108289095A CN 108289095 A CN108289095 A CN 108289095A CN 201810002930 A CN201810002930 A CN 201810002930A CN 108289095 A CN108289095 A CN 108289095A
Authority
CN
China
Prior art keywords
desensitization
business
data
keyword
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810002930.9A
Other languages
Chinese (zh)
Inventor
周圣韬
马良
李海岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cheng Yi Taihe (beijing) Science And Technology Co Ltd
Original Assignee
Cheng Yi Taihe (beijing) Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cheng Yi Taihe (beijing) Science And Technology Co Ltd filed Critical Cheng Yi Taihe (beijing) Science And Technology Co Ltd
Priority to CN201810002930.9A priority Critical patent/CN108289095A/en
Publication of CN108289095A publication Critical patent/CN108289095A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/48Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

This application provides a kind of sensitive data storage method, apparatus and systems, can promote the storage security of sensitive data.Including:According to pre-set business matching rule, business keyword is extracted from sensitive data;Desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;The business keyword in corresponding sensitive data is replaced using desensitization keyword, obtains desensitization data;The desensitization data are stored to the first equipment, the desensitization data service identification corresponding with the business matching rule of storage has mapping relations, the business keyword is stored to the second equipment, the mapping relations of the desensitization data and the business keyword of storage are built.

Description

A kind of sensitive data storage method, apparatus and system
Technical field
This application involves technical field of data security, in particular to a kind of sensitive data storage method, device and are System.
Background technology
With the development of information technology and Internet technology, the data of magnanimity can be all generated daily and are stored in corresponding Comprising having a large amount of privacy of user data, i.e. sensitive data in each database, for example, address name, identification card number, hand Machine number, various card numbers, customer ID etc. will cause great prestige if these sensitive datas are leaked to the information security of user The side of body.
In order to promote the safety of sensitive data, currently, after database receives data access request, to the number of storage According to data desensitization process is carried out, desensitization data are returned to user.Wherein, data desensitization refers to using desensitization rule, to sensitive number According to the deformation for carrying out data, desensitization rule includes:Encryption rule replaces processing rule, deformation process rule, Fuzzy Processing Rule etc..For example, authentication mode and user right according to the corresponding user of data access request, obtain corresponding desensitization rule Then, respective handling is carried out to sensitive data in ccf layer, obtain desensitization data and exported to the corresponding user of data access request Front end is shown, to realize the reliably protecting of sensitive data.
But the desensitization process method of the sensitive data, due to being to read original sensitive data from database to carry out desensitization place Reason, if attacker intercepts and captures the sensitive data read from database, may result in sensitivity by attack means attack database The leakage of data, to reduce the storage security of sensitive data.
Invention content
In view of this, the application's is designed to provide sensitive data storage method, apparatus and system, sensitivity can be promoted The storage security of data.
In a first aspect, the present invention provides sensitive data storage methods, including:
According to pre-set business matching rule, business keyword is extracted from sensitive data;
Desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;
The business keyword in corresponding sensitive data is replaced using desensitization keyword, obtains desensitization data;
The desensitization data are stored to the first equipment, the desensitization data of storage are corresponding with the business matching rule Service identification have mapping relations, the business keyword is stored to the second equipment, the desensitization data of storage are built With the mapping relations of the business keyword.
With reference to first aspect, the present invention provides the first possible embodiments of first aspect, wherein it is described according to According to pre-set business matching rule, before extracting business keyword in sensitive data, the method further includes:
From initial data, sensitive data is identified according to the sensitive data rule built in advance.
With reference to first aspect, the present invention provides second of possible embodiments of first aspect, wherein the foundation Pre-set business matching rule, extraction business keyword includes from sensitive data:
A business matching rule is extracted from pre-set business matching rule base, the business matching rule according to extraction Then, the business keyword of the corresponding business matching rule is extracted from the sensitive data;
Judge whether the business matching rule in business matching rule base is extracted to finish, be finished if not extracting, from business With the step of in the undrawn business matching rule of rule base, executing one business matching rule of extraction.
With reference to first aspect, the present invention provides the third possible embodiments of first aspect, wherein described pair carries The business keyword taken carries out desensitization process, obtains desensitization keyword and includes:
The business keyword of extraction is replaced, is obscured or random character replacement Treatment, obtains desensitizing accordingly crucial Word.
With reference to first aspect, in the possible embodiment of the first of first aspect to the third possible embodiment Any possible embodiment, the present invention provides the 4th kind of possible embodiments of first aspect, wherein is obtained described After the data that desensitize, the method further includes:
The desensitization data are encrypted.
With reference to first aspect, in the possible embodiment of the first of first aspect to the third possible embodiment Any possible embodiment, the present invention provides the 5th kind of possible embodiments of first aspect, wherein is obtained described After the data that desensitize, the method further includes:
The desensitization data are cut into multiple desensitization subdatas at random, for one desensitization subnumber of each desensitization subdata configuration According to mark;
Corresponding desensitization subdata key is generated based on desensitization subdata mark, it is corresponding to be identified to the desensitization subdata Desensitization subdata is encrypted.
With reference to first aspect, in the possible embodiment of the first of first aspect to the third possible embodiment Any possible embodiment, the present invention provides the 6th kind of possible embodiments of first aspect, wherein the method is also Including:
Sensitive data access request is received, the user identifier and target carried in the sensitive data access request is obtained Service identification;
Inquiry business identifies the mapping relations with desensitization data, obtains the desensitization data of the target service identity map;
Handle corresponding with the corresponding access rights of the user identifier is carried out to the desensitization data of acquisition.
The 6th kind of possible embodiment with reference to first aspect, the 7th kind the present invention provides first aspect are possible Embodiment, wherein the desensitization data progress of described pair of acquisition is corresponding with the corresponding access rights of the user identifier to handle packet It includes:
Determine that the user identifier corresponds to access rights;
If access rights are administrator-level access permission, the desensitization data and the business keyword according to storage Mapping relations, the business keyword of the desensitization data mapping obtained replace the acquisition according to obtained business keyword Desensitization data in desensitization keyword after export;
If access rights are regular grade access rights, the desensitization data of the acquisition are exported.
Second aspect, the present invention provides sensitive data storage devices, including:At business keyword-extraction module, desensitization Manage module, replacement module and storage processing module, wherein
Business keyword-extraction module, for according to pre-set business matching rule, industry to be extracted from sensitive data Business keyword;
Desensitization process module carries out desensitization process for the business keyword to extraction, obtains desensitization keyword;
Replacement module obtains desensitization number for replacing the business keyword in corresponding sensitive data using desensitization keyword According to;
Processing module is stored, for storing the desensitization data to the first equipment, the desensitization data of storage and institute Stating the corresponding service identification of business matching rule has mapping relations, and the business keyword is stored to the second equipment, structure The mapping relations of the desensitization data and the business keyword of storage.
The third aspect, the present invention provides sensitive data storage systems, including:Sensitive data processing equipment, the first equipment And second equipment, wherein
Sensitive data processing equipment, for according to pre-set business matching rule, business to be extracted from sensitive data Keyword;Desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;It is quick that correspondence is replaced using desensitization keyword Feel the business keyword in data, obtains desensitization data;
The desensitization data are sent to the first equipment, are interacted with first equipment so that the first equipment storage Desensitization data service identification corresponding with the business matching rule have mapping relations;By the business keyword to Second equipment is sent, and is interacted with second equipment, and the desensitization data of the second equipment storage and the business are built The mapping relations of keyword;
First equipment, for storing the desensitization data received;
Second equipment, for storing the business keyword received.
Sensitive data storage method provided by the embodiments of the present application, apparatus and system, sensitive data storage method include:According to According to pre-set business matching rule, business keyword is extracted from sensitive data;The business keyword of extraction is taken off Quick processing obtains desensitization keyword;The business keyword in corresponding sensitive data is replaced using desensitization keyword, obtains desensitization number According to;The desensitization data are stored to the first equipment, the desensitization data industry corresponding with the business matching rule of storage Business mark has mapping relations, and the business keyword is stored to the second equipment, the desensitization data and the institute of storage are built State the mapping relations of business keyword.In this way, before sensitive data storage, according to different business matching rules, to sensitive number According to business keyword extraction operation is carried out, original business key is replaced after carrying out desensitization process to the business keyword of extraction Word obtains desensitization data, desensitization data and business keyword is stored respectively, can promote the storage security of sensitive data.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to needed in the embodiment attached in order to illustrate more clearly of the technical solution of the embodiment of the present application Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 be the invention relates to a kind of sensitive data storage method flow diagram;
Fig. 2 be the invention relates to a kind of sensitive data storage method idiographic flow schematic diagram;
Fig. 3 be the invention relates to a kind of sensitive data memory device structure schematic diagram;
Fig. 4 be the invention relates to a kind of sensitive data memory system architecture schematic diagram.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, technical solutions in the embodiments of the present application are clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real Applying the component of example can be arranged and designed with a variety of different configurations.Therefore, below to the application's for providing in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, institute that those skilled in the art are obtained without making creative work There is other embodiment, shall fall in the protection scope of this application.
Fig. 1 be the invention relates to a kind of sensitive data storage method flow diagram.As shown in Figure 1, the stream Journey includes:
Step 101, according to pre-set business matching rule, business keyword is extracted from sensitive data;
In the present embodiment, different business have identical or different business matching rule, business by service identification into Row characterization, each service identification map a business matching rule.For example, by taking Mobile Directory Number as an example, for a certain business, example Such as, prize-winning Mobile Directory Number is broadcasted to user, in order to ensure that privacy of user, business matching rule are required to Mobile Directory Number In centre four (the 4th to the 7th) number carry out desensitization process, i.e., corresponding business keyword is intermediate four numbers Code;For another business, a certain movable Mobile Directory Number is participated in for example, announcing, business matching rule is required to mobile electricity Latter eight (the 4th to the 11st) numbers for talking about number carry out desensitization process, i.e., corresponding business keyword is latter eight numbers Code.
In the present embodiment, as an alternative embodiment, described according to pre-set business matching rule, from sensitive number Before middle extraction business keyword, this method further includes:
From initial data, sensitive data is identified according to the sensitive data rule built in advance.
In the present embodiment, as an alternative embodiment, sensitive data rule goes out the sensitive number in initial data for identification According to or sensitive field, can be built based on regular expression, other rules can also be based on, for example, Java rules are built.Example Such as, numeric type sensitive data for identification can be built based on regular expression, for example, date of birth, identification card number, mobile electricity The sensitive data rule for talking about number, bank's card number etc., text-type sensitive data for identification, example are built based on Java rules Such as, the sensitive data rule of user name, name, address etc..Certainly, in practical application, two or more can also be based on Rule come build sensitive data rule.
In the present embodiment, as an alternative embodiment, initial data can derive from each service application service device, for example, Financial server, ticket server etc..
In the present embodiment, carried from sensitive data according to pre-set business matching rule as an alternative embodiment The business keyword of taking includes:
A business matching rule is extracted from pre-set business matching rule base, the business matching rule according to extraction Then, the business keyword of the corresponding business matching rule is extracted from the sensitive data;
Judge whether the business matching rule in business matching rule base is extracted to finish, be finished if not extracting, from business With the step of in the undrawn business matching rule of rule base, executing one business matching rule of extraction.
In the present embodiment, if extraction finishes, terminates the flow for extracting business keyword from sensitive data, execute next Walk flow.
Step 102, desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;
In the present embodiment, as an alternative embodiment, desensitization process is carried out to the business keyword of extraction, desensitization is obtained and closes Key word includes:
The business keyword of extraction is replaced, is obscured or random character replacement Treatment, obtains desensitizing accordingly crucial Word.
In the present embodiment, to ensure the availability of desensitization data, as an alternative embodiment, for being replaced or at random The business keyword of character permutations processing, desensitization keyword and business keyword business rule having the same.For example, for moving Mobile phone number, it is desirable that be replaced or desensitization keyword that random character replacement Treatment obtains is number, and the keyword that desensitizes Digit it is identical as the digit of business keyword so that the desensitization data can be considered as Mobile Directory Number.
Step 103, the business keyword in corresponding sensitive data is replaced using desensitization keyword, obtains desensitization data;
In the present embodiment, as an alternative embodiment, after obtaining desensitization data, this method further includes:
The desensitization data are encrypted.
In the present embodiment, as another alternative embodiment, after obtaining desensitization data, this method further includes:
The desensitization data are cut into multiple desensitization subdatas at random, for one desensitization subnumber of each desensitization subdata configuration According to mark;
Corresponding desensitization subdata key is generated based on desensitization subdata mark, it is corresponding to be identified to the desensitization subdata Desensitization subdata is encrypted.
In the present embodiment, desensitization data are split as multiple desensitization subdatas, and carried out respectively to each desensitization subdata Encryption, it is ensured that each desensitization subdata is by independent encryption, to further promote the safety of desensitization data.
Step 104, the desensitization data are stored to the first equipment, the desensitization data of storage are matched with the business The corresponding service identification of rule has mapping relations, and the business keyword is stored to the second equipment, the described of storage is built The mapping relations for the data and the business keyword of desensitizing.
It in the present embodiment, as an alternative embodiment, is physically separated from one another between the first equipment and the second equipment, first sets It is standby to be located in same LAN with the second equipment.In this way, even if the data stored on a physical equipment are attacked or leaked, Leakage is also incomplete sensitive data, security threat will not be caused to privacy of user, so as to effectively promote information Safety.
As an alternative embodiment, desensitization data are stored in the desensitization database of the first equipment.The data that desensitize and business The mapping relations that identifying has can be key (Key)-value (Value) mapping relations, wherein key is the physical store of desensitization data The desensitization Data Position of address or structuring is worth for the data that desensitize.
Include that business keyword exists in the desensitization data of structure and the mapping relations of business keyword in the present embodiment Location information in corresponding desensitization data.
In the present embodiment, user identifier can be further obtained when obtaining sensitive data as an alternative embodiment, In the data hardship that desensitizes, the desensitization data and service identification and the mapping relations of user identifier of storage can also be set, In this way, corresponding desensitization data can be searched according to user identifier in follow-up.
In the present embodiment, as an alternative embodiment, stored to before the second equipment by the business keyword, the party Method further includes:
The business keyword is encrypted.
In the present embodiment, as an alternative embodiment, this method further includes:
A11, receive sensitive data access request, obtain the user identifier carried in the sensitive data access request and Target service identifies;
A12, the mapping relations of inquiry business mark and desensitization data, obtains the desensitization number of the target service identity map According to;
A13 carries out handle corresponding with the corresponding access rights of the user identifier to the desensitization data of acquisition.
In the present embodiment, since each desensitization data stored in desensitization database have mapping with corresponding service identification Relationship, thus, it is identified by target service, the desensitization data that can be mapped.
In the present embodiment, as an alternative embodiment, the user identifier carried in sensitive data access request is used comprising source Family identifies and target user's mark, wherein source user mark is for identifying the user for initiating sensitive data access request, target The user for the sensitive data mapping that user identifier is obtained for identification request.As an alternative embodiment, if sensitive data is visited Ask in request to include target user's mark, indicates that the user for initiating sensitive data access request need to only obtain target user's mark Corresponding sensitive data indicates that initiating sensitive data accesses if not including that target user identifies in sensitive data access request The user of request needs to obtain the corresponding sensitive data of target service mark.
In the present embodiment, as an alternative embodiment, visit corresponding with the user identifier is carried out to the desensitization data of acquisition Ask permission that processing includes accordingly:
Determine that the user identifier corresponds to access rights;
If access rights are administrator-level access permission, the desensitization data and the business keyword according to storage Mapping relations, the business keyword of the desensitization data mapping obtained replace the acquisition according to obtained business keyword Desensitization data in desensitization keyword after export;
If access rights are regular grade access rights, the desensitization data of the acquisition are exported.
In the present embodiment, if storage desensitization data be encrypted processing desensitization data, obtain desensitize data it Before, it needs that encrypted desensitization data are decrypted.
In the present embodiment, according to desensitization data with the business keyword in the mapping relations of business keyword corresponding de- Location information in quick data is replaced the field of corresponding position in desensitization data, to revert to sensitive data.
In the present embodiment, the data that will desensitize are split as with the situation of multiple desensitization subdatas and independent encryption, it is right successively Each encrypted desensitization subdata is decrypted, and the desensitization subdata that decryption obtains, which is carried out assembly, obtains desensitization data.
In the present embodiment, before sensitive data storage, according to different business matching rules, business is carried out to sensitive data Keyword extraction operates, and original business keyword is replaced after carrying out desensitization process to the business keyword of extraction, by the number that desensitizes Be stored respectively in disparate databases according to business keyword so that data storage when be desensitization data and nonsensitive data, Data storage layer face does not store sensitive data directly, can be attacked around loophole to avoid authentication, even if attacker passes through attacker Section attack database, intercepts and captures the data read from database, since what is stored in database is desensitization data, effectively reduces The disclosure risk of sensitive data improves the storage security of data;One by one to quick when it is possible to further avoid inquiry request Sense data carry out authentication desensitization, fundamentally avoid sensitive data leakage problem caused by misoperation on database purchase, Effectively evade direct exposure of the sensitive data in the processing of each level simultaneously;Moreover, in the user with regular grade access rights When carrying out data inquiry request, due to that need not carry out desensitization process to the data stored in database, data reading performance using redundancy is high, It can accelerate the inquiry request response time, promote efficiency data query.
Fig. 2 be the invention relates to a kind of sensitive data storage method idiographic flow schematic diagram.As shown in Fig. 2, By taking sensitive data is 13812345678 as an example, which includes:
Step 21, it detects and identifies the sensitive data for including in initial data;
In the present embodiment, the sensitive data identified is 13812345678.
Step 22, according to pre-set business matching rule, the business keyword in sensitive data is extracted, to extraction Business keyword updates sensitive data after carrying out desensitization process, obtains desensitization data;
In the present embodiment, business matching rule is two, and carrying out business keyword twice to sensitive data splits, and obtains As a result as follows:
Group 1:(138****5678)、(1234)
Group 2:(138********)、(12345678)
Step 23, dispersion storage desensitization data and business keyword.
In the present embodiment, desensitization data are stored in service database, business keyword is stored in desensitization database In, service database is located at from desensitization database on the different physical equipments in same LAN.
In the present embodiment, when carrying out sensitive data storage, according to different business demands (business matching rule), to quick Sense data are grouped fractionation, and according to the sensitive data of different grouping, the desensitization data in grouping are distinguished with business keyword It is stored in service database and desensitization database, sensitive data is directly isolated from physical layer.
Fig. 3 be the invention relates to a kind of sensitive data memory device structure schematic diagram.As shown in figure 3, the dress Set including:Business keyword-extraction module 31, desensitization process module 32, replacement module 33 and storage processing module 34, wherein
Business keyword-extraction module 31, for according to pre-set business matching rule, being extracted from sensitive data Business keyword;
In the present embodiment, different business have identical or different business matching rule, business by service identification into Row characterization, each service identification map a business matching rule.
In the present embodiment, as an alternative embodiment, business keyword-extraction module 31 includes:Business keyword extraction list Member and judging unit (not shown), wherein
Business keyword extraction unit, for extracting business matching rule from pre-set business matching rule base Then, the business matching rule according to extraction extracts the business keyword of the corresponding business matching rule from the sensitive data;
Judging unit, whether the business matching rule for judging in business matching rule base, which is extracted, finishes, if not extracting It finishes, from the undrawn business matching rule of business matching rule base, executes the step of extracting a business matching rule.
Desensitization process module 32 carries out desensitization process for the business keyword to extraction, obtains desensitization keyword;
In the present embodiment, as an alternative embodiment, the business keyword of described pair of extraction carries out desensitization process, is taken off Quick keyword includes:
The business keyword of extraction is replaced, is obscured or random character replacement Treatment, obtains desensitizing accordingly crucial Word.
In the present embodiment, to ensure the availability of desensitization data, as an alternative embodiment, for being replaced or at random The business keyword of character permutations processing, desensitization keyword and business keyword business rule having the same.For example, for moving Mobile phone number, it is desirable that be replaced or desensitization keyword that random character replacement Treatment obtains is number, and the keyword that desensitizes Digit it is identical as the digit of business keyword so that the desensitization data can be considered as Mobile Directory Number.
Replacement module 33 is desensitized for being replaced the business keyword in corresponding sensitive data using desensitization keyword Data;
Store processing module 34, for storing the desensitization data to the first equipment, the desensitization data of storage and The corresponding service identification of the business matching rule has mapping relations, and the business keyword is stored to the second equipment, structure Build the mapping relations of the desensitization data and the business keyword of storage.
In the present embodiment, as an alternative embodiment, desensitization data are stored in the desensitization database of the first equipment.Desensitization The mapping relations that data have with service identification can be key (Key)-value (Value) mapping relations, wherein key is desensitization data Physical storage address or structuring desensitization Data Position, be worth for desensitize data.
Include that business keyword exists in the desensitization data of structure and the mapping relations of business keyword in the present embodiment Location information in corresponding desensitization data.
In the present embodiment, as an alternative embodiment, which further includes:
Sensitive data identification module (not shown), for the sensitive data that from initial data, foundation is built in advance Rule identifies sensitive data.
In the present embodiment, as an alternative embodiment, sensitive data rule goes out the sensitive number in initial data for identification According to or sensitive field, can be built based on regular expression, other rules can also be based on, for example, Java rules are built.
In the present embodiment, as an alternative embodiment, initial data can derive from each service application service device, for example, Financial server, ticket server etc..
In the present embodiment, as another alternative embodiment, which further includes:
First encrypting module, the desensitization data for being obtained to replacement module are encrypted, output to storage processing module.
In the present embodiment, as yet another alternative embodiment, which further includes:
Second encrypting module is each desensitization for the desensitization data to be cut into multiple desensitization subdatas at random The desensitization subdata mark of data configuration one;Corresponding desensitization subdata key is generated based on desensitization subdata mark, with de- to this Quick subdata identifies corresponding desensitization subdata and is encrypted.
In the present embodiment, as yet another alternative embodiment, which further includes:
Third encrypting module, for being stored to before the second equipment by the business keyword, to business key Word is encrypted, output to storage processing module.
In the present embodiment, as yet another alternative embodiment, which further includes:
Access request processing module is obtained for receiving sensitive data access request in the sensitive data access request The user identifier and target service of carrying identify;Inquiry business identifies the mapping relations with desensitization data, obtains the target The desensitization data of service identification mapping;Locate corresponding with the corresponding access rights of the user identifier is carried out to the desensitization data of acquisition Reason.
In the present embodiment, as an alternative embodiment, access request processing module includes:Resolution unit, query unit with And permission processing unit, wherein
Resolution unit obtains the use carried in the sensitive data access request for receiving sensitive data access request Family identifies and target service mark;
Query unit identifies the mapping relations with the data that desensitize for inquiry business, obtains the target service mark and reflects The desensitization data penetrated;
Permission processing unit carries out corresponding with the corresponding access rights of the user identifier for the desensitization data to acquisition Processing.
In the present embodiment, as an alternative embodiment, permission processing unit includes:Permission determination subelement, first access Permission handles subelement and the second access rights handle subelement, wherein
Permission determination subelement, for determining that the user identifier corresponds to access rights;
First access rights handle subelement, if access rights are administrator-level access permission, according to the described de- of storage The mapping relations of quick data and the business keyword, the business keyword of the desensitization data mapping obtained, foundation obtain Business keyword replace the desensitization keyword in the desensitization data of the acquisition after export;
Second access rights handle subelement, if access rights are regular grade access rights, by the desensitization number of the acquisition According to output.
Fig. 4 be the invention relates to a kind of sensitive data memory system architecture schematic diagram.As shown in figure 4, this is System includes:Sensitive data processing equipment 41, the first equipment 42 and the second equipment 43, wherein
Sensitive data processing equipment 41, for according to pre-set business matching rule, industry to be extracted from sensitive data Business keyword;Desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;It is replaced and is corresponded to using desensitization keyword Business keyword in sensitive data obtains desensitization data;
The desensitization data are sent to the first equipment 42, are interacted with the first equipment 42 so that the first equipment storage Desensitization data service identification corresponding with the business matching rule have mapping relations;By the business keyword to Second equipment 43 is sent, and is interacted with the second equipment 43, and the desensitization data of the second equipment storage and the business are built The mapping relations of keyword;
First equipment 42, for storing the desensitization data received;
Second equipment 43, for storing the business keyword received.
In the present embodiment, the sensitive data storage device of sensitive data processing equipment 41 as shown in figure 3 is identical, is omitted here It is described in detail.
In the present embodiment, the first equipment 42 and the second equipment 43 are two equipment being physically detached from each other, and are located at same In LAN.
In embodiment provided herein, it should be understood that disclosed device and method, it can be by others side Formula is realized.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only one kind are patrolled Volume function divides, formula that in actual implementation, there may be another division manner, in another example, multiple units or component can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some communication interfaces, device or unit It connects, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in embodiment provided by the present application can be integrated in a processing unit, also may be used It, can also be during two or more units be integrated in one unit to be that each unit physically exists alone.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of step. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing, in addition, term " the One ", " second ", " third " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Finally it should be noted that:Embodiment described above, the only specific implementation mode of the application, to illustrate the application Technical solution, rather than its limitations, the protection domain of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, it will be understood by those of ordinary skill in the art that:Any one skilled in the art In the technical scope that the application discloses, it can still modify to the technical solution recorded in previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution.The protection in the application should all be covered Within the scope of.Therefore, the protection domain of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of sensitive data storage method, which is characterized in that this method includes:
According to pre-set business matching rule, business keyword is extracted from sensitive data;
Desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;
The business keyword in corresponding sensitive data is replaced using desensitization keyword, obtains desensitization data;
The desensitization data are stored to the first equipment, the desensitization data industry corresponding with the business matching rule of storage Business mark has mapping relations, and the business keyword is stored to the second equipment, the desensitization data and the institute of storage are built State the mapping relations of business keyword.
2. the method as described in claim 1, which is characterized in that described according to pre-set business matching rule, from quick Before feeling extracting data business keyword, the method further includes:
From initial data, sensitive data is identified according to the sensitive data rule built in advance.
3. the method as described in claim 1, which is characterized in that it is described according to pre-set business matching rule, from sensitivity Extracting data business keyword includes:
Extract a business matching rule from pre-set business matching rule base, according to the business matching rule of extraction, from The business keyword of the corresponding business matching rule is extracted in the sensitive data;
Judge whether the business matching rule in business matching rule base is extracted to finish, be finished if not extracting, matches and advise from business Then in the undrawn business matching rule in library, the step of extracting a business matching rule is executed.
4. the method as described in claim 1, which is characterized in that the business keyword of described pair of extraction carries out desensitization process, obtains Include to desensitization keyword:
The business keyword of extraction is replaced, is obscured or random character replacement Treatment, the keyword that desensitizes accordingly is obtained.
5. such as Claims 1-4 any one of them method, which is characterized in that it is described obtain desensitization data after, the method Further include:
The desensitization data are encrypted.
6. such as Claims 1-4 any one of them method, which is characterized in that it is described obtain desensitization data after, the method Further include:
The desensitization data are cut into multiple desensitization subdatas at random, for one desensitization subdata mark of each desensitization subdata configuration Know;
Corresponding desensitization subdata key is generated based on desensitization subdata mark, to identify corresponding desensitization to the desensitization subdata Subdata is encrypted.
7. such as Claims 1-4 any one of them method, which is characterized in that the method further includes:
Sensitive data access request is received, the user identifier and target service carried in the sensitive data access request is obtained Mark;
Inquiry business identifies the mapping relations with desensitization data, obtains the desensitization data of the target service identity map;
Handle corresponding with the corresponding access rights of the user identifier is carried out to the desensitization data of acquisition.
8. the method for claim 7, which is characterized in that the desensitization data of described pair of acquisition carry out and the user identifier Processing includes corresponding access rights accordingly:
Determine that the user identifier corresponds to access rights;
If access rights are administrator-level access permission, the mapping of the desensitization data and the business keyword according to storage Relationship, the business keyword of the desensitization data mapping obtained replace the de- of the acquisition according to obtained business keyword It is exported after desensitization keyword in quick data;
If access rights are regular grade access rights, the desensitization data of the acquisition are exported.
9. a kind of sensitive data storage device, which is characterized in that the device includes:Business keyword-extraction module, desensitization process Module, replacement module and storage processing module, wherein
Business keyword-extraction module, for according to pre-set business matching rule, business pass to be extracted from sensitive data Key word;
Desensitization process module carries out desensitization process for the business keyword to extraction, obtains desensitization keyword;
Replacement module obtains desensitization data for replacing the business keyword in corresponding sensitive data using desensitization keyword;
Processing module is stored, for storing the desensitization data to the first equipment, the desensitization data and the industry of storage The corresponding service identification of matching rule of being engaged in has mapping relations, and the business keyword is stored to the second equipment, structure storage The desensitization data and the business keyword mapping relations.
10. a kind of sensitive data storage system, which is characterized in that the system includes:Sensitive data processing equipment, the first equipment with And second equipment, wherein
Sensitive data processing equipment, for according to pre-set business matching rule, it is crucial that business to be extracted from sensitive data Word;Desensitization process is carried out to the business keyword of extraction, obtains desensitization keyword;Corresponding sensitive number is replaced using desensitization keyword Business keyword in obtains desensitization data;
The desensitization data are sent to the first equipment, are interacted with first equipment so that the institute of the first equipment storage Stating desensitization data service identification corresponding with the business matching rule has mapping relations;By the business keyword to second Equipment is sent, and is interacted with second equipment, and the desensitization data and the business for building the second equipment storage are crucial The mapping relations of word;
First equipment, for storing the desensitization data received;
Second equipment, for storing the business keyword received.
CN201810002930.9A 2018-01-02 2018-01-02 A kind of sensitive data storage method, apparatus and system Pending CN108289095A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810002930.9A CN108289095A (en) 2018-01-02 2018-01-02 A kind of sensitive data storage method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810002930.9A CN108289095A (en) 2018-01-02 2018-01-02 A kind of sensitive data storage method, apparatus and system

Publications (1)

Publication Number Publication Date
CN108289095A true CN108289095A (en) 2018-07-17

Family

ID=62834836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810002930.9A Pending CN108289095A (en) 2018-01-02 2018-01-02 A kind of sensitive data storage method, apparatus and system

Country Status (1)

Country Link
CN (1) CN108289095A (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409121A (en) * 2018-09-07 2019-03-01 阿里巴巴集团控股有限公司 Desensitization process method, apparatus and server
CN109583226A (en) * 2018-10-26 2019-04-05 平安科技(深圳)有限公司 Data desensitization process method, apparatus and electronic equipment
CN109726572A (en) * 2018-12-28 2019-05-07 中国移动通信集团江苏有限公司 Data management-control method, device, equipment, computer storage medium and system
CN109788145A (en) * 2018-11-15 2019-05-21 西安天钥科技有限公司 Method of calling, the server that desensitizes, equipment of attending a banquet and computer readable storage medium
CN110008744A (en) * 2019-03-28 2019-07-12 平安科技(深圳)有限公司 Data desensitization method and relevant apparatus
CN110059081A (en) * 2019-03-13 2019-07-26 深圳壹账通智能科技有限公司 Data output method, device and the computer equipment shown based on data
CN110113315A (en) * 2019-04-12 2019-08-09 平安科技(深圳)有限公司 A kind of processing method and equipment of business datum
CN110245505A (en) * 2019-05-20 2019-09-17 中国平安人寿保险股份有限公司 Tables of data access method, device, computer equipment and storage medium
CN110866281A (en) * 2019-11-20 2020-03-06 满江(上海)软件科技有限公司 Safety compliance processing system and method for sensitive data
CN111079165A (en) * 2019-12-18 2020-04-28 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN111262835A (en) * 2020-01-09 2020-06-09 青岛海尔科技有限公司 Desensitization storage method and device for sensitive data
CN111290721A (en) * 2020-01-20 2020-06-16 北京大米未来科技有限公司 Online interaction control method, system, electronic device and storage medium
CN111625845A (en) * 2020-04-17 2020-09-04 沈阳派客动力科技有限公司 Security management method, device and equipment for big data
CN111832062A (en) * 2019-04-19 2020-10-27 珠海金山办公软件有限公司 Method and device for desensitizing selected area data in table file
CN112651039A (en) * 2020-11-18 2021-04-13 国网江苏省电力有限公司营销服务中心 Electric power data differentiation desensitization method and device fusing service scenes
CN113051357A (en) * 2021-03-08 2021-06-29 中国地质大学(武汉) Vector map optimization local desensitization method based on game theory
CN113127919A (en) * 2019-12-30 2021-07-16 航天信息股份有限公司 Data processing method and device, computing equipment and storage medium
CN113259382A (en) * 2021-06-16 2021-08-13 上海有孚智数云创数字科技有限公司 Data transmission method, device, equipment and storage medium
CN113360947A (en) * 2021-06-30 2021-09-07 杭州网易再顾科技有限公司 Data desensitization method and device, computer readable storage medium and electronic equipment
CN113642036A (en) * 2021-07-07 2021-11-12 阿里巴巴新加坡控股有限公司 Data processing method, device and system
CN114722412A (en) * 2022-04-15 2022-07-08 北京科杰科技有限公司 Data security storage method and device, electronic equipment and storage medium
WO2022166829A1 (en) * 2021-02-03 2022-08-11 易保网络技术(上海)有限公司 Data masking method and system, data restoration method and system, computer device, and medium
CN115277099A (en) * 2022-06-29 2022-11-01 锦图计算技术(深圳)有限公司 Function security method based on Android system and related equipment
CN115688184A (en) * 2022-12-26 2023-02-03 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium
CN116502270A (en) * 2023-06-21 2023-07-28 中科迅联智慧网络科技(北京)有限公司 Invoice data privacy method and system
CN117235781A (en) * 2023-08-21 2023-12-15 广州市玄武无线科技股份有限公司 Data desensitization method, system, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975870A (en) * 2016-05-19 2016-09-28 上海点荣金融信息服务有限责任公司 Data desensitization method and system
CN106959955A (en) * 2016-01-11 2017-07-18 中国移动通信集团陕西有限公司 The data processing method and device of a kind of database
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
US20170337386A1 (en) * 2016-05-23 2017-11-23 Informatica Llc Method, apparatus, and computer-readable medium for automated construction of data masks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106959955A (en) * 2016-01-11 2017-07-18 中国移动通信集团陕西有限公司 The data processing method and device of a kind of database
CN105975870A (en) * 2016-05-19 2016-09-28 上海点荣金融信息服务有限责任公司 Data desensitization method and system
US20170337386A1 (en) * 2016-05-23 2017-11-23 Informatica Llc Method, apparatus, and computer-readable medium for automated construction of data masks
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李芳等: "《计算机网络安全》", 31 October 2017 *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409121A (en) * 2018-09-07 2019-03-01 阿里巴巴集团控股有限公司 Desensitization process method, apparatus and server
CN109583226A (en) * 2018-10-26 2019-04-05 平安科技(深圳)有限公司 Data desensitization process method, apparatus and electronic equipment
CN109788145A (en) * 2018-11-15 2019-05-21 西安天钥科技有限公司 Method of calling, the server that desensitizes, equipment of attending a banquet and computer readable storage medium
CN109726572A (en) * 2018-12-28 2019-05-07 中国移动通信集团江苏有限公司 Data management-control method, device, equipment, computer storage medium and system
CN110059081A (en) * 2019-03-13 2019-07-26 深圳壹账通智能科技有限公司 Data output method, device and the computer equipment shown based on data
CN110008744A (en) * 2019-03-28 2019-07-12 平安科技(深圳)有限公司 Data desensitization method and relevant apparatus
CN110113315A (en) * 2019-04-12 2019-08-09 平安科技(深圳)有限公司 A kind of processing method and equipment of business datum
CN111832062A (en) * 2019-04-19 2020-10-27 珠海金山办公软件有限公司 Method and device for desensitizing selected area data in table file
CN110245505A (en) * 2019-05-20 2019-09-17 中国平安人寿保险股份有限公司 Tables of data access method, device, computer equipment and storage medium
CN110866281A (en) * 2019-11-20 2020-03-06 满江(上海)软件科技有限公司 Safety compliance processing system and method for sensitive data
CN111079165A (en) * 2019-12-18 2020-04-28 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN111079165B (en) * 2019-12-18 2022-05-17 深圳我家云网络科技有限公司 Data processing method, data processing device, equipment and storage medium
CN113127919A (en) * 2019-12-30 2021-07-16 航天信息股份有限公司 Data processing method and device, computing equipment and storage medium
CN111262835A (en) * 2020-01-09 2020-06-09 青岛海尔科技有限公司 Desensitization storage method and device for sensitive data
CN111290721A (en) * 2020-01-20 2020-06-16 北京大米未来科技有限公司 Online interaction control method, system, electronic device and storage medium
CN111625845A (en) * 2020-04-17 2020-09-04 沈阳派客动力科技有限公司 Security management method, device and equipment for big data
CN112651039A (en) * 2020-11-18 2021-04-13 国网江苏省电力有限公司营销服务中心 Electric power data differentiation desensitization method and device fusing service scenes
WO2022166829A1 (en) * 2021-02-03 2022-08-11 易保网络技术(上海)有限公司 Data masking method and system, data restoration method and system, computer device, and medium
CN113051357A (en) * 2021-03-08 2021-06-29 中国地质大学(武汉) Vector map optimization local desensitization method based on game theory
CN113051357B (en) * 2021-03-08 2022-09-30 中国地质大学(武汉) Vector map optimization local desensitization method based on game theory
CN113259382A (en) * 2021-06-16 2021-08-13 上海有孚智数云创数字科技有限公司 Data transmission method, device, equipment and storage medium
CN113360947B (en) * 2021-06-30 2022-07-26 杭州网易再顾科技有限公司 Data desensitization method and device, computer readable storage medium and electronic equipment
CN113360947A (en) * 2021-06-30 2021-09-07 杭州网易再顾科技有限公司 Data desensitization method and device, computer readable storage medium and electronic equipment
CN113642036A (en) * 2021-07-07 2021-11-12 阿里巴巴新加坡控股有限公司 Data processing method, device and system
CN113642036B (en) * 2021-07-07 2023-07-28 阿里巴巴华北技术有限公司 Data processing method, device and system
CN114722412A (en) * 2022-04-15 2022-07-08 北京科杰科技有限公司 Data security storage method and device, electronic equipment and storage medium
CN115277099A (en) * 2022-06-29 2022-11-01 锦图计算技术(深圳)有限公司 Function security method based on Android system and related equipment
CN115688184A (en) * 2022-12-26 2023-02-03 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium
CN116502270A (en) * 2023-06-21 2023-07-28 中科迅联智慧网络科技(北京)有限公司 Invoice data privacy method and system
CN117235781A (en) * 2023-08-21 2023-12-15 广州市玄武无线科技股份有限公司 Data desensitization method, system, device and storage medium

Similar Documents

Publication Publication Date Title
CN108289095A (en) A kind of sensitive data storage method, apparatus and system
US11630918B2 (en) Systems and methods of determining compromised identity information
Volety et al. Cracking Bitcoin wallets: I want what you have in the wallets
US7797549B2 (en) Secure method and system for biometric verification
CN109598509B (en) Identification method and device for risk group partner
CN108229158B (en) Method for protecting user privacy information stored in Android
CN109614816A (en) Data desensitization method, device and storage medium
CN109766700A (en) Access control method and device, the storage medium, electronic device of file
JP2017091515A (en) Computer-implemented system and method for automatically identifying attributes for anonymization
US6990586B1 (en) Secure data transmission from unsecured input environments
CN110457957A (en) Information processing method, device, electronic equipment and the medium of electronic bill
CN106682505A (en) Virus detection method, terminal, server and system
SE529203C2 (en) Method to counter the local, automatic tapping capabilities of spyware in computers
CN108153858A (en) Information-pushing method, device, storage medium and computer equipment
CN109766479A (en) Data processing method, device, electronic equipment and storage medium
US20170337386A1 (en) Method, apparatus, and computer-readable medium for automated construction of data masks
CN108769024A (en) A kind of data capture method and majority are according to operator negotiation service system
CN112685771A (en) Log desensitization method, device, equipment and storage medium
CN112613051A (en) Data encryption storage method and device, computer equipment and storage medium
CN108205575A (en) Data processing method and device
EP1817713B1 (en) Method for identifying a user by means of modified biometric characteristics and a database for carrying out said method
CN108229210A (en) A kind of method, terminal and computer readable storage medium for protecting data
CN110489992A (en) Desensitization method and system based on big data platform
CN110503549B (en) Data processing method, device, system, electronic equipment and medium
CN107632775A (en) Information sharing method, device and terminal between a kind of user's space

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180717

RJ01 Rejection of invention patent application after publication