CN110020553A - A kind of method and system for protecting sensitive data - Google Patents
A kind of method and system for protecting sensitive data Download PDFInfo
- Publication number
- CN110020553A CN110020553A CN201910293345.3A CN201910293345A CN110020553A CN 110020553 A CN110020553 A CN 110020553A CN 201910293345 A CN201910293345 A CN 201910293345A CN 110020553 A CN110020553 A CN 110020553A
- Authority
- CN
- China
- Prior art keywords
- sensitive data
- data
- database
- sensitive
- classification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of method and system for protecting sensitive data, belong to the safe Treatment process field of government data.The method of protection sensitive data of the invention; this method includes carrying out finding and arranging sensitive data to sensitive data; to the sensitive data scan database of discovery; classification classification is carried out to each sensitive field using the data classification grade scale of foundation, the permission of different user in database, different objects comb and supervision authority changes.The method of the protection sensitive data of the invention can ensure that sensitive data is accurately and efficiently found and combed, and all protect to each outlet of sensitive data, and the probability of data leak event generation is effectively reduced, and have good application value.
Description
Technical field
The present invention relates to the safe Treatment process field of government data, a kind of method that protecting sensitive data is specifically provided and is
System.
Background technique
With cloud computing, the fast development of big data, " internet+" is widely applied in government affairs capacity building;Various regions
The government affairs cloud of government is built to get through data silo, big data is shared, based on cloud platform construction, and target is to realize to run with data
Road runs away instead of people, simplifies the working link of common people and enterprise;It is final to realize that a window is accepted, allow common people and enterprise to handle thing
Xiang Shi, " at most running primary ", so that government affairs cloud effectively be landed, establishes the proprietary cloud application of government affairs of " internet+government affairs ".But
It is during data " flowing ", there are many incipient fault for data security: protects the angle for closing rule from network safety grade
Degree meets government affairs cloud data safety and closes rule, eliminates the problem of private data leakage risk is the task of top priority;From government affairs cloud and big number
According to the supervision angle of platform, then whether be concerned about data " health ", whether data true, complete, credible, data use process is medium
Whether can be leaked and be distorted in batches.Data are the discovery that one of important component of data safety, main purpose are to do sensitivity
The discovery and classification work of data.In government affairs cloud business scenario, with being continuously increased for data assets, administrator is often
How many platform of the database of oneself on cloud be difficult to get information about, how to be distributed, if is opened.It is special according to the business of government affairs cloud
Sign, sensitive data generally comprise personal cell-phone number, address, social security information, common reserve fund information, house property information, diagnosis information etc.,
The non-publicity item information such as tax information, the equity information of enterprise.These information are extremely important to a industry or enterprise, once it lets out
Leakage, not only causes damages to the prestige of government, it is most likely that causes economic loss to personal or enterprise, therefore, it is necessary to sensitivity
The access of data needs to carry out stringent control.
Summary of the invention
Technical assignment of the invention is that in view of the above problems, providing one kind can ensure sensitive data by accurate high
The discovery of effect ground and combing, and each outlet of sensitive data is all protected, the general of data leak event generation is effectively reduced
The method of the protection sensitive data of rate.
The further technical assignment of the present invention is to provide a kind of system for protecting sensitive data.
To achieve the above object, the present invention provides the following technical scheme that
A method of protection sensitive data, this method include carrying out discovery to sensitive data and carrying out to sensitive data whole
Reason divides each sensitive field the sensitive data scan database of discovery using the data classification grade scale of foundation
Class classification comb to the permission of different user in database, different objects and supervision authority changes.
Preferably, carrying out carrying out cloud database sniff, the cloud being reconfigured first in discovery procedure to sensitive data
Database.
Preferably, cloud database sniff provides the function of searching for proprietary middle database automatically, IP sections and port are formulated
Range scans for.
Preferably, the essential information that cloud database is found automatically includes: port numbers, type of database, database reality
Example name and database server ip address.
Preferably, being the field setting identification matching algorithm in data source, obtaining in the cloud database that configuration obtains
After configured data source and the algorithm set, each table of data source is carried out with the random sampling of behavior unit, it will
Data are identified by the matching algorithm set.
Preferably, classification classification is carried out to the sensitive data identified during arranging to sensitive data, according to
Different data feature, classifies to sensitive data.
Preferably, different sensitive ranks is specified when classifying to sensitive data for different data types, from
It is dynamic that susceptibility scoring is carried out to the table comprising sensitive data, mode and library.
A kind of system for protecting sensitive data, which includes sensitive data discovery module and sensitive data sorting module;
Sensitive data discovery module is for finding sensitive data, and to the sensitive data scan database of discovery;
Sensitive data sorting module carries out classification classification to each sensitive field using the data classification grade scale of foundation,
The permission of different user in database, different objects comb and supervision authority variation.
Preferably, sensitive data discovery module carry out cloud database first in discovery procedure and smell to sensitive data
Visit, the cloud database being reconfigured, cloud database sniff provides searches for the function of proprietary middle database automatically, formulate IP section with
The range of port scans for, and the essential information that cloud database is found automatically includes: port numbers, type of database, database
Instance Name and database server ip address.
Preferably, during the sensitive data sorting module arranges sensitive data, to the sensitivity identified
Data carry out classification classification, specified for different data types when classifying to sensitive data according to different data feature
Different sensitive ranks carries out susceptibility scoring to the table comprising sensitive data, mode and library automatically.
Compared with prior art, the method for protection sensitive data of the invention has following prominent the utility model has the advantages that described
The method administrator of protection sensitive data can more intuitively understand how many platform of the database of oneself on cloud, how to be distributed, be
No unlatching can increase substantially the accuracy and speed of data classification classification, use manpower and material resources sparingly;Make simultaneously according to according to data
Role, responsibility and other IT of user define identity characteristic, dynamically carry out special safe handling to the data that request returns,
It can ensure that the data consumer of the different stage access sensitive data apt according to its identity characteristic, data be effectively reduced and let out
The probability that leakage event occurs has good application value.
Detailed description of the invention
Fig. 1 is the flow chart of the specific embodiment of the method for protection sensitive data of the present invention.
Specific embodiment
Below in conjunction with embodiment, the method and system of protection sensitive data of the invention are described in further detail.
Embodiment
The method of protection sensitive data of the invention, including discovery is carried out to sensitive data and sensitive data is carried out whole
Reason divides each sensitive field the sensitive data scan database of discovery using the data classification grade scale of foundation
Class classification comb to the permission of different user in database, different objects and supervision authority changes.
The background data base of government affairs cloud large-scale application has a tables up to a hundred and thousands of column, to protect core data to provide
It produces, first it is to be understood which data is sensitive data, table and column is scanned by sensitive data discovery feature, it is close to find
The sensitive datas such as code, identification information, credit card, while user passes through the side of customized sensitive objects search key
Formula finds the specific sensitive data of user.Role, responsibility and other IT according to data consumer define identity characteristic, dynamic
The data that request is returned carry out special safe handling, it is ensured that the data consumer of different stage is proper according to its identity characteristic
Such as the access sensitive data of its point, the probability of data leak event generation is effectively reduced.
Sensitive data is found and is arranged, data staging classification mechanism is improved: in data in use, different number
According to different sensitive rank and level of confidentiality is possessed, security strategy needed for the data of different stage and reinforcing mode are all different.
By the deciding grade and level mechanism perfect to sensitive data, administrator is assisted to judge table in database, mode and the sensitive rank in whole library, just
In further formulating government affairs cloud Data Security or taking suitable data reinforcement measure, different grades of sensitive data is protected.
Administrator understands the permission variation of data assets by the variation of monitoring data permission in real time, according to user's dimension, right
As dimension carries out analysis and arrangement to the permission of database, the situation of change of permission between different rounds scannings is compared.Real time inspection,
Show the real-time secured views of database;Periodic scanning reflects variation of the current safety situation relative to baseline, checks detailed
Changing condition realizes the unified management to sensitive data.
Sensitive data is carried out to carry out cloud database sniff first in discovery procedure, the cloud database being reconfigured.
Its medium cloud database sniff provides searches for the function of proprietary middle database automatically, formulate IP section with the range of port into
Row search.The essential information that cloud database is found automatically includes: port numbers, type of database, database instance name and data
Library server ip address.It configures in obtained cloud database, is the field setting identification matching algorithm in data source, is obtaining
After the data source of configuration and the algorithm set, each table of data source will count with the random sampling of behavior unit
It is identified according to by the matching algorithm set.Hit rate can be set in matching algorithm, if certain column is to matching algorithm
Hit rate is up to standard, then the field is sensitive field, and it is 80%, 90%, 95% that hit rate, which can be adjusted according to the actual situation,.
If recognizing sensitive data field, record and save.By automatic identification sensitive data, avoid according to field definition
The cumbersome work of sensitive data member, while the sensitive data that lasting discovery is new.
During arranging to sensitive data, classification classification is carried out to the sensitive data identified, according to different data
Feature classifies to sensitive data.Different sensitivities is specified when classifying to sensitive data for different data types
Rank carries out susceptibility scoring to the table comprising sensitive data, mode and library automatically.
According to different data feature, to common such as name, certificate number, bank account, the amount of money, date, address, phone number
Code, the address Email, license plate number, Vehicle Identify Number, enterprise name, industrial and commercial registration number, organization mechanism code, Taxpayer Identification Number etc. are quick
Sense data are classified.Specify different sensitive ranks for different data types, system is automatically to containing sensitive data
Table, mode, library carry out susceptibility scoring.
To different user in database, the permission of different objects comb and supervision authority variation.To needing control
The database of limit creates a corresponding resource table;Access user is created again, user's table is established, then by user and money
Source opening relationships, establishes user resources relation table, comprising type of database, ID, database user name, close in the information of configuration
Code, chained address, port etc..It is different with the user for authorizing different to different access user configuration one or more resources
Access the permission of resource.When user query database, the database-name of user query is obtained, judges whether user has access
Permission;If there is the access authority of database, then judge whether user has the access authority of table again;If user has corresponding table
Permission, then corresponding field information is obtained from corresponding database and table according to database name and table name and returns to user.
The case where being accessed by which user the object in database carries out induction and conclusion, especially to the table for containing sensitive columns or
The higher object of susceptibility scoring, monitors emphatically its access authority dividing condition.Sensitivity can be used normally in the user having permission
Data, the user of permission does not need to initiate approval request then using sensitive data, cannot use if examination & approval do not pass through quick
Feel data.
When application query sensitive data, by data safety network gateway to the result set that inquiry returns carry out parsing line by line,
Compare filtering, and to sensitive data carry out desensitization masking processing after, return to API.Preservation tactics are as follows: defaulting to all quick
Sense information is covered;By Provisioning Policy, the application system of authorization is handled without masking or part masking;It is awarded in examination & approval
Under the premise of power passes through, data API can inform the data that do not cover by parameter.
Operation maintenance personnel can have permission inquiry data, meeting during carrying out daily O&M to the data in database
There is the phenomenon that inquiring in violation of rules and regulations, Preservation tactics are as follows: all O&M operations, it is necessary to by the mistake of database security gateway
It filters (being namely connected in series in network), the result set data of O&M inquiry is filtered, according to the type of field, carry out corresponding
Masking processing;The operation of operation maintenance personnel of auditing inquiry sensitive data, and analysis alarm is carried out to User behavior.
It can be stored in due to sensitive data in the index data of ES system, be retrieved for total factor and carry out full-text search inquiry,
Therefore there may be sensitive data in query result, total factor retrieval application is to be completed by " retrieval API " to ES index data
Full-text search, and collection data are returned the result by the API.Preservation tactics are as follows: disposing number in " retrieval API " service routine
According to filter assemblies;Retrieval API calls filter assemblies to the result set data of return line by line, and filter assemblies unidirectionally add to data
It is compared after close;If comparison result finds sensitive data, corresponding masking processing is carried out to sensitive data, such as deviate and take
Whole, mask shielding, flexibly coding etc..
As shown in Figure 1, the method for protection sensitive data of the invention, detailed process is as follows:
1) data use: data use is divided into total factor retrieval application, application system use and data O&M.
2) API, data safety network gateway are retrieved: disposing " data filtering " component, filtering group in " retrieval API " service routine
Part is compared to after the result progress One-Way Encryption of return with sensitive data;Data safety network gateway produces the result for needing milk to O&M
Collection data are filtered and carry out relevant masking processing.
3) data sharing: first shared data to be compared with sensitive data inventory before data sharing, to sensitive number
It is then exported again according to desensitize.
4) control flow: sensitive data can be used in the user having permission, and the user of permission does not need to initiate to examine to ask
It asks, sensitive data cannot be used if examination & approval do not pass through.
5) sensitive data encryption storage: the storage of sensitive data is encrypted, prevents from being dragged library and the person of being managed
It checks.
The system of protection sensitive data of the invention, the system include that sensitive data discovery module and sensitive data arrange mould
Block;
Sensitive data discovery module is for finding sensitive data, and to the sensitive data scan database of discovery;
Sensitive data sorting module carries out classification classification to each sensitive field using the data classification grade scale of foundation,
The permission of different user in database, different objects comb and supervision authority variation.
Preferably, sensitive data discovery module carry out cloud database first in discovery procedure and smell to sensitive data
Visit, the cloud database being reconfigured, cloud database sniff provides searches for the function of proprietary middle database automatically, formulate IP section with
The range of port scans for, and the essential information that cloud database is found automatically includes: port numbers, type of database, database
Instance Name and database server ip address.
Preferably, during the sensitive data sorting module arranges sensitive data, to the sensitivity identified
Data carry out classification classification, specified for different data types when classifying to sensitive data according to different data feature
Different sensitive ranks carries out susceptibility scoring to the table comprising sensitive data, mode and library automatically.
Embodiment described above, the only present invention more preferably specific embodiment, those skilled in the art is at this
The usual variations and alternatives carried out within the scope of inventive technique scheme should be all included within the scope of the present invention.
Claims (10)
1. a kind of method for protecting sensitive data, it is characterised in that: this method includes carrying out discovery to sensitive data and to sensitivity
Data are arranged, to the sensitive data scan database of discovery, using the data classification grade scale of foundation to each sensitivity
Field carries out classification classification, comb to the permission of different user in database, different objects and supervision authority changes.
2. the method for protection sensitive data according to claim 1, it is characterised in that: carry out discovery procedure to sensitive data
In carry out cloud database sniff first, the cloud database being reconfigured.
3. the method for protection sensitive data according to claim 2, it is characterised in that: the offer of cloud database sniff is searched automatically
The function of the proprietary middle database of rope, the range for formulating IP sections and port scan for.
4. the method for protection sensitive data according to claim 3, it is characterised in that: the base that cloud database is found automatically
This information includes: port numbers, type of database, database instance name and database server ip address.
5. the method for protection sensitive data according to claim 4, it is characterised in that: in the cloud database configured,
Matching algorithm is identified for the field setting in data source, after the configured data source of acquisition and the algorithm set, to data
The each table in source identified data by the matching algorithm set with the random sampling of behavior unit.
6. the method for protection sensitive data according to claim 5, it is characterised in that: carry out arrangement process to sensitive data
In, classification classification is carried out to the sensitive data identified, according to different data feature, is classified to sensitive data.
7. the method for protection sensitive data according to claim 6, it is characterised in that: carry out classification hour hands to sensitive data
Different sensitive ranks is specified to different data types, and susceptibility is carried out to the table comprising sensitive data, mode and library automatically
Scoring.
8. a kind of system for protecting sensitive data, it is characterised in that: the system includes sensitive data discovery module and sensitive data
Sorting module;
Sensitive data discovery module is for finding sensitive data, and to the sensitive data scan database of discovery;
Sensitive data sorting module carries out classification classification, logarithm to each sensitive field using the data classification grade scale of foundation
Comb according to the permission of different user in library, different objects and supervision authority variation.
9. the system of protection sensitive data according to claim 8, it is characterised in that: sensitive data discovery module is to sensitivity
Data carry out carrying out cloud database sniff first in discovery procedure, and the cloud database being reconfigured, cloud database sniff provides
Automatically the function of proprietary middle database is searched for, the range for formulating IP sections and port scans for, what cloud database was found automatically
Essential information includes: port numbers, type of database, database instance name and database server ip address.
10. the system of protection sensitive data according to claim 9, it is characterised in that: the sensitive data sorting module
During arranging to sensitive data, classification classification is carried out to the sensitive data identified, according to different data feature, to quick
Sense data specify different sensitive ranks for different data types when being classified, automatically to the table comprising sensitive data,
Mode and library carry out susceptibility scoring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910293345.3A CN110020553A (en) | 2019-04-12 | 2019-04-12 | A kind of method and system for protecting sensitive data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910293345.3A CN110020553A (en) | 2019-04-12 | 2019-04-12 | A kind of method and system for protecting sensitive data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110020553A true CN110020553A (en) | 2019-07-16 |
Family
ID=67191196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910293345.3A Pending CN110020553A (en) | 2019-04-12 | 2019-04-12 | A kind of method and system for protecting sensitive data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110020553A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110399749A (en) * | 2019-08-05 | 2019-11-01 | 杭州安恒信息技术股份有限公司 | Data assets management method and system |
CN110661776A (en) * | 2019-07-29 | 2020-01-07 | 奇安信科技集团股份有限公司 | Sensitive data tracing method, device, security gateway and system |
CN110795751A (en) * | 2019-10-30 | 2020-02-14 | 浪潮云信息技术有限公司 | Method for carrying out safety protection on sensitive data through natural language analysis |
CN110941956A (en) * | 2019-10-26 | 2020-03-31 | 华为技术有限公司 | Data classification method, device and related equipment |
CN112069183A (en) * | 2020-09-07 | 2020-12-11 | 中国平安财产保险股份有限公司 | Shielded data management method and device, electronic equipment and readable storage medium |
CN112085374A (en) * | 2020-09-04 | 2020-12-15 | 浪潮云信息技术股份公司 | Intelligent monitoring object abnormity self-checking pushing method |
CN112231715A (en) * | 2020-11-11 | 2021-01-15 | 福建有度网络安全技术有限公司 | Data leakage warning method and related device |
CN112417391A (en) * | 2020-10-28 | 2021-02-26 | 深圳市橡树黑卡网络科技有限公司 | Information data security processing method, device, equipment and storage medium |
CN112861142A (en) * | 2021-02-22 | 2021-05-28 | 北京安华金和科技有限公司 | Database risk level determination method and device, storage medium and electronic device |
CN113347213A (en) * | 2021-08-05 | 2021-09-03 | 环球数科集团有限公司 | Trusted channel authentication system based on protection of sensitive data of evanescent member |
CN114205118A (en) * | 2021-11-17 | 2022-03-18 | 南方电网数字电网研究院有限公司 | Data access control analysis method based on data security method category |
CN114339734A (en) * | 2022-03-04 | 2022-04-12 | 深圳市恒讯通电子有限公司 | Wireless communication network data sharing method and device based on mobile equipment |
CN114372286A (en) * | 2021-12-17 | 2022-04-19 | 刘维炜 | Data security management method and device, computer equipment and storage medium |
CN115659407A (en) * | 2022-12-15 | 2023-01-31 | 北京市大数据中心 | Data asset processing method, device and medium |
CN116881687A (en) * | 2023-06-25 | 2023-10-13 | 国网冀北电力有限公司信息通信分公司 | Power grid sensitive data identification method and device based on feature extraction |
CN117194751A (en) * | 2023-11-08 | 2023-12-08 | 杭州易康信科技有限公司 | Government electronic data screening method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376272A (en) * | 2014-11-13 | 2015-02-25 | 青岛龙泰天翔通信科技有限公司 | Cloud computing enterprise information system and user right setting method thereof |
CN105095519A (en) * | 2015-09-18 | 2015-11-25 | 北京金山安全软件有限公司 | User data management method and device and electronic equipment |
CN105721245A (en) * | 2016-02-02 | 2016-06-29 | 四川长虹电器股份有限公司 | Network data sniffing realization method based on rapid connection protocol |
CN106789964A (en) * | 2016-12-02 | 2017-05-31 | 中国移动通信集团新疆有限公司 | Cloud resource pool data safety detection method and system |
CN109525671A (en) * | 2018-11-26 | 2019-03-26 | 远光软件股份有限公司 | Date storage method, electronic equipment and storage medium based on block chain |
-
2019
- 2019-04-12 CN CN201910293345.3A patent/CN110020553A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376272A (en) * | 2014-11-13 | 2015-02-25 | 青岛龙泰天翔通信科技有限公司 | Cloud computing enterprise information system and user right setting method thereof |
CN105095519A (en) * | 2015-09-18 | 2015-11-25 | 北京金山安全软件有限公司 | User data management method and device and electronic equipment |
CN105721245A (en) * | 2016-02-02 | 2016-06-29 | 四川长虹电器股份有限公司 | Network data sniffing realization method based on rapid connection protocol |
CN106789964A (en) * | 2016-12-02 | 2017-05-31 | 中国移动通信集团新疆有限公司 | Cloud resource pool data safety detection method and system |
CN109525671A (en) * | 2018-11-26 | 2019-03-26 | 远光软件股份有限公司 | Date storage method, electronic equipment and storage medium based on block chain |
Non-Patent Citations (1)
Title |
---|
九天科技: "《黑客攻防从新手到高手》", 31 October 2013 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110661776B (en) * | 2019-07-29 | 2021-12-24 | 奇安信科技集团股份有限公司 | Sensitive data tracing method, device, security gateway and system |
CN110661776A (en) * | 2019-07-29 | 2020-01-07 | 奇安信科技集团股份有限公司 | Sensitive data tracing method, device, security gateway and system |
CN110399749B (en) * | 2019-08-05 | 2021-04-23 | 杭州安恒信息技术股份有限公司 | Data asset management method and system |
CN110399749A (en) * | 2019-08-05 | 2019-11-01 | 杭州安恒信息技术股份有限公司 | Data assets management method and system |
CN110941956A (en) * | 2019-10-26 | 2020-03-31 | 华为技术有限公司 | Data classification method, device and related equipment |
CN110795751A (en) * | 2019-10-30 | 2020-02-14 | 浪潮云信息技术有限公司 | Method for carrying out safety protection on sensitive data through natural language analysis |
CN112085374A (en) * | 2020-09-04 | 2020-12-15 | 浪潮云信息技术股份公司 | Intelligent monitoring object abnormity self-checking pushing method |
CN112069183A (en) * | 2020-09-07 | 2020-12-11 | 中国平安财产保险股份有限公司 | Shielded data management method and device, electronic equipment and readable storage medium |
CN112069183B (en) * | 2020-09-07 | 2024-05-03 | 中国平安财产保险股份有限公司 | Method and device for managing shielding data, electronic equipment and readable storage medium |
CN112417391B (en) * | 2020-10-28 | 2023-12-19 | 深圳市橡树黑卡网络科技有限公司 | Information data security processing method, device, equipment and storage medium |
CN112417391A (en) * | 2020-10-28 | 2021-02-26 | 深圳市橡树黑卡网络科技有限公司 | Information data security processing method, device, equipment and storage medium |
CN112231715A (en) * | 2020-11-11 | 2021-01-15 | 福建有度网络安全技术有限公司 | Data leakage warning method and related device |
CN112861142A (en) * | 2021-02-22 | 2021-05-28 | 北京安华金和科技有限公司 | Database risk level determination method and device, storage medium and electronic device |
CN113347213A (en) * | 2021-08-05 | 2021-09-03 | 环球数科集团有限公司 | Trusted channel authentication system based on protection of sensitive data of evanescent member |
CN114205118B (en) * | 2021-11-17 | 2023-10-27 | 南方电网数字电网研究院有限公司 | Data access control analysis method based on data security method category |
CN114205118A (en) * | 2021-11-17 | 2022-03-18 | 南方电网数字电网研究院有限公司 | Data access control analysis method based on data security method category |
CN114372286A (en) * | 2021-12-17 | 2022-04-19 | 刘维炜 | Data security management method and device, computer equipment and storage medium |
CN114339734A (en) * | 2022-03-04 | 2022-04-12 | 深圳市恒讯通电子有限公司 | Wireless communication network data sharing method and device based on mobile equipment |
CN115659407A (en) * | 2022-12-15 | 2023-01-31 | 北京市大数据中心 | Data asset processing method, device and medium |
CN116881687A (en) * | 2023-06-25 | 2023-10-13 | 国网冀北电力有限公司信息通信分公司 | Power grid sensitive data identification method and device based on feature extraction |
CN116881687B (en) * | 2023-06-25 | 2024-04-05 | 国网冀北电力有限公司信息通信分公司 | Power grid sensitive data identification method and device based on feature extraction |
CN117194751A (en) * | 2023-11-08 | 2023-12-08 | 杭州易康信科技有限公司 | Government electronic data screening method and system |
CN117194751B (en) * | 2023-11-08 | 2024-04-19 | 杭州易康信科技有限公司 | Government electronic data screening method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110020553A (en) | A kind of method and system for protecting sensitive data | |
Lee et al. | An effective security measures for nuclear power plant using big data analysis approach | |
CN111738549A (en) | Food safety risk assessment method, device, equipment and storage medium | |
CN112417492A (en) | Service providing method based on data classification and classification | |
CN107577939A (en) | Data leakage prevention method based on keyword technology | |
US11381591B2 (en) | Information security system based on multidimensional disparate user data | |
CN110020687B (en) | Abnormal behavior analysis method and device based on operator situation perception portrait | |
Bellomarini et al. | COVID-19 and company knowledge graphs: assessing golden powers and economic impact of selective lockdown via AI reasoning | |
CN111915331A (en) | Enterprise credit investigation data management method and system based on block chain | |
CN113709170A (en) | Asset safe operation system, method and device | |
Hajian | Simultaneous discrimination prevention and privacy protection in data publishing and mining | |
CN117670023A (en) | Customer service center call platform data security risk assessment method based on artificial intelligence | |
CN116738449A (en) | DSMM-based data security management and control and operation system | |
De et al. | A refinement approach for the reuse of privacy risk analysis results | |
Makarova | Determining the choice of attack methods approach | |
CN114205118A (en) | Data access control analysis method based on data security method category | |
CN117473527A (en) | Data security risk analysis method, device, equipment and storage medium | |
Alzahrani | Estimating Security Risk of Healthcare Web Applications: A Design Perspective. | |
Zaki et al. | Analyzing financial fraud cases using a linguistics-based text mining approach | |
Nayak et al. | Automatic detection and analysis of dpp entities in legal contract documents | |
Dvojmoč | Corporate intelligence as the new reality: The necessity of corporate security in modern global business | |
CN116263761A (en) | Operation log auditing method, device, computing equipment and storage medium | |
Pavolotsky | Demystifying big data | |
Malek | Bigger Is Always Not Better; less Is More, Sometimes: The Concept of Data Minimization in the Context of Big Data | |
Komanovics | WORKPLACE PRIVACY IN THE EU: THE IMPACT OF EMERGING TECHNOLOGIES ON EMPLOYEE’S FUNDAMENTAL RIGHTS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190716 |