Desensitize regular configuration method and data desensitization method, system, computer equipment
Technical field
The present embodiments relate to field of computer data processing more particularly to a kind of regular configuration methods of desensitization, and
Data desensitization method, system, computer equipment, computer readable storage medium.
Background technique
It is higher and higher to the attention degree of individual privacy and network security with the extensive use of network technology.Enterprise's number
It is more and more according to the customer data stored in library, be especially stored in electric business platform and banking system a large amount of customer information or
Transaction Information etc. and privacy and safety-related sensitive information, such as customer name, certificate information, contact address and contact method
Deng.How client individual privacy is protected, at currently needing one of the problem of paying close attention to.
In addition, staff when safeguarding database, when desensitization rule needs to make rectification, generally requires multiple
Each page is rectified and improved respectively, leads to database maintenance low efficiency.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention is that providing a kind of data desensitization method, system, computer equipment and meter
Calculation machine readable storage medium storing program for executing can rectify and improve the unified of the field shielding rules of the page each in complication system, avoid to every
One page is rectified and improved respectively, and workload needed for effectively reducing rectification improves the upgrading efficiency of desensitization rule.
To achieve the above object, the embodiment of the invention provides a kind of regular configuration methods of desensitization, comprising the following steps:
S1. accessing page request is sent;
S2. the corresponding address URL is obtained based on the accessing page request, and the page is arranged according to the address URL
Page hierarchical identification;
S3. the business information that server is returned according to the accessing page request is received;
Whether S4. inquired in the page according to the business information includes sensitive information field;
S5. if including the sensitive information field, by the page hierarchical identification, the sensitive information field and corresponding
Shielding rules establish mapping relations, and the mapping relations are configured in desensitization rule list;
S6. step S1~S6 is repeated for next page, until the desensitization rule list is configured to finish.
Preferably, the step S4 further include:
The business information is matched with each key character of preset keyword symbol concentration or key-strings;And
If being matched to the key character or key-strings concentrated in the business information including the key character, sentence
Breaking includes sensitive information field in the page.
Preferably, the step S5 further include:
The place field type of the sensitive information field is stored in the desensitization rule list.
Preferably, further include the steps that increasing sensitive information field and corresponding field shielding rules:
The corresponding URL of each page and business information are read from the storage region;
Whether inquiry includes sensitive information field to be added, if including described to be added in wherein one or more pages
When sensitive information field, by the page hierarchical identification of the one or more page, sensitive information field to be added and corresponding screen
It covers rule and establishes mapping relations, and the mapping relations are added in desensitization rule list.
The embodiment of the invention also provides a kind of data desensitization methods, which comprises
The accessing request information of information for the target page to server transmission is inputted according to user;
Receive the data to be desensitized that the server is returned based on the accessing request information;And
The data to be desensitized are converted into desensitization data, the desensitization rule list according to preconfigured desensitization rule list
Mapping relations including page hierarchical identification, sensitive information field and field shielding rules, the page hierarchical identification is basis
The address URL of the target pages is pre-set, and the mapping relations include being preconfigured in the desensitization rule list
Sub- mapping relations between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pages
Sensitive information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
Preferably, in described the step of receiving the data to be desensitized that the server is returned based on the accessing request information
Between the described the step of data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list, also wrap
It includes:
The data to be desensitized are intercepted, it is described to be stored in buffer zone after the data that desensitize are intercepted;And
The data to be desensitized are obtained from the buffer zone.
Preferably, the step that the data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list
After rapid, comprising:
The desensitization data are provided to the view layer progress page to show.
The embodiment of the invention also provides data desensitization systems, comprising:
Sending module, for inputting the accessing request information of information for the target page to server transmission according to user;
Receiving module, the data to be desensitized returned for receiving the server based on the accessing request information;And
Desensitize module, for the data to be desensitized to be converted to desensitization data according to preconfigured desensitization rule list,
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the page
Hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include be preconfigured in institute
It states in desensitization rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules
Sub- mapping relations:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pages
Sensitive information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
To achieve the above object, the embodiment of the invention also provides a kind of computer equipment, the computer equipment storages
Device, processor and it is stored in the computer program that can be run on the memory and on the processor, the computer journey
The step of data desensitization method as described above is realized when sequence is executed by processor.
To achieve the above object, the embodiment of the invention also provides a kind of computer readable storage medium, the computers
Computer program is stored in readable storage medium storing program for executing, the computer program can be performed by least one processor, so that institute
State the step of at least one processor executes data desensitization method as described above.
Data desensitization method, system, computer equipment and computer readable storage medium provided in an embodiment of the present invention lead to
The mapping relations between the page hierarchical identification in desensitization rule list, the sensitive information field and corresponding shielding rules are crossed,
The similar field of different levels is allowed to map the same field shielding rules, when the field shielding rules to certain class field are done
When modifying out, which can be implemented in all pages comprising such field, without to point
The other modification that field shielding rules are carried out to each page.
It can be appreciated that using the technical solution of the present embodiment to the whole of the field shielding rules of the page each in complication system
Change, avoid and each page is rectified and improved respectively, workload needed for effectively reducing rectification improves the upgrading of desensitization rule
Efficiency.
Detailed description of the invention
Fig. 1 is the running environment schematic diagram of the regular configuration method of desensitization of the embodiment of the present invention.
Fig. 2 is the flow chart of the regular configuration method embodiment one of present invention desensitization.
Fig. 3 is the flow chart of data desensitization method embodiment two of the present invention.
Fig. 4 is the flow chart of data desensitization method embodiment three of the present invention.
Fig. 5 is the program module schematic diagram of data of the present invention desensitization system embodiment four.
Fig. 6 is the hardware structural diagram of computer equipment embodiment five of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot
It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims
Protection scope within.
Fig. 1 is the running environment schematic diagram of the regular configuration method of desensitization of the embodiment of the present invention.Computer equipment 2 is exemplary
Connection server or server cluster, be stored with customer information in the server or server cluster.
Microsoft Windows, Linux, Mac OS, Android, IOS etc. can be run in the computer equipment 2
Operating system, and be mounted in aforesaid operations system browser application (e.g., IE browser, Chrome browser etc.) or
Customer end A pp.Data interaction is carried out by the browser application or customer end A pp and server.
Following embodiment will be that executing subject carries out exemplary description with computer equipment 2.
Embodiment one
Referring to Fig.2, the step flow chart of the regular configuration method of the desensitization for showing the embodiment of the present invention one.It is appreciated that
Flow chart in this method embodiment, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S100 sends the accessing page request of accession page.
Illustratively, an automatic test script can be configured in computer equipment 2, for stepping on according to pre-defined rule simulation
Each page or menu in land and access client App.
Illustratively, computer equipment 2 can also configure user graphical interface, and staff can be connect by graphical user
Mouth is transmitted into the accessing page request of each page to computer equipment 2.
Step S102 obtains corresponding URL (Uniform Resource locator system based on the accessing page request
One Resource Locator) address, and the page hierarchical identification of the page is set according to the address URL.
For example, when entering the specified second level page from first level pages: due to including that triggering enters each two in first level pages
The button of the grade page, each button are associated with the link or page path of a direction second level page.When some button is by with triggering,
Then the link according to associated by the button that is triggered or page path obtain the second level page corresponding with the button that is triggered
URL。
It include the file path that band has levels in the address URL, i.e., the corresponding file path of the described page.Pass through the band
The file path having levels can correspond to the page setup page hierarchical identification, and the page hierarchical identification includes the address URL
In the corresponding file path of the page, the page hierarchical identification of each page is identified by setting number.For example, can be with
For digital number, 060301,060302 etc. is set by each first level pages, the second level page under first level pages 060301 is set
It is set to 06030101, is 06030201 etc. by the second level page setup under first level pages 060302, and so on.It can be appreciated that
Pass through the page hierarchical identification for each page configuration, so that it may obtain the page relation between each page.Certainly, this programme
It is not limited to indicate the page hierarchical identification of each page using digital number, letter etc. can also be passed through.
Step S104 receives the business information that server is returned according to the accessing page request.
After the server receives the accessing page request, the accessing page request can be parsed, and in response to
The accessing page request obtains the business information from database.
Illustratively, the accessing page request is based on HTTP (hypertext transfer protocol, HyperText Transfer
Protocol) the HTTP request message of agreement.The HTTP request message can be grasped by existing HTTP resolver
Make.Wherein, the HTTP request message includes: the method (GET) of request, URL, protocol version etc..
GET method, it is desirable that the URL resource positioned is placed on the data portion of response message by database, is passed back to computer
Equipment 2.Therefore, database can be believed in response to " method " and " URL " in the HTTP request message, the business of returning response
Breath.
In the present embodiment, the business information can be the page of server return (e.g., based on the specific page of HTML
Face) in field information.The field information includes field name etc., which can be made of character or character string.
Whether step S106, being inquired in the page according to the business information includes sensitive information field.If so, into
Enter step S108;If not, entering step S100 to execute the investigation operation of sensitive information field for each and every one the next page.
Specifically, step S106 may include steps of:
S106A carries out each key character or key-strings that the business information and preset keyword symbol are concentrated
Matching.The character or character string that the preset keyword symbol is concentrated are for being associated with all kinds of client's individual privacy data and certain passes
The sensitive traffic data of key, such as: customer name, customer name etc.;Address: home address, CompanyAddress etc.;Mailbox: company
Mailbox, common mailbox etc.;Phone: mobile phone, fixed-line telephone etc.;Certificate: identity card, passport, officer's identity card etc.;Account number: bank card, visitor
Family number, the tax registration number, organization mechanism code, business license number etc.;Postcode: company's postcode, home zip code etc.;Date:
Birthday etc..For example, character string " " is associated with passport NO., character string " " associated client title etc..
S106B, if being matched to the key character or key character concentrated in the business information including the key character
String then judges to include sensitive information field in the page.
When illustratively, such as in the business information being matched to &custName, then judge to include quick in the page
Feel information field, that is, includes being related to the sensitive information field of customer name.
The page hierarchical identification, the sensitive information field and corresponding shielding rules are established and are mapped by step S108
Relationship, and the mapping relations are configured in desensitization rule list.
It is exemplary, configuration desensitization rule list, the desensitization rule list include shielding rules table, multiple sensitive information field lists and
Multiple page hierarchical identification tables.The shielding rules table is used for storing each shielding rules table, each sensitive information field list
Multiple field names of similar field in the page of storage different levels, each page hierarchical identification table have together for storing
The page hierarchical identification of class field.
It is associated between each table by external key, for example, some shielding rules in some shielding rules table are outside
One sensitive information field list of key relationship maps, i.e. this shielding rules are suitable for the associated sensitive information field list
All sensitivity fields;The associated sensitive information field list passes through the corresponding page hierarchical relationship of another external key relationship maps
Table.
Step S110, judges the desensitization rule list is configured whether to finish, and if it is terminates process, is otherwise directed to down
One page repeats step S100~S110.
Since the field name of the similar field in the page of different levels is different, such as respectively id, name,
Classname corresponds to the similar field such as customer name, customer name.Pass through the page level in above-mentioned desensitization rule list
Mapping relations between mark, the sensitive information field and corresponding shielding rules, so that the similar field of different levels can
To map the same field shielding rules, when the field shielding rules to certain class field make modification, the field shielding rules
It can be implemented in all pages comprising such field, without to respectively to the progress field shielding of each page
The modification of rule.
That is, the similar field to each level does unitized processing.For example, word in first level pages (such as 060301)
The field of the entitled name of field and the three-level page be (such as in the field of Duan Mingwei id, the second level page (such as 06030101)
0603010101) field of the entitled classname of field maps a field shielding rules in, when the field shielding rules are modified
When, it is equivalent to the field shielding rule of the corresponding several pages of the several hierarchical identifications such as 060301,06030101 and 0603010101
Then modified.It can be appreciated that using the technical solution of the present embodiment to the field shielding rules of the page each in complication system
Rectification, avoid and each page rectified and improved respectively, effectively reduce rectification needed for workload, improve desensitization rule
Upgrade efficiency.
Optionally, step S108 further include: the place field type of the sensitive information field is stored in the desensitization
In rule list.
The field type, such as list list type, map array type.The field type is for guiding work people
Member's rapid increasing new sensitive information page.
Optionally, step S108 further include: the corresponding user right of the sensitive information field is configured to the desensitization
In rule list.
The user right may include common employee's permission, department's assistant's permission, first-line management's permission, middle rank pipe
Reason personnel permission and senior executive's permission etc..The user right may also comprise: webpage logon rights, ca authentication webpage are stepped on
Record permission, system client logon rights etc..It is of course also possible to based on other user rights for considering setting.Different users
Permission, for example, lack of competence obtains the sensitive information field of corresponding higher others' member's permission of level-one for common employee.
After configuring desensitization rule list by S1~S6 step, the acquired corresponding URL of each page and business letter
Breath is saved in specified storage region.Optionally, further include step S110, be used for: in the desensitization rule list delete and
Add sensitive information field and corresponding field shielding rules.
For example, the step of increasing sensitive information field and corresponding field shielding rules is as follows:
S110A is read in the corresponding URL of each page and business information from the storage region;
Whether S110B, inquiry include sensitive information field to be added, if in certain page including the sensitive letter to be added
When ceasing field, the page hierarchical identification, sensitive information field to be added and corresponding shielding rules are established into mapping relations, and will
The mapping relations are added in desensitization rule list.
Embodiment two
Referring to Fig. 3, show the embodiment of the present invention and data desensitization method step flow chart.It is appreciated that this
Flow chart in embodiment of the method, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S200 inputs the accessing request information of information for the target page to server transmission according to user.
The computer collocations have the user graphical interface for accessing the target pages, the user graphical interface packet
Include input frame, button, combobox and list etc..The input frame includes Text Entry, numeric input boxes, for inputting identity
Authentication information, such as user name, password.After the button is clicked by user, accessing request information can be generated and be sent to data
In system, the accessing request information carries all kinds of supplemental characteristics, and the supplemental characteristic may include authentication information etc..
Step S202 receives the data to be desensitized that the server is returned based on the accessing request information.
After the server receives the accessing page request, the accessing page request can be parsed, and in response to
The accessing page request obtains the data to be desensitized from database.
The data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list by step S204.
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules,
The page hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include preparatory
It is configured at the corresponding page hierarchical identification of each page in the desensitization rule list, sensitive information field and field shielding rule
Sub- mapping relations between then.
Step S204 may comprise steps of:
Step S204A obtains the page hierarchical identification of the target pages.Specifically, the target pages can be passed through
The address URL obtain the page hierarchical identification of the page.
Step S204B is inquired corresponding with the target pages according to the page hierarchical identification from the desensitization rule list
Sensitive information field and corresponding field shielding rules.
The field shielding rules: it is character some or all of in sensitive information field replacing with designated character.
For example, be directed to customer name, can by customer name surname and name select one and replace with designated character, or replace with finger
Determine character;For passport NO., a part of number in passport NO. can be replaced with into preset characters, or will be in passport NO.
Whole numbers replace with designated character.It should be noted that designated character can be " * " or other characters.
Step S204C executes the desensitization data de- according to the sensitive information field and the field shielding rules
Quick operation.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be with
It is used to provide for checking to user.
Optionally, further include step S206: the desensitization data being provided to the view layer progress page and are shown.
By data desensitization method described in embodiment two, by the page hierarchical relationship of target webpage, from desensitization rule
Corresponding sensitive information field and field shielding rules are obtained in table, can be rapidly carried out sensitive information masking operation, it is ensured that
The sensitive traffic data of all kinds of client's individual privacy data and certain keys are not leaked.
Embodiment three
Referring to Fig. 4, show the embodiment of the present invention and data desensitization method step flow chart.It is appreciated that this
Flow chart in embodiment of the method, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S300 inputs the accessing request information of information for the target page to server transmission according to user.
Step S302 receives the data to be desensitized that the server is returned based on the accessing request information.
Step S304 intercepts the data to be desensitized, described to be stored in buffer zone after the data that desensitize are intercepted.
Specifically, blocker is called to carry out interception operation to the data to be desensitized.
Step S306 obtains the data to be desensitized from the buffer zone.
The data structure information for obtaining the data to be desensitized, may include partly shielding effect according to the data structure information
Field.
The data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list by step S308.
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules,
The page hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include preparatory
It is configured at the corresponding page hierarchical identification of each page in the desensitization rule list, sensitive information field and field shielding rule
Sub- mapping relations between then.
Step S308 may comprise steps of:
Step S308A obtains the page hierarchical identification of the target pages.Specifically, the target pages can be passed through
The address URL obtain the page hierarchical identification of the page.
Step S308B is inquired corresponding with the target pages according to the page hierarchical identification from the desensitization rule list
Sensitive information field and corresponding field shielding rules.
Step S308C executes the desensitization data de- according to the sensitive information field and the field shielding rules
Quick operation.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be with
It is used to provide for checking to user.
Example IV
Please continue to refer to Fig. 5, the program module schematic diagram of data desensitization system embodiment four of the present invention is shown.In this reality
It applies in example, data desensitization system 20 may include or be divided into one or more program modules, one or more program mould
Block is stored in storage medium, and as performed by one or more processors, to complete the present invention, and can realize above-mentioned data
Desensitization method.The so-called program module of the embodiment of the present invention is the series of computation machine program instruction for referring to complete specific function
Section, the implementation procedure than program itself more suitable for description data desensitization system 20 in storage medium.Being described below will be specific
Introduce the function of each program module of the present embodiment:
Sending module 200 is believed for inputting information according to user to the access request that server is sent for the target page
Breath.
Computer collocations have the user graphical interface for accessing the target pages, and the user graphical interface includes defeated
Enter frame, button, combobox and list etc..The input frame includes Text Entry, numeric input boxes, for inputting authentication
Information, such as user name, password.After the button is clicked by user, accessing request information can be generated and be sent to data system
In, the accessing request information carries all kinds of supplemental characteristics, and the supplemental characteristic may include authentication information etc..
Receiving module 202, the data to be desensitized returned for receiving the server based on the accessing request information.
After the server receives the accessing page request, the accessing page request can be parsed, and in response to
The accessing page request obtains the data to be desensitized from database.
Desensitize module 204, for the data to be desensitized to be converted to desensitization number according to preconfigured desensitization rule list
According to the desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the page
Face hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include be preconfigured in
In the desensitization rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules
Sub- mapping relations: according to the page hierarchical identification of the target pages, inquiry and the page object from the desensitization rule list
The corresponding sensitive information field in face and corresponding field shielding rules;And it is shielded according to the sensitive information field and the field
Rule executes desensitization operation to the desensitization data.
The field shielding rules: it is character some or all of in sensitive information field replacing with designated character.
For example, be directed to customer name, can by customer name surname and name select one and replace with designated character, or replace with finger
Determine character;For passport NO., a part of number in passport NO. can be replaced with into preset characters, or will be in passport NO.
Whole numbers replace with designated character.It should be noted that designated character can be " * " or other characters.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be with
It is used to provide for checking to user.
In one embodiment, further include the blocking module 206, be used for: intercepting the data to be desensitized, it is described wait desensitize
Buffer zone is stored in after data are intercepted.
Specifically, blocker is called to carry out interception operation to the data to be desensitized.The desensitization module 204 is delayed from described
It deposits region and obtains the data to be desensitized, and carry out desensitization operation according to the data to be desensitized.
In one embodiment, further include the display module 208, be used for: by the desensitization data be provided to view layer into
The row page is shown.
By the page hierarchical relationship of target webpage, corresponding sensitive information field and field are obtained from desensitization rule list
Shielding rules can be rapidly carried out sensitive information masking operation, it is ensured that all kinds of client's individual privacy data and certain keys
Sensitive traffic data be not leaked.
Embodiment five
It is the hardware structure schematic diagram of the computer equipment of the embodiment of the present invention five refering to Fig. 6.It is described in the present embodiment
Computer equipment 2 is that one kind can be automatic to carry out numerical value calculating and/or information processing according to the instruction for being previously set or storing
Equipment.The computer equipment 2 can be computer, tablet computer etc..As shown, the computer equipment 2 is at least wrapped
It includes, but is not limited to, it is de- that connection memory 21, processor 22, network interface 23 and data can be in communication with each other by system bus
Quick system 20.Wherein:
In the present embodiment, memory 21 includes at least a type of computer readable storage medium, the readable storage
Medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device
(RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory
(EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..In some embodiments, memory
21 can be the internal storage unit of computer equipment 2, such as the hard disk or memory of the computer equipment 2.In other implementations
In example, memory 21 is also possible to the grafting being equipped on the External memory equipment of computer equipment 2, such as the computer equipment 20
Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card) etc..Certainly, memory 21 can also both including computer equipment 2 internal storage unit and also including outside it
Store equipment.In the present embodiment, memory 21 is installed on the operating system and types of applications of computer equipment 2 commonly used in storage
Software, for example, example IV data desensitization system 20 program code etc..In addition, memory 21 can be also used for temporarily depositing
Store up the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control computer equipment 2
Overall operation.In the present embodiment, program code or processing data of the processor 22 for being stored in run memory 21, example
As operation data desensitize system 20, to realize the data desensitization method of embodiment two or three.
The network interface 23 may include radio network interface or wired network interface, which is commonly used in
Communication connection is established between the computer equipment 2 and other electronic devices.For example, the network interface 23 is for passing through network
The computer equipment 2 is connected with exterior terminal, establishes data transmission between the computer equipment 2 and exterior terminal
Channel and communication connection etc..The network can be intranet (Intranet), internet (Internet), whole world movement
Communication system (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband
Code Division Multiple Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the nothings such as Wi-Fi
Line or cable network.
It should be pointed out that Fig. 6 illustrates only the computer equipment 2 with component 20-23, it should be understood that simultaneously
All components shown realistic are not applied, the implementation that can be substituted is more or less component.
In the present embodiment, be stored in memory 21 the data desensitization system 20 can also be divided into one or
The multiple program modules of person, one or more of program modules are stored in memory 21, and are handled by one or more
Device (the present embodiment is processor 22) is performed, to complete the present invention.
For example, Fig. 5 shows the program module schematic diagram of realization data desensitization 20 example IV of system, the embodiment
In, it is described that sending module 200 can be divided into based on data desensitization system 20, receiving module 202, desensitization module 204, intercepted
Module 206 and display module 208.Wherein, the so-called program module of the present invention is a series of meters for referring to complete specific function
Calculation machine program instruction section, than program more suitable for describing execution of the data desensitization system 20 in the computer equipment 2
Process.The concrete function of described program module 200-208 has had a detailed description in example IV, and details are not described herein.
Embodiment six
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory
(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic
Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc.
Answer function.The computer readable storage medium of the present embodiment desensitizes system 20 for storing data, realization when being executed by processor
The data desensitization method of embodiment two or three.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.