CN111079185A - Database information processing method and device, storage medium and electronic equipment - Google Patents

Database information processing method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN111079185A
CN111079185A CN201911329313.0A CN201911329313A CN111079185A CN 111079185 A CN111079185 A CN 111079185A CN 201911329313 A CN201911329313 A CN 201911329313A CN 111079185 A CN111079185 A CN 111079185A
Authority
CN
China
Prior art keywords
data table
information
sensitive
data
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911329313.0A
Other languages
Chinese (zh)
Other versions
CN111079185B (en
Inventor
张蒙
秦文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yidu Cloud Beijing Technology Co Ltd
Original Assignee
Nanjing Yiyi Yunda Data Technology Co Ltd
Nanjing Yikang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yiyi Yunda Data Technology Co Ltd, Nanjing Yikang Technology Co Ltd filed Critical Nanjing Yiyi Yunda Data Technology Co Ltd
Priority to CN201911329313.0A priority Critical patent/CN111079185B/en
Publication of CN111079185A publication Critical patent/CN111079185A/en
Application granted granted Critical
Publication of CN111079185B publication Critical patent/CN111079185B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the disclosure provides a database information processing method and device, a storage medium and an electronic device. The method comprises the following steps: acquiring a data table in a database; matching the data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table; and generating a sensitive information table corresponding to the data table based on the sensitive data type. The method and the device realize automatic identification of the type of the sensitive information in the database, and improve the identification efficiency of the sensitive information.

Description

Database information processing method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies and information processing technologies, and in particular, to a method and an apparatus for processing database information, a storage medium, and an electronic device.
Background
In the prior art, the database is required to be probed frequently. The database exploration is to analyze data input into the database, and explore specific data information reports in a target database, such as a table where sensitive information in the exploration data is located and field names, depending on a database structure and a table, so as to facilitate subsequent data desensitization processing.
When sensitive information of data in a database is probed, most of the existing schemes manually judge data information of each data table of the database and determine which information is sensitive information for subsequent processing.
The database exploration mode has no specific technology, depends on more manual experience accumulation, lacks visual application in the aspect of collection and processing of medical information data depending on more manufacturers, and has low data identification efficiency.
Therefore, a new database information processing method, device, storage medium and electronic device are needed to improve the efficiency of data identification in the database.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The embodiment of the disclosure provides a method and a device for processing database information, a storage medium and an electronic device, so that the identification efficiency of sensitive information is improved at least to a certain extent.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the embodiments of the present disclosure, there is provided a method for processing database information, including: acquiring a data table in a database; matching the data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table; and generating a sensitive information table corresponding to the data table based on the sensitive data type.
In some exemplary embodiments of the present disclosure, after obtaining the data table in the database, the method further comprises: sampling the data table, and extracting a sampling data table; matching the data table according to the constraint information of the sensitive data type to acquire the sensitive data type of the data table, wherein the method comprises the following steps: and matching the sampling data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table.
In some exemplary embodiments of the present disclosure, obtaining a data table in a database includes: establishing a connection with the database; extracting a non-system information table from the database; and screening out parts of character types and numerical value types from the non-system information table to obtain a data table in the database.
In some exemplary embodiments of the present disclosure, matching the data table according to constraint information of the sensitive data type, and obtaining the sensitive data type of the data table includes: acquiring constraint information matched with the data table and the weight of the constraint information; determining each sensitive data type corresponding to each constraint information; calculating the weight value of the data table in each sensitive data type based on the weight of each constraint information; and comparing the weight value of the data table in each sensitive data type with the weight threshold value of each sensitive data type, and determining the sensitive data type of the data table.
In some exemplary embodiments of the present disclosure, if the constraint information includes knowledge precipitation information, acquiring each constraint information matched with the data table and a weight of each constraint information includes: and judging whether the manufacturer name, the system name, the data table name and the field name of the data table and the historical data table are the same, if so, matching the data table with the knowledge deposit information, and acquiring the weight corresponding to the knowledge deposit information.
In some exemplary embodiments of the present disclosure, after generating the sensitive information table corresponding to the data table based on the sensitive data type, the method further includes: and converting the field corresponding to the sensitive information table in the data table into an encrypted character.
In some exemplary embodiments of the present disclosure, the sensitive data types include: at least one of name, gender, telephone, identification card, mailbox, and marital status.
According to an aspect of the embodiments of the present disclosure, there is provided an apparatus for processing database information, including: the data acquisition module is configured to acquire a data table in a database; the type acquisition module is configured to match the data table according to constraint information of the sensitive data type and acquire the sensitive data type matched with the constraint information; and the information generation module is configured to generate a sensitive information table corresponding to the data table based on the sensitive data type.
In some exemplary embodiments of the present disclosure, the apparatus further comprises: the sampling module is configured to sample the data table and extract a sampling data table; and the type acquisition module is configured to match the sampling data table according to the constraint information of the sensitive data type to acquire the sensitive data type of the data table.
In some exemplary embodiments of the present disclosure, the data acquisition module is configured to establish a connection with the database; extracting a non-system information table from the database; and screening out parts of character types and numerical value types from the non-system information table to obtain a data table in the database.
In some exemplary embodiments of the present disclosure, the type obtaining module is configured to obtain each constraint information matched with the data table and a weight of each constraint information; determining each sensitive data type corresponding to each constraint information; calculating the weight value of the data table in each sensitive data type based on the weight of each constraint information; and comparing the weight value of the data table in each sensitive data type with the weight threshold value of each sensitive data type, and determining the sensitive data type of the data table.
In some exemplary embodiments of the disclosure, if the constraint information includes knowledge deposit information, the type obtaining module is configured to determine whether a manufacturer name, a system name, a data table name, and a field name of the data table and a historical data table are the same, and if so, match the data table with the knowledge deposit information and obtain a weight corresponding to the knowledge deposit information.
In some exemplary embodiments of the present disclosure, the apparatus further comprises: and the conversion module is configured to convert the field corresponding to the sensitive information table in the data table into an encrypted character.
In some exemplary embodiments of the present disclosure, the sensitive data types include: at least one of name, gender, telephone, identification card, mailbox, and marital status.
According to an aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium storing a computer program, wherein the computer program is configured to implement the method as described in the above embodiments when executed by a processor.
According to an aspect of an embodiment of the present disclosure, there is provided an electronic device including: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method as described in the embodiments above.
In the embodiment of the invention, a data table in a database is obtained; matching the data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table; and generating a sensitive information table corresponding to the data table based on the sensitive data type. The method and the device realize automatic identification of the type of the sensitive information in the database, and improve the identification efficiency of the sensitive information.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty. In the drawings:
FIG. 1 illustrates a schematic diagram of an exemplary system architecture 100 to which the method or apparatus of database information processing of embodiments of the present disclosure may be applied;
FIG. 2 schematically illustrates a flow diagram of a method of database information processing, according to one embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow diagram of a method of matching data tables by constraint information of sensitive data types according to one embodiment of the present disclosure;
FIG. 4 schematically illustrates a block diagram of an apparatus for database information processing according to an embodiment of the present disclosure;
FIG. 5 illustrates a schematic structural diagram of a computer system suitable for use in implementing an electronic device of an embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Fig. 1 shows a schematic diagram of an exemplary system architecture 100 to which the method or apparatus of database information processing of the disclosed embodiments may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to smart phones, tablet computers, portable computers, desktop computers, and the like.
The server 105 or the terminal device 103 (which may also be the terminal device 101 or 102) may perform various operations. For example, the server 105 or the terminal device 103 acquires a data table in the database; matching the data table according to constraint information of the sensitive data type to acquire the sensitive data type matched with the constraint information; and generating a sensitive information table corresponding to the data table based on the sensitive data type.
FIG. 2 schematically shows a flow diagram of a method of database information processing according to one embodiment of the present disclosure. The method provided by the embodiment of the present disclosure may be processed by any electronic device with computing processing capability, for example, the server 105 and/or the terminal devices 102 and 103 in the embodiment of fig. 1 described above, and in the following embodiment, the server 105 is taken as an execution subject for example, but the present disclosure is not limited thereto.
As shown in fig. 2, a method for processing database information provided by an embodiment of the present disclosure may include the following steps.
In step S210, a data table in the database is acquired.
In the embodiment of the invention, the connection with the database to be detected is established, and the non-system information table is extracted from the database. The data table may be a plurality of data tables from one or more databases, and accordingly, if the data table is a data table from a plurality of databases, a connection with each database needs to be established before to acquire the data table from each database.
In the embodiment of the invention, the data address information needing to be detected can be configured, and the connection with the related database is established.
According to the embodiment of the invention, after the non-system information table is extracted from the database, the parts of the character type and the numerical value type are screened out from the non-system information table so as to obtain the data table in the database.
It should be noted that the database may include a system information table and a non-system information table. The system information table is a table required in the database creation process, and is a table related to the database. The non-system information table refers to data stored in a database as a storage device, and is not related to the database and can be stored in other storage devices.
It should be noted that the data table in the database may exist in various forms, such as character type, numerical type, time and date type, etc. In the embodiment of the invention, the partial data tables of the character types and the numerical value types are screened from the multiple types, and the data tables are matched with the constraint information of the sensitive data types, so that the screening of the non-system information tables is realized, the information quantity needing to be matched is reduced, and the sensitive information identification efficiency is improved.
In step S220, the data table is matched according to the constraint information of the sensitive data type, and the sensitive data type of the data table is obtained.
In the embodiment of the present disclosure, after the data table is obtained, the data table may be further sampled, the sampled data table is extracted, and the sampled data table is matched according to the constraint information of the sensitive data type, so as to obtain the sensitive data type of the data table.
When sampling is performed, a sampling proportion or a specific data size can be set, so that a corresponding sampling data table is extracted from each data table by random sampling.
In the embodiment of the invention, when the data table (sampling data table) is matched according to the constraint information of the sensitive data type, each constraint information matched with the data table (sampling data table) and the weight of each constraint information are obtained, each sensitive data type corresponding to each constraint information is determined, the weight value of the data table (sampling data table) in each sensitive data type is calculated based on the weight of each constraint information, the weight value of the data table (sampling data table) in each sensitive data type is compared with the weight threshold of each sensitive data type, and the sensitive data type of the data table is determined.
It should be noted that, for the sampling data table, the sensitive data type of the sampling data table is determined by comparing the weight value of the sampling data table in each sensitive data type with the weight threshold of each sensitive data type, and the sensitive data type is also the sensitive data type of the data table corresponding to the sampling data table.
In the embodiment of the invention, when the data tables (sampling data tables) are a plurality of tables, the data in each data table is matched with the constraint information one by one in a concurrent traversal mode.
In step S230, a sensitive information table corresponding to the data table is generated based on the sensitive data type.
In the embodiment of the present invention, the sensitive information table may include: database type, database name, user name, Data table name, field name, Database (DB) annotation, and sensitive Data type.
For example, table 1 is a partial sensitive information table shown in the embodiment of the present invention.
Figure BDA0002329180260000071
TABLE 1
It should be noted that the database type, the database name, the user name, the data table name, and the like in the sensitive information table may be obtained from the established connection of the database.
In the embodiment of the invention, a data table in a database is obtained; matching the data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table; and generating a sensitive information table corresponding to the data table based on the sensitive data type. The method and the device realize automatic identification of the type of the sensitive information in the database, and improve the identification efficiency of the sensitive information.
In one embodiment, after the sensitive information table is generated, a desensitization operation may be further performed on the data table based on the sensitive information table, and specifically, a field corresponding to the sensitive information table in the data table may be converted into an encrypted character.
In one embodiment, the sensitive data type may include at least one of name, gender, telephone, identification card, mailbox, and marital status.
Fig. 3 schematically illustrates a flowchart of a method for matching a data table according to constraint information of a sensitive data type according to an embodiment of the present disclosure, where the method provided by the embodiment of the present disclosure may be processed by any electronic device with computing processing capability, such as the server 105 and/or the terminal devices 102 and 103 in the embodiment of fig. 1, in the following embodiment, the server 105 is taken as an execution subject for example, but the present disclosure is not limited thereto. It should be noted that the following method can also be referred to as a method of matching the sample data table according to the constraint information of the sensitive data type.
As shown in fig. 3, a method for matching a data table according to constraint information of a sensitive data type provided by an embodiment of the present disclosure may include the following steps.
In step S310, each piece of constraint information matched with the data table and the weight of each piece of constraint information are acquired.
It should be noted that the obtained data table may include at least one column of fields, and each column of fields may not include the field name of the column. Each column of fields in the data table can only correspond to one sensitive data type at most.
In the embodiment of the invention, constraint information corresponding to each sensitive type and the weight of the constraint information are preset. After the data table is obtained, matching all constraint information corresponding to all sensitive types with the data table so as to obtain each constraint information matched with the obtained data table and the weight of each constraint information.
In the embodiment of the present invention, the constraint information may include, but is not limited to: part of speech information, field type information, common names information, field name information, field remark information, knowledge deposit information, field length information, mailbox format information and the like. For example, the constraint information may be: for parts of speech, for another example, the constraint information may be: to precipitate information for knowledge, constraint information may be, for another example: the field length is 11 bits, and for another example, the constraint information may be: the field is a value type.
If the part of speech is the name, the part of speech of a field in a certain column of fields in the data table can be confirmed by using a hanLP word splitter for the Chinese language processing package when matching is performed, and if the part of speech is the name, the constraint information is satisfied.
It should be noted that, if the constraint information is common names, the first 1-2 characters of a field in a certain column in the data table are compared with a preset common name list, and if the first 1-2 characters exist in the common name list, the constraint information is satisfied.
It should be noted that, if the constraint information is knowledge precipitation information, it is determined whether the manufacturer name, the system name, the data table name, and the field name of the data table and the historical data table are the same, and if so, the data table and the constraint information that satisfies the knowledge precipitation information are determined.
It should be noted that the vendor name and the system name can be obtained from the established connection of the database. If the manufacturer name, the system name, the data table name and the field name of the data table are the same as those of the historical data table, it can be determined that the data table and the historical data table are the same table or the same type table, and the sensitive data type of the data table can be determined based on the sensitive data type of the historical data table.
It should be noted that when the constraint information is matched with the data table, a regular matching may be used.
It should be noted that, when the constraint information is matched with the data table in the embodiment of the present invention, there may be a case where partial data in the data table is matched. For example, for a certain constraint information, 50% of the fields in a column of fields in the data table conform to the constraint information.
In step S320, each sensitive data type corresponding to each constraint information is determined.
In the embodiment of the invention, constraint information corresponding to each sensitive data type is preset.
For example, for a name type, its corresponding constraint information may include, but is not limited to: the part of speech is name, the first 1-2 characters are common names, the field name is name, the field remark is name, and the knowledge deposit information is obtained.
For another example, for a type of phone number, the corresponding constraint information may include: the field length is 11, the character type is full-numeric, and the start character is "1".
It should be noted that the same constraint information may correspond to at least one sensitive data type.
In the embodiment of the invention, after each constraint information matched with the data table is determined, the sensitive data types corresponding to each matched constraint information can be determined according to the preset constraint information corresponding to each sensitive data type.
For example, if a column of fields in a data table satisfies that the first 1-2 characters are common names, the field names are names, and the field length is 11, the first 1-2 characters are determined to be common names, the field names are name types, and the field length is 11 telephone number types.
In step S330, a weight value of each sensitive data type of the data table is calculated based on the weight of each constraint information.
In the embodiment of the invention, after the constraint information matched with the data table and the weight of the constraint information are obtained, the weight value of the data table in each sensitive data type can be calculated.
For example, in the above example, if 90% of the fields in a certain column of the data table satisfy that the first 1-2 characters are common names, the weight of the constraint information is 1, the data table satisfies that the field name is a name, the weight of the constraint information is 0.5, 10% of the fields in the data table satisfy that the field length is 11, and the weight of the constraint information is 1, the weight value of the data table in the name type is: 0.9 × 1+1 × 0.5 ═ 1.4, the weight value of the telephone number type in the data table is: 0.1 × 1 is 0.1.
In step S340, comparing the weight value of the data table in each sensitive data type with the weight threshold of each sensitive data type, and determining the sensitive data type of the data table.
In the embodiment of the invention, a weight value is set for each sensitive data type, and the weight values of each sensitive data type can be equal or unequal. After the weight value of each sensitive data type of the data table is calculated, the weight value is compared with a weight threshold corresponding to the sensitive data type, if the weight value exceeds the weight threshold, the sensitive data type corresponding to the weight threshold is the sensitive data type of the data table, otherwise, the sensitive data type of the data table is not the sensitive data type corresponding to the weight threshold.
For example, in the above example, if the weight threshold of the name type is 1.2 and the weight threshold of the phone number type is 1.5, the weight value of the field of the data table in the name type is 1.4, and if the weight threshold is greater than the weight threshold, the field of the data table is the name type. The weight value of the field of the data table in the name type is 0.1, and if the weight value is less than the weight threshold value, the sensitive type of the field of the data table is not the telephone number type.
The following describes embodiments of the apparatus of the present disclosure, which may be used to perform the above-mentioned database information processing method of the present disclosure. For details that are not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method for processing database information described above in the present disclosure.
Fig. 4 schematically shows a block diagram of an apparatus for database information processing according to an embodiment of the present disclosure.
Referring to fig. 4, an apparatus 400 for database information processing according to an embodiment of the present disclosure may include: a data acquisition module 410, a type acquisition module 420, and an information generation module 430.
The data obtaining module 410 is configured to obtain a data table in a database.
The type obtaining module 420 is configured to match the data table according to constraint information of the sensitive data type, and obtain the sensitive data type matched with the constraint information.
The information generating module 430 is configured to generate a sensitive information table corresponding to the data table based on the sensitive data type.
In the embodiment of the invention, a data table in a database is obtained; matching the data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table; and generating a sensitive information table corresponding to the data table based on the sensitive data type. The method and the device realize automatic identification of the type of the sensitive information in the database, and improve the identification efficiency of the sensitive information.
FIG. 5 illustrates a schematic structural diagram of a computer system suitable for use in implementing an electronic device of an embodiment of the present disclosure. It should be noted that the computer system 500 of the electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of the application of the embodiments of the present disclosure.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for system operation are also stored. The CPU501, ROM502, and RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, the processes described below with reference to the flowcharts may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The computer program executes various functions defined in the system of the present application when executed by a Central Processing Unit (CPU) 501.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules and/or units described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware, and the described modules and/or units may also be disposed in a processor. Wherein the names of such modules and/or units do not in some way constitute a limitation on the modules and/or units themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method as described in the embodiments below.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method of database information processing, comprising:
acquiring a data table in a database;
matching the data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table;
and generating a sensitive information table corresponding to the data table based on the sensitive data type.
2. The method of claim 1, wherein after retrieving the data tables in the database, the method further comprises:
sampling the data table, and extracting a sampling data table;
matching the data table according to the constraint information of the sensitive data type to acquire the sensitive data type of the data table, wherein the method comprises the following steps:
and matching the sampling data table according to the constraint information of the sensitive data type to obtain the sensitive data type of the data table.
3. The method of claim 1, wherein obtaining a data table in a database comprises:
establishing a connection with the database;
extracting a non-system information table from the database;
and screening out parts of character types and numerical value types from the non-system information table to obtain a data table in the database.
4. The method of claim 1, wherein matching the data table according to constraint information of the sensitive data type to obtain the sensitive data type of the data table comprises:
acquiring constraint information matched with the data table and the weight of the constraint information;
determining each sensitive data type corresponding to each constraint information;
calculating the weight value of the data table in each sensitive data type based on the weight of each constraint information;
and comparing the weight value of the data table in each sensitive data type with the weight threshold value of each sensitive data type, and determining the sensitive data type of the data table.
5. The method of claim 4, wherein if the constraint information includes knowledge precipitation information, obtaining constraint information and weights of the constraint information that match the data table comprises:
and judging whether the manufacturer name, the system name, the data table name and the field name of the data table and the historical data table are the same, if so, matching the data table with the knowledge deposit information, and acquiring the weight corresponding to the knowledge deposit information.
6. The method of claim 1, wherein after generating the sensitive information table corresponding to the data table based on the sensitive data type, the method further comprises:
and converting the field corresponding to the sensitive information table in the data table into an encrypted character.
7. The method of claim 1, wherein the sensitive data types comprise: at least one of name, gender, telephone, identification card, mailbox, and marital status.
8. An apparatus for processing database information, comprising:
the data acquisition module is configured to acquire a data table in a database;
the type acquisition module is configured to match the data table according to constraint information of the sensitive data type and acquire the sensitive data type matched with the constraint information;
and the information generation module is configured to generate a sensitive information table corresponding to the data table based on the sensitive data type.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
CN201911329313.0A 2019-12-20 2019-12-20 Database information processing method and device, storage medium and electronic equipment Active CN111079185B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911329313.0A CN111079185B (en) 2019-12-20 2019-12-20 Database information processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911329313.0A CN111079185B (en) 2019-12-20 2019-12-20 Database information processing method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN111079185A true CN111079185A (en) 2020-04-28
CN111079185B CN111079185B (en) 2022-12-30

Family

ID=70316396

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911329313.0A Active CN111079185B (en) 2019-12-20 2019-12-20 Database information processing method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111079185B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704573A (en) * 2021-08-26 2021-11-26 北京中安星云软件技术有限公司 Database sensitive data scanning method and device

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130332990A1 (en) * 2010-05-10 2013-12-12 International Business Machines Corporation Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data
US8628331B1 (en) * 2010-04-06 2014-01-14 Beth Ann Wright Learning model for competency based performance
CN104794204A (en) * 2015-04-23 2015-07-22 上海新炬网络信息技术有限公司 Database sensitive data automatically-recognizing method
CN104933443A (en) * 2015-06-26 2015-09-23 北京途美科技有限公司 Automatic identifying and classifying method for sensitive data
WO2016073479A1 (en) * 2014-11-03 2016-05-12 Automated Clinical Guidelines, Llc Method and platform/system for creating a web-based form that incorporates an embedded knowledge base, wherein the form provides automatic feedback to a user during and following completion of the form
CN107305615A (en) * 2016-04-25 2017-10-31 深圳市深信服电子科技有限公司 Tables of data recognition methods and system
CN107729456A (en) * 2017-09-30 2018-02-23 武汉汉思信息技术有限责任公司 Sensitive information search method, server and storage medium
US20180232528A1 (en) * 2017-02-13 2018-08-16 Protegrity Corporation Sensitive Data Classification
CN108536739A (en) * 2018-03-07 2018-09-14 中国平安人寿保险股份有限公司 The recognition methods of metadata sensitive information field, device, equipment and storage medium
CN109359161A (en) * 2018-09-07 2019-02-19 顺丰科技有限公司 Address date recognition methods and device
CN109446844A (en) * 2018-11-15 2019-03-08 北京信息科技大学 A kind of method for secret protection and system towards big data publication
CN109829327A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Sensitive information processing method, device, electronic equipment and storage medium
CN110134719A (en) * 2019-05-17 2019-08-16 贵州大学 A kind of identification of structural data Sensitive Attributes and stage division of classifying
CN110209892A (en) * 2019-04-17 2019-09-06 深圳壹账通智能科技有限公司 Sensitive information recognition methods, device, electronic equipment and storage medium
CN110222170A (en) * 2019-04-25 2019-09-10 平安科技(深圳)有限公司 A kind of method, apparatus, storage medium and computer equipment identifying sensitive data

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8628331B1 (en) * 2010-04-06 2014-01-14 Beth Ann Wright Learning model for competency based performance
US20130332990A1 (en) * 2010-05-10 2013-12-12 International Business Machines Corporation Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data
WO2016073479A1 (en) * 2014-11-03 2016-05-12 Automated Clinical Guidelines, Llc Method and platform/system for creating a web-based form that incorporates an embedded knowledge base, wherein the form provides automatic feedback to a user during and following completion of the form
CN104794204A (en) * 2015-04-23 2015-07-22 上海新炬网络信息技术有限公司 Database sensitive data automatically-recognizing method
CN104933443A (en) * 2015-06-26 2015-09-23 北京途美科技有限公司 Automatic identifying and classifying method for sensitive data
CN107305615A (en) * 2016-04-25 2017-10-31 深圳市深信服电子科技有限公司 Tables of data recognition methods and system
US20180232528A1 (en) * 2017-02-13 2018-08-16 Protegrity Corporation Sensitive Data Classification
CN107729456A (en) * 2017-09-30 2018-02-23 武汉汉思信息技术有限责任公司 Sensitive information search method, server and storage medium
CN108536739A (en) * 2018-03-07 2018-09-14 中国平安人寿保险股份有限公司 The recognition methods of metadata sensitive information field, device, equipment and storage medium
CN109359161A (en) * 2018-09-07 2019-02-19 顺丰科技有限公司 Address date recognition methods and device
CN109446844A (en) * 2018-11-15 2019-03-08 北京信息科技大学 A kind of method for secret protection and system towards big data publication
CN109829327A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Sensitive information processing method, device, electronic equipment and storage medium
CN110209892A (en) * 2019-04-17 2019-09-06 深圳壹账通智能科技有限公司 Sensitive information recognition methods, device, electronic equipment and storage medium
CN110222170A (en) * 2019-04-25 2019-09-10 平安科技(深圳)有限公司 A kind of method, apparatus, storage medium and computer equipment identifying sensitive data
CN110134719A (en) * 2019-05-17 2019-08-16 贵州大学 A kind of identification of structural data Sensitive Attributes and stage division of classifying

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
AMIR HAREL 等: "M-Score:A Misuseability Weight Measure", 《IN IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING》 *
张梦影: "ORACLE到POSTGRES的数据库迁移", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
肖雪娇: "应用于医疗信息平台的基于块数据的采集机制", 《中国优秀硕士学位论文全文数据库 医药卫生科技辑》 *
邹云峰 等: "电力客户数据隐私保护机制研究", 《电力需求侧管理》 *
郑明辉 等: "相同敏感值数据表泛化算法的安全性度量研究", 《网络空间安全》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704573A (en) * 2021-08-26 2021-11-26 北京中安星云软件技术有限公司 Database sensitive data scanning method and device

Also Published As

Publication number Publication date
CN111079185B (en) 2022-12-30

Similar Documents

Publication Publication Date Title
CN111159220B (en) Method and apparatus for outputting structured query statement
CN112527649A (en) Test case generation method and device
CN109359194B (en) Method and apparatus for predicting information categories
US20200322570A1 (en) Method and apparatus for aligning paragraph and video
CN107908662B (en) Method and device for realizing search system
CN113657113A (en) Text processing method and device and electronic equipment
CN111563163A (en) Text classification model generation method and device and data standardization method and device
CN111126649B (en) Method and device for generating information
CN114298845A (en) Method and device for processing claim settlement bills
CN113111167B (en) Method and device for extracting warning text received vehicle model based on deep learning model
CN111079185B (en) Database information processing method and device, storage medium and electronic equipment
CN112433713A (en) Application program design graph processing method and device
CN113111165A (en) Deep learning model-based alarm receiving warning condition category determination method and device
CN116204428A (en) Test case generation method and device
CN111353039A (en) File class detection method and device
CN113111234B (en) Regular expression-based alarm processing condition category determining method and device
CN109857838B (en) Method and apparatus for generating information
CN113111897A (en) Alarm receiving and warning condition type determining method and device based on support vector machine
CN112131379A (en) Method, device, electronic equipment and storage medium for identifying problem category
CN113111169A (en) Deep learning model-based alarm receiving and processing text address information extraction method and device
CN107368597B (en) Information output method and device
CN111783572A (en) Text detection method and device
CN111274383A (en) Method and device for classifying objects applied to quotation
CN114138972B (en) Text category identification method and device
CN111131354A (en) Method and apparatus for generating information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210224

Address after: 100191 room 801, 8th floor, building 9, 35 Huayuan North Road, Haidian District, Beijing

Applicant after: YIDU CLOUD Ltd.

Address before: Room 1502, 15 / F, Yangzi science and technology innovation center, 211 pubin Road, Jiangbei new district, Nanjing City, Jiangsu Province, 210000

Applicant before: Nanjing Yikang Technology Co.,Ltd.

Applicant before: Nanjing Yiyi Yunda Data Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant