CN111832062A - Method and device for desensitizing selected area data in table file - Google Patents
Method and device for desensitizing selected area data in table file Download PDFInfo
- Publication number
- CN111832062A CN111832062A CN201910318080.8A CN201910318080A CN111832062A CN 111832062 A CN111832062 A CN 111832062A CN 201910318080 A CN201910318080 A CN 201910318080A CN 111832062 A CN111832062 A CN 111832062A
- Authority
- CN
- China
- Prior art keywords
- data
- desensitized
- area
- region
- matching
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000000586 desensitisation Methods 0.000 claims abstract description 78
- 238000004590 computer program Methods 0.000 claims description 12
- 238000012545 processing Methods 0.000 abstract description 6
- 230000035945 sensitivity Effects 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the application provides a method and a device for desensitizing to selected area data in a table file, and the method and the device comprise the following steps: obtaining a region to be desensitized; identifying data keywords for the data in the area to be desensitized to obtain keyword information; matching the keyword information with a preset desensitization rule; and if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule. Therefore, the desensitization processing can be carried out on the sensitivity data of the designated area in the table file by applying the embodiment of the application.
Description
Technical Field
The present application relates to the field of data protection technology in files, and in particular, to a method and an apparatus for desensitizing table files to selected area data.
Background
At present, the security of information is more and more concerned by people, and especially some data related to the security of customers or some business sensitive data are generally modified and provided for testing without violating system rules, and personal information such as identity card numbers, mobile phone numbers, card numbers, customer numbers and the like needs to be desensitized. The table tool is an important tool for daily work and is often used for statistics, analysis and other work on daily data. For example: the data such as the mobile phone number, the identity card number, the card number and the like of the employee are counted through a table tool, and the data are classified according to different kinds of data or are sorted according to a specific sequence.
However, there is no effective means for ensuring the security of the information while the table-like tool records the information. Especially for some sensitive data, such as identification number, mobile phone number, bank card number, etc., when the sensitive data is leaked, the user may be greatly affected or lost.
Therefore, sensitive data in the table editing software cannot be effectively protected in the prior art, a user cannot guarantee availability of the data while guaranteeing information safety, and the use is not convenient enough.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method and an apparatus for desensitizing a table file to selected area data, so as to improve the security of sensitive data in a table. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a method for desensitizing a table file to select area data, including:
obtaining a region to be desensitized;
identifying data keywords for the data in the area to be desensitized to obtain keyword information;
matching the keyword information with a preset desensitization rule;
and if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule.
Optionally, before the acquiring the region to be desensitized, the method further includes:
acquiring a region selection instruction input by a user;
and determining the region to be desensitized according to the region selection instruction.
Optionally, after matching the keyword information with the preset desensitization rule, the method further includes:
and if the matching is unsuccessful, using the designated character to carry out full replacement on the data of the area to be desensitized.
Optionally, the data in the region to be desensitized is subjected to data keyword identification to obtain keyword information, including:
and identifying data keywords for the first row data of the area to be desensitized to obtain keyword information.
Optionally, modifying and replacing the specified data of the region to be desensitized includes:
and replacing the designated data of the area to be desensitized by preset characters.
In a second aspect, an embodiment of the present application further discloses an apparatus for desensitizing to selected area data in a table file, including:
the region acquisition module is used for acquiring a region to be desensitized;
the keyword acquisition module is used for identifying data keywords for the data in the area to be desensitized to obtain keyword information;
the desensitization rule matching module is used for matching the keyword information with a preset desensitization rule;
and the data desensitization module is used for modifying and replacing the data in the area to be desensitized according to the preset desensitization rule if the matching is successful.
The instruction acquisition submodule is used for acquiring an area selection instruction input by a user;
the area determination submodule is used for determining the area to be desensitized according to the area selection instruction;
and the all desensitization module is used for carrying out full replacement on the data of the area to be desensitized by using the designated character if the matching is unsuccessful.
And identifying data keywords for the first row data of the area to be desensitized to obtain keyword information. And if the matching is successful, replacing the designated data of the area to be desensitized by preset characters according to the preset desensitization rule.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor and a memory;
the memory is used for storing a computer program;
the processor is configured to implement the method for desensitizing the table file according to any of the first aspect to the selected area data when executing the program stored in the memory.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements a method for desensitizing a table file according to any one of the above first aspects with respect to selected area data.
The method and the device for desensitizing to the selected area data in the table file, provided by the embodiment of the application, are used for acquiring an area to be desensitized; identifying data keywords for the data in the area to be desensitized to obtain keyword information; matching the keyword information with a preset desensitization rule; and if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule. Therefore, desensitization processing can be performed on the sensitive data of the designated area in the table file by applying the embodiment of the application, and the availability of the information is ensured while the information security is ensured. Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method for desensitizing selected area data in a table file according to an embodiment of the present application;
FIG. 2a is a diagram of one possible example of desensitization of selected area data in a table file according to an embodiment of the present application;
FIG. 2b is a diagram illustrating another possible example of desensitization of selected area data in a table file according to an embodiment of the present application;
FIG. 3 is a table file of an embodiment of the present application illustrating a possible desensitization rule for desensitizing selected area data;
FIG. 4 is a block diagram of an apparatus for desensitizing selected area data in a table file according to an embodiment of the present application;
FIG. 5 is another block diagram of an apparatus for desensitizing to selected area data in a table file according to an embodiment of the present application;
fig. 6 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application discloses a method and a device for desensitizing selected area data in a table file, which are described in detail below.
Referring to fig. 1, fig. 1 is a flowchart of a method for desensitizing table files according to an embodiment of the present application to selected area data, including the following steps:
The method for desensitizing the table file according to the embodiment of the application to the selected area data aims at the table file in the intelligent terminal device, so that the method can be executed through the intelligent terminal device, and specifically, the intelligent terminal device can be a computer or an intelligent mobile phone.
The areas to be desensitized are areas in the table file. For example, the area to be desensitized may be all areas containing data in the table file, or the area to be desensitized may be an area designated in the table file.
And 102, identifying data keywords of the data in the region to be desensitized to obtain keyword information.
The keyword information is data information of the area to be desensitized, and may be, for example, a keyword in a first row of the selected area, such as a name, a mobile phone number, an id number, and other information of a header part, or a data bit number of the selected area.
And 103, matching the keyword information with a preset desensitization rule.
The preset desensitization rule can be set according to actual conditions. In one possible implementation, the preset desensitization rule is as shown in fig. 3, and the keyword information is matched with the mobile phone number, name, identification number, bank card number, and the like in the preset desensitization rule. Of course, other matching words such as passport number, social security account number, policy number, etc. may also be set according to actual situations, and will not be described herein.
And 104, if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule.
In the preset desensitization rule, a modification and replacement rule can be set for each matched vocabulary, or the same modification and replacement rule can be set for a plurality of matched vocabularies. The intelligent terminal equipment needs to execute the modification and replacement rule corresponding to the keyword information according to the setting of the preset desensitization rule. In one possible embodiment, the modification and replacement rule of the preset desensitization rule is as shown in fig. 3, only the last four digits of the mobile phone number are reserved, and the rest is replaced; for names, only the first bit is reserved, and the rest parts are replaced; for the address, only the first three bits are reserved, and the rest parts are replaced; for the ID card number and the bank card number, only the first four digits and the last four digits are reserved, and the rest parts are replaced. Of course, the replacement part can be set according to the actual situation, and the description is omitted here.
In practical applications, there may be a case where the keyword information does not match the preset desensitization rule. Optionally, after matching the keyword information with the preset desensitization rule, the method further includes:
and if the matching is unsuccessful, using the designated character to carry out full replacement on the data of the area to be desensitized.
The designated character can be set according to the actual situation, for example, the designated character can be set to "+", "#", or "X", etc. In order to make the embodiment of the present application more clearly understood, the following description illustrates that the area to be desensitized is a column in which the identification number is located, when the keyword information matches the preset desensitization rule, the area to be desensitized may be as shown in fig. 2a, and when the keyword information does not match the preset desensitization rule, the data of the area to be desensitized may be as shown in fig. 2b after being completely replaced.
It can be seen that, by applying the embodiment of the application, the user can implement the desensitization rule corresponding to different kinds of sensitive data. Desensitization processing is carried out on the sensitive data through implementation of desensitization rules. The method and the device are convenient for users to protect sensitive data, and the purpose of guaranteeing the information safety and the information usability is achieved.
Another flowchart of a method for desensitizing selected area data according to an embodiment of the present application includes the following steps:
step 201, obtaining an area selection instruction input by a user.
The area selection instruction input by the user is an instruction input by the user, for example, an area instruction selected by the user through a mouse, or a designated area of the form file manually input by the user through a keyboard, or all areas of the whole form file can be defaulted. Of course, the input can be performed in other manners according to actual situations, and details are not described here.
The area to be desensitized is determined by acquiring the area selection instruction input by the user, so that the user can conveniently and flexibly designate the area to be desensitized, and the user can conveniently designate data to be desensitized.
Step 202, determining the area to be desensitized according to the area selection instruction.
The area to be desensitized is determined according to the area selection instruction of the user, the area selected by the user can be determined as the area to be desensitized or the area outside the area selected by the user can be determined as the area to be desensitized, and other forms can also be included. For example, the current row of the area selected by the user in the form file by the mouse is determined as the area to be desensitized, or the current row or the current column where the area selected by the user is located is determined as the area to be desensitized, or the whole form text can be defaulted as the area to be desensitized, and the like, which is not described herein again.
By the designation of the region to be desensitized, simultaneous desensitization can be performed on a large amount of data. For example, a user may simultaneously desensitize a column of data in a spreadsheet document, or simultaneously desensitize the data for an entire document.
Step 203, identifying data keywords for the data in the region to be desensitized to obtain keyword information.
The identification of the data keywords is the identification of data, and can identify data information of a specified area in the form file, such as keywords of a first row in the form file, or can identify the whole selected area, the number of bits of data of the area to be desensitized, and the like.
And 204, matching the keyword information with a preset desensitization rule.
The preset desensitization rule is a desensitization implementation rule, can be a default desensitization rule set by a program, and can also be set by a user. For example, only the last four digits are reserved as a default for the mobile phone number, and the remaining digits are replaced by using the designated characters, or all the designated characters can be used for replacement by setting by the user.
And step 205, if the matching is successful, modifying and replacing the data in the region to be desensitized according to the preset desensitization rule.
In this step, the desensitization rule may take a variety of forms, for example: replacing all data of the region to be desensitized by using the designated characters; replacing the designated part of the data of the region to be desensitized by using designated characters; replacing the designated part of the data of the region to be desensitized by using custom characters; replacing all data of the region to be desensitized by using custom characters; for data for which keyword matching is unsuccessful, full or partial replacement is performed using custom characters or designated characters.
In the specific example, as shown in fig. 3: only the last four digits of the mobile phone number are reserved, and the rest is replaced; for names, only the first bit is reserved, and the rest parts are replaced; for the address, only the first three bits are reserved, and the rest parts are replaced; the first four digits and the last four digits are reserved for the identification number and the bank card number, and the rest is replaced, and the like.
Therefore, by applying the embodiment of the application, the user can independently designate the to-be-desensitized area, and simultaneously desensitize all the to-be-desensitized data in the to-be-desensitized area according to the desensitization rule matched with the to-be-desensitized data, so that the management of the to-be-desensitized area and the implementation of the desensitization rule are facilitated for the user.
Referring to fig. 4, fig. 4 is a structural diagram of an apparatus for desensitizing to selected area data in a table file according to an embodiment of the present application, which corresponds to the process shown in fig. 1, and includes:
a region acquisition module 401, configured to acquire a region to be desensitized;
a keyword obtaining module 402, configured to perform data keyword identification on the data in the region to be desensitized to obtain keyword information;
a desensitization rule matching module 403, configured to match the keyword information with a preset desensitization rule;
and the data desensitization module 404 is configured to modify and replace the data in the region to be desensitized according to the preset desensitization rule if the matching is successful.
In practical applications, there may be a case where the keyword information does not match the preset desensitization rule. Optionally, after matching the keyword information with the preset desensitization rule, the apparatus further includes:
and the all desensitization module is used for carrying out full replacement on the data of the area to be desensitized by using the designated character if the matching is unsuccessful.
It can be seen that, by applying the embodiment of the application, the user can implement the desensitization rule corresponding to different kinds of sensitive data. Desensitization processing is carried out on the sensitive data through implementation of desensitization rules. The method and the device are convenient for users to protect sensitive data, and the purpose of guaranteeing the information safety and the information usability is achieved.
Referring to fig. 5, fig. 5 is another structural diagram of an apparatus for desensitizing to selected area data in a table file according to an embodiment of the present application, including:
the region acquisition module 401 comprises an instruction acquisition submodule 501 and a region determination submodule 502, wherein the instruction acquisition submodule 501 is used for acquiring a region selection instruction input by a user, and the region determination submodule 502 is used for determining the region to be desensitized according to the region selection instruction;
a keyword obtaining module 402, configured to perform data keyword identification on the data in the region to be desensitized to obtain keyword information;
a desensitization rule matching module 403, configured to match the keyword information with a preset desensitization rule;
and the data desensitization module 404 is configured to modify and replace the data in the region to be desensitized according to the preset desensitization rule if the matching is successful.
Therefore, by applying the embodiment of the application, the user can independently designate the to-be-desensitized area, and simultaneously desensitize all the to-be-desensitized data in the to-be-desensitized area according to the desensitization rule matched with the to-be-desensitized data, so that the management of the to-be-desensitized area and the implementation of the desensitization rule are facilitated for the user.
An embodiment of the present application further provides an electronic device, including: a processor and a memory;
the memory is used for storing computer programs.
When the processor is used for executing the computer program stored in the memory, the following steps are realized:
obtaining a region to be desensitized;
identifying data keywords for the data in the area to be desensitized to obtain keyword information;
matching the keyword information with a preset desensitization rule;
and if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule.
Optionally, referring to fig. 6, the electronic device according to the embodiment of the present application further includes a communication interface 602 and a communication bus 604, where the processor 601, the communication interface 602, and the memory 603 complete communication with each other through the communication bus 604.
Optionally, when the processor is configured to execute the computer program stored in the memory, the following steps may also be implemented:
optionally, before the acquiring the region to be desensitized, the method further includes:
acquiring a region selection instruction input by a user;
and determining the region to be desensitized according to the region selection instruction.
Optionally, after matching the keyword information with the preset desensitization rule, the method further includes:
and if the matching is unsuccessful, using the designated character to carry out full replacement on the data of the area to be desensitized.
Optionally, the data in the region to be desensitized is subjected to data keyword identification to obtain keyword information, including:
and identifying data keywords for the first row data of the area to be desensitized to obtain keyword information.
Optionally, modifying and replacing the specified data of the region to be desensitized includes:
and replacing the designated data of the area to be desensitized by preset characters.
Therefore, by applying the embodiment of the application, the user can independently designate the to-be-desensitized area, and simultaneously desensitize all the to-be-desensitized data in the to-be-desensitized area according to the desensitization rule matched with the to-be-desensitized data, so that the management of the to-be-desensitized area and the implementation of the desensitization rule are facilitated for the user.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the following steps:
obtaining a region to be desensitized;
identifying data keywords for the data in the area to be desensitized to obtain keyword information;
matching the keyword information with a preset desensitization rule;
and if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule.
It can be seen that, by applying the embodiment of the application, the user can implement the desensitization rule corresponding to different kinds of sensitive data. Desensitization processing is carried out on the sensitive data through implementation of desensitization rules. The method and the device are convenient for users to protect sensitive data, and the purpose of guaranteeing the information safety and the information usability is achieved.
Optionally, the computer program, when executed by a processor, is further capable of implementing a method for desensitizing the table file to the selected area data.
It should be noted that, in this document, the technical features in the various alternatives can be combined to form the scheme as long as the technical features are not contradictory, and the scheme is within the scope of the disclosure of the present application. Relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiments of the apparatus, the electronic device, and the storage medium, since they are substantially similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
The above description is only for the preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application are included in the protection scope of the present application.
Claims (12)
1. A method for desensitizing to select area data in a tabular file, comprising:
obtaining a region to be desensitized;
identifying data keywords for the data in the area to be desensitized to obtain keyword information;
matching the keyword information with a preset desensitization rule;
and if the matching is successful, modifying and replacing the data in the area to be desensitized according to the preset desensitization rule.
2. The method of claim 1, wherein prior to said acquiring a region to be desensitized, the method further comprises:
acquiring a region selection instruction input by a user;
and determining the region to be desensitized according to the region selection instruction.
3. The method of claim 2, wherein after matching the keyword information with the preset desensitization rule, the method further comprises:
and if the matching is unsuccessful, using the designated character to carry out full replacement on the data of the area to be desensitized.
4. The method according to claim 1, wherein identifying data keywords for the data in the region to be desensitized to obtain keyword information comprises:
and identifying data keywords for the first row data of the area to be desensitized to obtain keyword information.
5. The method according to claim 1, wherein performing a modified replacement on the data specified by the region to be desensitized comprises:
and replacing the designated data of the area to be desensitized by preset characters.
6. An apparatus for desensitizing selected area data in a table file, comprising:
the region acquisition module is used for acquiring a region to be desensitized;
the keyword acquisition module is used for identifying data keywords for the data in the area to be desensitized to obtain keyword information;
the desensitization rule matching module is used for matching the keyword information with a preset desensitization rule;
and the data desensitization module is used for modifying and replacing the data in the area to be desensitized according to the preset desensitization rule if the matching is successful.
7. The apparatus of claim 6, wherein the region acquisition module comprises:
the instruction acquisition submodule is used for acquiring an area selection instruction input by a user;
and the region determining submodule is used for determining the region to be desensitized according to the region selecting instruction.
8. The apparatus of claim 7, further comprising:
and the all desensitization module is used for carrying out full replacement on the data of the area to be desensitized by using the designated character if the matching is unsuccessful.
9. The apparatus of claim 6, wherein the keyword obtaining module is specifically configured to:
and identifying data keywords for the first row data of the area to be desensitized to obtain keyword information.
10. The apparatus of claim 6, wherein the data desensitization module is specifically configured to:
and if the matching is successful, replacing the designated data of the area to be desensitized by preset characters according to the preset desensitization rule.
11. An electronic device comprising a processor and a memory;
the memory is used for storing a computer program;
the processor, when executing the program stored in the memory, implements the method for desensitizing the table file according to any of claims 1 to 5 with respect to the selected area data.
12. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out a method of desensitizing a table file according to any one of claims 1 to 5 with respect to selection data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910318080.8A CN111832062A (en) | 2019-04-19 | 2019-04-19 | Method and device for desensitizing selected area data in table file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910318080.8A CN111832062A (en) | 2019-04-19 | 2019-04-19 | Method and device for desensitizing selected area data in table file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111832062A true CN111832062A (en) | 2020-10-27 |
Family
ID=72911684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910318080.8A Pending CN111832062A (en) | 2019-04-19 | 2019-04-19 | Method and device for desensitizing selected area data in table file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111832062A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112329055A (en) * | 2020-11-02 | 2021-02-05 | 微医云(杭州)控股有限公司 | Method and device for desensitizing user data, electronic equipment and storage medium |
CN113688150A (en) * | 2021-07-27 | 2021-11-23 | 珠海金山办公软件有限公司 | Keyword searching method and device, electronic equipment and storage medium |
CN113850175A (en) * | 2021-09-22 | 2021-12-28 | 上海妙一生物科技有限公司 | Document identification method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440130A (en) * | 2013-08-26 | 2013-12-11 | 成都金山数字娱乐科技有限公司 | Data processing method and device |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107480549A (en) * | 2017-06-28 | 2017-12-15 | 银江股份有限公司 | A kind of shared sensitive information desensitization method of data-oriented and system |
CN108289095A (en) * | 2018-01-02 | 2018-07-17 | 诚壹泰合(北京)科技有限公司 | A kind of sensitive data storage method, apparatus and system |
-
2019
- 2019-04-19 CN CN201910318080.8A patent/CN111832062A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440130A (en) * | 2013-08-26 | 2013-12-11 | 成都金山数字娱乐科技有限公司 | Data processing method and device |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107480549A (en) * | 2017-06-28 | 2017-12-15 | 银江股份有限公司 | A kind of shared sensitive information desensitization method of data-oriented and system |
CN108289095A (en) * | 2018-01-02 | 2018-07-17 | 诚壹泰合(北京)科技有限公司 | A kind of sensitive data storage method, apparatus and system |
Non-Patent Citations (1)
Title |
---|
润乾: "数据脱敏的处理方法及查询", pages 1 - 1, Retrieved from the Internet <URL:https://zhuanlan.zhihu.com/p/53163513> * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112329055A (en) * | 2020-11-02 | 2021-02-05 | 微医云(杭州)控股有限公司 | Method and device for desensitizing user data, electronic equipment and storage medium |
CN113688150A (en) * | 2021-07-27 | 2021-11-23 | 珠海金山办公软件有限公司 | Keyword searching method and device, electronic equipment and storage medium |
CN113850175A (en) * | 2021-09-22 | 2021-12-28 | 上海妙一生物科技有限公司 | Document identification method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11023533B2 (en) | Node task data display method and apparatus, storage medium and computer equipment | |
CN111832062A (en) | Method and device for desensitizing selected area data in table file | |
CN108009435B (en) | Data desensitization method, device and storage medium | |
CN110377651B (en) | Batch data processing method, device, equipment and storage medium | |
CN114186275A (en) | Privacy protection method and device, computer equipment and storage medium | |
CN116089620B (en) | Electronic archive data management method and system | |
CN110826105A (en) | Distributed bank data desensitization method and system | |
CN112016317A (en) | Sensitive word recognition method and device based on artificial intelligence and computer equipment | |
CN114707180B (en) | Log desensitization method and device | |
CN111259207A (en) | Short message identification method, device and equipment | |
CN115618415A (en) | Sensitive data identification method and device, electronic equipment and storage medium | |
CN110888799A (en) | Software testing method and device | |
CN118133345A (en) | Message data processing method, device, computer equipment and storage medium | |
CN114444114A (en) | Data processing method, device, equipment and storage medium | |
CN111553130A (en) | Chapter title style conversion method and device, electronic equipment and storage medium | |
US11314797B2 (en) | Data de-identification apparatus and method | |
CN112329409B (en) | Cell color conversion method and device and electronic equipment | |
CN112634090A (en) | Home decoration information reporting management method, system, computer device and storage medium | |
CN113592523B (en) | Financial data processing system and method | |
CN112000257A (en) | Method and device for exporting key contents of document | |
CN116013316A (en) | Content analysis method, device, equipment and medium for teleconference | |
CN112835903A (en) | Sensitive data identification method and equipment | |
CN111428037A (en) | Method for analyzing matching performance of behavior policy | |
CN115081006A (en) | Sensitive data processing method, device and equipment | |
CN115034189A (en) | Table data processing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |