CN114254390A - Sensitive data desensitization processing method and device - Google Patents

Sensitive data desensitization processing method and device Download PDF

Info

Publication number
CN114254390A
CN114254390A CN202111590717.2A CN202111590717A CN114254390A CN 114254390 A CN114254390 A CN 114254390A CN 202111590717 A CN202111590717 A CN 202111590717A CN 114254390 A CN114254390 A CN 114254390A
Authority
CN
China
Prior art keywords
sensitive data
encrypted
desensitization processing
server
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111590717.2A
Other languages
Chinese (zh)
Inventor
邢玉博
党遇晴
荆元飞
吴敌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC, ICBC Technology Co Ltd filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202111590717.2A priority Critical patent/CN114254390A/en
Publication of CN114254390A publication Critical patent/CN114254390A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a sensitive data desensitization processing method and device, relates to the technical field of data security, and can be used in the financial field or other technical fields. The method comprises the following steps: acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier; encrypting the sensitive data and sending the encrypted sensitive data to a server; and if the encrypted sensitive data returned by the server are received, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data. The device performs the above method. The desensitization processing method and the desensitization processing device for the sensitive data provided by the embodiment of the invention not only can further improve the safety of the desensitization data in the data transmission process and ensure the data safety, but also can save the labor cost and the time cost by performing desensitization processing on the separated sensitive data which are independent from each other at the client.

Description

Sensitive data desensitization processing method and device
Technical Field
The invention relates to the technical field of data security, in particular to a sensitive data desensitization processing method and device.
Background
With the development of internet technology, higher requirements are put on user data security, and sensitive data desensitization gradually becomes a normal state. In the prior art, desensitization data interaction is realized between a server and a client, transmitted data is plaintext transmission, the security is to be further improved, the nesting relationship between sensitive data is complex, desensitization processing on the sensitive data with complex nesting relationship can be realized only by using a very complex desensitization algorithm when desensitization is performed on the server, and annotation, enumeration and the like are required by using manpower, so that the labor cost and the time cost are high.
Disclosure of Invention
In view of the problems in the prior art, embodiments of the present invention provide a method and an apparatus for desensitizing sensitive data, which can at least partially solve the problems in the prior art.
On one hand, the invention provides a sensitive data desensitization processing method, which comprises the following steps:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier;
encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance;
and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
Wherein the decrypting the encrypted sensitive data comprises:
and acquiring an encryption mode and an encryption key which are adopted when the sensitive data are encrypted, and decrypting the encrypted sensitive data according to the encryption mode and the encryption key.
Wherein, the desensitizing treatment of the decrypted sensitive data comprises:
and acquiring data capable of reflecting the user personalized private information in the decrypted sensitive data, and desensitizing the data capable of reflecting the user personalized private information.
After the step of decrypting the encrypted sensitive data and performing desensitization processing, the sensitive data desensitization processing method further includes:
and displaying the desensitized sensitive data locally, if a trigger action for viewing complete information triggered by the desensitized sensitive data is detected, performing desensitization relieving treatment on the desensitized sensitive data, and displaying the desensitized sensitive data locally.
The sensitive data desensitization processing method further comprises the following steps:
and if an error message returned after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and the validity check fails is received, generating a prompt message for prompting the client user to re-edit the sensitive information according to the error message.
After the step of encrypting the sensitive data and before the step of sending the encrypted sensitive data to the server, the sensitive data desensitization processing method further includes:
the encrypted sensitive data is stored locally.
In one aspect, the present invention provides a sensitive data desensitization processing apparatus, including:
the device comprises an acquisition unit, a judgment unit and a processing unit, wherein the acquisition unit is used for acquiring a sensitive data identifier for distinguishing sensitive data and separating the sensitive data according to the sensitive data identifier;
the encryption unit is used for encrypting the sensitive data and sending the encrypted sensitive data to the server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance;
and the desensitization processing unit is used for decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data if the encrypted sensitive data returned by the server after passing the validity check is received and decrypted according to the encryption mode and the encryption key.
Wherein the desensitization processing unit is specifically configured to:
and acquiring an encryption mode and an encryption key which are adopted when the sensitive data are encrypted, and decrypting the encrypted sensitive data according to the encryption mode and the encryption key.
In another aspect, an embodiment of the present invention provides an electronic device, including: a processor, a memory, and a bus, wherein,
the processor and the memory are communicated with each other through the bus;
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform a method comprising:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier;
encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance;
and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
An embodiment of the present invention provides a non-transitory computer-readable storage medium, including:
the non-transitory computer readable storage medium stores computer instructions that cause the computer to perform a method comprising:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier;
encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance;
and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
The sensitive data desensitization processing method and the device provided by the embodiment of the invention are used for acquiring sensitive data identifications used for distinguishing sensitive data and separating the sensitive data according to the sensitive data identifications; encrypting the sensitive data and sending the encrypted sensitive data to a server; if the encrypted sensitive data returned by the server after the encrypted sensitive data is decrypted according to the encryption mode and the encryption key and the validity check is passed are received, the encrypted sensitive data is decrypted and desensitization processing is carried out on the decrypted sensitive data, so that the safety of the desensitization data in the data transmission process can be further improved, the data safety is ensured, and the desensitization processing is carried out on the separated sensitive data which are independent of each other at the client side, so that the labor cost and the time cost are saved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a schematic flow chart of a sensitive data desensitization processing method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of a desensitization processing method for sensitive data according to another embodiment of the present invention.
Fig. 3 is a schematic flow chart of a desensitization processing method for sensitive data according to another embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a sensitive data desensitization processing apparatus according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
Fig. 1 is a schematic flow chart of a sensitive data desensitization processing method according to an embodiment of the present invention, and as shown in fig. 1, the sensitive data desensitization processing method according to the embodiment of the present invention includes:
step S1: and acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier.
Step S2: encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are pre-deployed in the server.
Step S3: and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
In the above step S1, the apparatus obtains the sensitive data identifier for distinguishing the sensitive data, and separates the sensitive data according to the sensitive data identifier. The apparatus may be a computer device for executing the method, and may include a client, specifically, a mobile phone or a tablet computer, for example. It should be noted that the acquisition and analysis of the sensitive data related to the user privacy of the embodiment of the present invention are authorized by the user. The sensitive data identification may include a sensitive data name, etc., such as an identification card, a cell phone, and a bank card. Sensitive data may include data relating to user privacy, such as identification numbers, cell phone numbers, bank card numbers, and the like. The identity card, the mobile phone and the bank card can distinguish whether the sensitive data is the identity card number, the mobile phone number or the bank card number.
Because the sensitive data are usually stored in the data form, the sensitive data in the data form can have correlation relationships such as mutual nesting, and the like, the sensitive data required by the embodiment of the invention are mutually independent and do not contain correlation relationships such as mutual nesting and the like. Namely, a string of numbers corresponding to the identity card, a string of numbers corresponding to the mobile phone and a string of numbers corresponding to the bank card are independent of each other and do not contain any association relationship, so that desensitization processing can be respectively realized on the independent sensitive data only by a simple desensitization method at the client.
It is to be understood that separating out sensitive data according to the sensitive data identification may include: and separating the sensitive data from the data form according to the sensitive data identification. The subsequent sensitive data in the embodiment of the invention are mutually independent and separated sensitive data.
In the step S2, the device encrypts the sensitive data and sends the encrypted sensitive data to the server; wherein, the encryption mode and the encryption key used for encryption are pre-deployed in the server. The encryption mode and the encryption key adopted by encryption are deployed in the server in advance, so that the server can conveniently decrypt the encrypted sensitive data.
Taking the example of the sensitive data as the mobile phone number, the sensitive data refers to the complete information of the mobile phone number, namely the mobile phone number consisting of 11 digits, and does not include any desensitization processing.
And encrypting the mobile phone number consisting of 11 digits to obtain the encrypted sensitive data 2c325c28e801a57062c383185ccaa 711. And sending the encrypted sensitive data to a server, wherein in the data transmission process, ciphertext is transmitted instead of desensitized sensitive data, for example, desensitized sensitive data 135 × 7852 not corresponding to the mobile phone number composed of 11-bit numbers.
It can be understood that the security of the encrypted sensitive data is higher than that of the desensitized sensitive data, and the encrypted sensitive data cannot be decoded even if being hijacked.
After the step of encrypting the sensitive data and before the step of sending the encrypted sensitive data to the server, the sensitive data desensitization processing method further includes:
the encrypted sensitive data is stored locally. Referring to the above example, the storage and data transmission processes are encrypted sensitive data, so that the security of the sensitive data is greatly improved.
In step S3, if the device receives the encrypted sensitive data returned by the server after decrypting the encrypted sensitive data according to the encryption mode and the encryption key and passing the validity check, the device decrypts the encrypted sensitive data and desensitizes the decrypted sensitive data. As shown in fig. 2, the server in fig. 2 corresponds to the server, and the server decrypts the encrypted sensitive data, and performs validity check, that is, checks whether the information is correctly filled, if the information is correctly filled, the validity check is passed, and if the information is incorrectly filled, the validity check is not passed.
And if the validity check is passed, the encrypted sensitive data is subjected to database storage, namely, the encrypted sensitive data is stored in a database in the server. As shown in fig. 3, the server returns the encrypted sensitive data to the client. And decrypting the encrypted sensitive data by the client and desensitizing the decrypted sensitive data.
Further, the sensitive data desensitization processing method further comprises the following steps:
and if an error message returned after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and the validity check fails is received, generating a prompt message for prompting the client user to re-edit the sensitive information according to the error message. As shown in fig. 2, if the validity check fails, the server returns an error message to the client, and the client generates a prompt message prompting the client user to edit the sensitive information again according to the error message, further, the error message may carry an error type, such as a mobile phone number operator sector digit error, or a mobile phone number digit error, so as to facilitate quick location of the prompt message in the form of a misplaced type. The client user re-edits the sensitive information, i.e. the sensitive information is filled in corresponding fig. 2.
Further, the decrypting the encrypted sensitive data includes:
and acquiring an encryption mode and an encryption key which are adopted when the sensitive data are encrypted, and decrypting the encrypted sensitive data according to the encryption mode and the encryption key. The encryption mode and the encryption key used for encryption can be stored locally at the client in advance, and the encryption mode and the encryption key used for encrypting the sensitive data can be obtained locally at the client.
Further, the desensitizing the decrypted sensitive data includes:
and acquiring data capable of reflecting the user personalized private information in the decrypted sensitive data, and desensitizing the data capable of reflecting the user personalized private information.
Referring to the above-mentioned mobile phone number consisting of 11 digits: the first 3 bits, i.e. the network identification number (belonging to a certain operator); for example, in a telephone number, the mobile, internet and telecommunications carriers have their own network identification number, and looking at the first 3 digits of the mobile phone number can roughly identify which carrier the number is.
Bits 4-7, namely, region code (the home is a city); representing the region number, each city, district and town has a different region number.
Bits 8-11, i.e., the user number (randomly assigned). These digital variables are also large and irregular.
It can be understood that the data capable of reflecting the personalized private information of the user is the 4 th-7 th mobile phone number, and the data capable of reflecting the personalized private information of the user is desensitized, that is, 135 × 7852 can be obtained.
Further, after the step of decrypting the encrypted sensitive data and performing desensitization processing, the sensitive data desensitization processing method further includes:
and displaying the desensitized sensitive data locally, if a trigger action for viewing complete information triggered by the desensitized sensitive data is detected, performing desensitization relieving treatment on the desensitized sensitive data, and displaying the desensitized sensitive data locally. Referring to the above example, in the local display 135 × × 7852, the triggered trigger action of viewing the complete information may be implemented by the client user clicking a button corresponding to the view complete information, and the desensitization processing is removed to obtain the mobile phone number composed of 11 digits.
The sensitive data desensitization processing method provided by the embodiment of the invention obtains the sensitive data identification for distinguishing the sensitive data, and separates the sensitive data according to the sensitive data identification; encrypting the sensitive data and sending the encrypted sensitive data to a server; if the encrypted sensitive data returned by the server after the encrypted sensitive data is decrypted according to the encryption mode and the encryption key and the validity check is passed are received, the encrypted sensitive data is decrypted and desensitization processing is carried out on the decrypted sensitive data, so that the safety of the desensitization data in the data transmission process can be further improved, the data safety is ensured, and the desensitization processing is carried out on the separated sensitive data which are independent of each other at the client side, so that the labor cost and the time cost are saved.
It should be noted that the sensitive data desensitization processing method provided by the embodiment of the present invention may be used in the financial field, and may also be used in any technical field other than the financial field.
Fig. 4 is a schematic structural diagram of a sensitive data desensitization processing apparatus according to an embodiment of the present invention, and as shown in fig. 4, the sensitive data desensitization processing apparatus according to the embodiment of the present invention includes an obtaining unit 401, an encrypting unit 402, and a desensitization processing unit 403, where:
the acquiring unit 401 is configured to acquire a sensitive data identifier for distinguishing sensitive data, and separate the sensitive data according to the sensitive data identifier; the encryption unit 402 is configured to encrypt the sensitive data and send the encrypted sensitive data to the server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance; the desensitization processing unit 403 is configured to, if the encrypted sensitive data returned by the server after passing the validity check and decrypting the encrypted sensitive data according to the encryption mode and the encryption key are received, decrypt the encrypted sensitive data, and perform desensitization processing on the decrypted sensitive data.
Specifically, an obtaining unit 401 in the device is configured to obtain a sensitive data identifier for distinguishing sensitive data, and separate the sensitive data according to the sensitive data identifier; the encryption unit 402 is configured to encrypt the sensitive data and send the encrypted sensitive data to the server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance; the desensitization processing unit 403 is configured to, if the encrypted sensitive data returned by the server after passing the validity check and decrypting the encrypted sensitive data according to the encryption mode and the encryption key are received, decrypt the encrypted sensitive data, and perform desensitization processing on the decrypted sensitive data.
The sensitive data desensitization processing device provided by the embodiment of the invention obtains the sensitive data identification for distinguishing the sensitive data, and separates the sensitive data according to the sensitive data identification; encrypting the sensitive data and sending the encrypted sensitive data to a server; if the encrypted sensitive data returned by the server after the encrypted sensitive data is decrypted according to the encryption mode and the encryption key and the validity check is passed are received, the encrypted sensitive data is decrypted and desensitization processing is carried out on the decrypted sensitive data, so that the safety of the desensitization data in the data transmission process can be further improved, the data safety is ensured, and the desensitization processing is carried out on the separated sensitive data which are independent of each other at the client side, so that the labor cost and the time cost are saved.
The desensitization processing unit 403 is specifically configured to:
and acquiring an encryption mode and an encryption key which are adopted when the sensitive data are encrypted, and decrypting the encrypted sensitive data according to the encryption mode and the encryption key.
The embodiment of the sensitive data desensitization processing apparatus provided in the embodiment of the present invention may be specifically used to execute the processing flows of the above method embodiments, and the functions of the apparatus are not described herein again, and reference may be made to the detailed description of the above method embodiments.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 5, the electronic device includes: a processor (processor)501, a memory (memory)502, and a bus 503;
the processor 501 and the memory 502 complete communication with each other through a bus 503;
the processor 501 is configured to call program instructions in the memory 502 to perform the methods provided by the above-mentioned method embodiments, for example, including:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier; encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance; and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
The present embodiment discloses a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the method provided by the above-mentioned method embodiments, for example, comprising:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier; encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance; and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
The present embodiment provides a computer-readable storage medium, which stores a computer program, where the computer program causes the computer to execute the method provided by the above method embodiments, for example, the method includes:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier; encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance; and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In the description herein, reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," "an example," "a particular example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A sensitive data desensitization processing method, comprising:
acquiring a sensitive data identifier for distinguishing sensitive data, and separating the sensitive data according to the sensitive data identifier;
encrypting the sensitive data and sending the encrypted sensitive data to a server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance;
and if the encrypted sensitive data returned after passing the validity check after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and receives the encrypted sensitive data, decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data.
2. The sensitive data desensitization processing method according to claim 1, wherein said decrypting the encrypted sensitive data includes:
and acquiring an encryption mode and an encryption key which are adopted when the sensitive data are encrypted, and decrypting the encrypted sensitive data according to the encryption mode and the encryption key.
3. The sensitive data desensitization processing method according to claim 2, wherein said desensitizing the decrypted sensitive data includes:
and acquiring data capable of reflecting the user personalized private information in the decrypted sensitive data, and desensitizing the data capable of reflecting the user personalized private information.
4. The sensitive data desensitization processing method according to any one of claims 1 to 3, wherein after said step of decrypting the encrypted sensitive data and performing desensitization processing, the sensitive data desensitization processing method further comprises:
and displaying the desensitized sensitive data locally, if a trigger action for viewing complete information triggered by the desensitized sensitive data is detected, performing desensitization relieving treatment on the desensitized sensitive data, and displaying the desensitized sensitive data locally.
5. The sensitive data desensitization processing method according to any of claims 1 to 3, characterized in that it further comprises:
and if an error message returned after the server decrypts the encrypted sensitive data according to the encryption mode and the encryption key and the validity check fails is received, generating a prompt message for prompting the client user to re-edit the sensitive information according to the error message.
6. The sensitive data desensitization processing method according to any one of claims 1 to 3, wherein after said step of encrypting the sensitive data and before said step of sending the encrypted sensitive data to the server, the sensitive data desensitization processing method further comprises:
the encrypted sensitive data is stored locally.
7. A sensitive data desensitization processing apparatus, comprising:
the device comprises an acquisition unit, a judgment unit and a processing unit, wherein the acquisition unit is used for acquiring a sensitive data identifier for distinguishing sensitive data and separating the sensitive data according to the sensitive data identifier;
the encryption unit is used for encrypting the sensitive data and sending the encrypted sensitive data to the server; wherein, the encryption mode and the encryption key used for encryption are deployed in the server in advance;
and the desensitization processing unit is used for decrypting the encrypted sensitive data and desensitizing the decrypted sensitive data if the encrypted sensitive data returned by the server after passing the validity check is received and decrypted according to the encryption mode and the encryption key.
8. The sensitive data desensitization processing apparatus according to claim 7, wherein said desensitization processing unit is specifically configured to:
and acquiring an encryption mode and an encryption key which are adopted when the sensitive data are encrypted, and decrypting the encrypted sensitive data according to the encryption mode and the encryption key.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 6 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202111590717.2A 2021-12-23 2021-12-23 Sensitive data desensitization processing method and device Pending CN114254390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111590717.2A CN114254390A (en) 2021-12-23 2021-12-23 Sensitive data desensitization processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111590717.2A CN114254390A (en) 2021-12-23 2021-12-23 Sensitive data desensitization processing method and device

Publications (1)

Publication Number Publication Date
CN114254390A true CN114254390A (en) 2022-03-29

Family

ID=80797226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111590717.2A Pending CN114254390A (en) 2021-12-23 2021-12-23 Sensitive data desensitization processing method and device

Country Status (1)

Country Link
CN (1) CN114254390A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826729A (en) * 2022-04-22 2022-07-29 马上消费金融股份有限公司 Data processing method, page updating method and related hardware
CN116933287A (en) * 2023-07-28 2023-10-24 南京维拓科技股份有限公司 Method for desensitizing and encrypting sensitive information in industrial software

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302328A (en) * 2015-05-20 2017-01-04 腾讯科技(深圳)有限公司 Sensitive user data processing system and method
CN108289095A (en) * 2018-01-02 2018-07-17 诚壹泰合(北京)科技有限公司 A kind of sensitive data storage method, apparatus and system
CN111104691A (en) * 2019-11-28 2020-05-05 贝壳技术有限公司 Sensitive information processing method and device, storage medium and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302328A (en) * 2015-05-20 2017-01-04 腾讯科技(深圳)有限公司 Sensitive user data processing system and method
CN108289095A (en) * 2018-01-02 2018-07-17 诚壹泰合(北京)科技有限公司 A kind of sensitive data storage method, apparatus and system
CN111104691A (en) * 2019-11-28 2020-05-05 贝壳技术有限公司 Sensitive information processing method and device, storage medium and equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826729A (en) * 2022-04-22 2022-07-29 马上消费金融股份有限公司 Data processing method, page updating method and related hardware
CN114826729B (en) * 2022-04-22 2024-05-28 马上消费金融股份有限公司 Data processing method, page updating method and related hardware
CN116933287A (en) * 2023-07-28 2023-10-24 南京维拓科技股份有限公司 Method for desensitizing and encrypting sensitive information in industrial software

Similar Documents

Publication Publication Date Title
CN110688662A (en) Sensitive data desensitization and inverse desensitization method and electronic equipment
CN110661748B (en) Log encryption method, log decryption method and log encryption device
CN106487659B (en) Information encryption method, information encryption device and terminal
CN114254390A (en) Sensitive data desensitization processing method and device
CN111385084A (en) Key management method and device for digital assets and computer readable storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN107040520B (en) Cloud computing data sharing system and method
CN111628863B (en) Data signature method and device, electronic equipment and storage medium
CN114499875A (en) Service data processing method and device, computer equipment and storage medium
CN107729760B (en) CSP implementation method based on Android system and intelligent terminal
CN112231309A (en) Method, device, terminal equipment and medium for removing duplicate of longitudinal federal data statistics
CN113609147B (en) Data sharing method and device and electronic equipment
CN111008400A (en) Data processing method, device and system
CN113946862A (en) Data processing method, device and equipment and readable storage medium
CN112287371B (en) Method and device for storing industrial data and computer equipment
CN116455572B (en) Data encryption method, device and equipment
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN115208630B (en) Block chain-based data acquisition method and system and block chain system
CN115567200B (en) Http interface anti-brushing method, system and related equipment
CN115022012B (en) Data transmission method, device, system, equipment and storage medium
CN115150193A (en) Method and system for encrypting sensitive information in data transmission and readable storage medium
CN116233847A (en) Login method, login device, computer equipment and storage medium
CN114978541B (en) Transaction data processing method, device, equipment and storage medium
CN110830252A (en) Data encryption method, device, equipment and storage medium
CN112449143B (en) Implementation method and implementation system of secure video

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination