KR101636026B1 - System and method for destructing and removing privacy data - Google Patents
System and method for destructing and removing privacy data Download PDFInfo
- Publication number
- KR101636026B1 KR101636026B1 KR1020150095186A KR20150095186A KR101636026B1 KR 101636026 B1 KR101636026 B1 KR 101636026B1 KR 1020150095186 A KR1020150095186 A KR 1020150095186A KR 20150095186 A KR20150095186 A KR 20150095186A KR 101636026 B1 KR101636026 B1 KR 101636026B1
- Authority
- KR
- South Korea
- Prior art keywords
- personal information
- data
- target data
- target
- destruction
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G06F17/30289—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for processing personal information, and more particularly, to a system and method for discarding and separating personal information.
Recently, the Personal Information Protection Act was enacted to unify the legal system for protecting personal information and to strengthen the protection of personal information. In addition, various laws and ordinances such as the Credit Information Act, the Electronic Commerce Law, the Medical Law, .
According to these laws, public institutions, financial institutions, and corporations in general must destroy personal information of the customer who has completed the purpose of processing personal information and personal information of the customer when they are no longer needed, without delay , And should be stored and managed separately from other personal information when it is required to preserve it in accordance with the law.
Especially, customer information of a customer whose transaction has been terminated in a recent bankruptcy of customer information of a credit card company is stored together with personal information valid in a database management system (DBMS), causing more damage. In order to compensate, The need to destroy and keep personal information is continuously increasing because it can minimize these damages by severing and controlling the idle accounts of the company.
However, many companies purchase and operate products from various DBMS vendors. Therefore, in order to construct a DBMS for separate storage, all DBMS vendors' products should be purchased and a backup DB should be constructed. In this case, There is a problem that takes a lot of time.
According to an embodiment of the present invention, a DBMS of a low-cost single vendor product can be constructed, and a DBMS and method for collecting and archiving various DBMSs of an existing DBMS in one DBMS can be provided.
According to an embodiment of the present invention, there is provided a personal information destruction and storage system and method capable of systematically providing and supporting functions such as identification, confirmation, payment, destruction / separation and storage of personal information, and verification .
According to an embodiment of the present invention there is provided a personal information destruction and storage system comprising a computer having a processor and a memory, said system comprising a personal information destruction and separation storage program loaded and executed in the memory under the control of the processor A target customer determination function for receiving a list of target customers to be destroyed or separated and stored from the first database (DB) to identify a target customer; A target data determination function for receiving target data to be destroyed or detached and storing the target data and determining the target data; A schedule management function for receiving and registering schedule information for performing the digestion or archiving of the determined target data; And an execution function of executing the deleting or deleting of the determined target data. [0100] The personal information destruction and storage system may be provided.
According to an embodiment of the present invention, there is provided a method for personal information destruction and separation and storage by a personal information destruction and separation / storage program loaded into a memory under the control of a processor of a computer, the method comprising the steps of: (a) Receiving a list from a first database (DB) and identifying a target customer; (b) receiving data to be destroyed or separated and stored from the first DB and confirming target data; And (c) discarding the determined target data for the identified target customer or separately storing the determined target data in the second database (DB). have.
According to one embodiment of the present invention, there is an advantage that a low-cost single vendor product DBMS is constructed and various DBMSs of an existing periodical system operating system are collected in one DBMS for backup and management, thereby reducing system construction cost and effort.
According to an embodiment of the present invention, it is possible to systematically provide and support functions such as identification, confirmation, payment, destruction / separation and storage of personal information, and verification.
1 is a block diagram for explaining a personal information destruction and separation / storage system according to an embodiment of the present invention;
2 is an exemplary block diagram of a personal information destruction and separation storage system according to one embodiment;
FIG. 3 is an exemplary flow chart for establishing a customer for destruction and separation / storage of personal information according to an embodiment;
FIG. 4 is an exemplary flow chart for determining target data for destruction of personal information and separation and storage according to an embodiment;
5 is a diagram for explaining a meta-management function according to an embodiment,
FIG. 6 is an exemplary flow chart for schedule and payment of personal information destruction and separation and storage operations according to an embodiment;
FIG. 7 is an exemplary flow chart for performing the destruction and storage of personal information according to one embodiment.
BRIEF DESCRIPTION OF THE DRAWINGS The above and other objects, features, and advantages of the present invention will become more readily apparent from the following description of preferred embodiments with reference to the accompanying drawings. However, the present invention is not limited to the embodiments described herein but may be embodied in other forms. Rather, the embodiments disclosed herein are provided so that the disclosure can be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
In this specification, when an element is referred to as being on another element, it may be directly formed on another element, or a third element may be interposed therebetween.
Where the terms first, second, etc. are used herein to describe components, these components should not be limited by such terms. These terms have only been used to distinguish one component from another. The embodiments described and exemplified herein also include their complementary embodiments.
And is not intended to limit the present invention. In the present specification, the singular form includes plural forms unless otherwise specified in the specification. The terms "comprises" and / or "comprising" used in the specification do not exclude the presence or addition of one or more other elements.
Hereinafter, the present invention will be described in detail with reference to the drawings. In describing the specific embodiments below, various specific details have been set forth in order to explain the invention in greater detail and to assist in understanding it. However, it will be appreciated by those skilled in the art that the present invention may be understood by those skilled in the art without departing from such specific details. In some instances, it should be noted that portions of the invention that are well known in the description of the invention and not significantly related to the invention do not describe confusion in describing the present invention.
1 is a block diagram for explaining a personal information destruction and separation / storage system according to an embodiment of the present invention.
Referring to FIG. 1, a personal information destruction and
The
The personal information destruction and
FIG. 2 is an exemplary block diagram of a personal information destruction and
Referring to the drawings, a
The OS 10 may be any operating system, and may use Linux in one embodiment. The WAS
The WAS / HTTP is a functional unit for the
The WAS
The
In one embodiment, the
The target data identification function identifies the data to be destroyed or detached and confirms the object to be processed. According to this function, target data to be destroyed or separated and stored can be received from the
For example, when the
As an example of meta-management, a database catalog of each DBMS can be collected and a metadata DB can be generated based on the collected database catalog. Also, it is possible to compare the collected database catalog with the previously stored data in the metadata DB to judge whether a table of each DBMS is added or changed, and update the metadata DB based on the determination.
The schedule and approval management (33) includes a schedule management function for receiving and registering schedule information for performing the destruction or separation and holding of the target data, and a payment function for confirmation, approval and approval of the manager before execution of the destruction and separation / Lt; / RTI >
Execution and monitoring 34 may have the function of executing the destruction or detachment of confirmed target data and monitoring and displaying the execution process and execution result.
The
The database (DB) 50 is a storage unit that stores at least a part of data used when the
The
Although the hardware of the
Hereinafter, the main functions of the
Target customer identification features
The target customer identification function is a function for identifying a target customer to be destroyed or separated and to be determined and a target to be processed by the target customer identification function of the
3, in step S110, an identification SQL for the target customer identification is created and transmitted to the DBMS managing the
In general, since the criteria for destroying personal information or separating and storing are applied differently according to the types of business according to the standards set by various laws and regulations, in order to identify the customer data to be destroyed and separated according to these various standards, Identifies the target customer based on an identification SQL command for each selection criterion of a plurality of selection criteria according to a plurality of tasks.
For example, assuming that the
Accordingly, in step S110, an SQL command is generated for each of a plurality of selection criteria according to a plurality of tasks, and the SQL command is transmitted to the DBMS. After receiving the client list according to the result, As a result, the analysis results are comprehensively analyzed.
Thereafter, in step S130, the customer's confirmation of the customer list analyzed in step S120 is received. For example, displaying the analyzed customer list allows the administrators to review the list and enter a selection command to the
On the other hand, data such as a SQL command for each task for identifying a destruction and separation holding customer and data such as a customer list extracted from the
Target data identification function
The target data identification function is a function for identifying the destruction / separation storage target data of the
Referring to the drawing, in step S210, a schema of a target table for destruction / separation storage is registered. Here, the target table may be, for example, a ledger table including various customer information of the
Next, in step S220, an identification SQL that identifies data to be deleted and stored is transmitted to the DBMS managing the
On the other hand, data such as an SQL command for identifying the data to be destroyed and separated and stored may also be registered in the
Meta management function
The meta management manages meta data of a database. For example, when the
The general meta-management system should register and manage the table designers for standardization and configuration management. However, if this is done, the business process should be changed and the standardization work should be done. Accordingly, the personal information destruction and
5, a database catalog is collected from DBMSs of
By managing the metadata according to each DBMS, for example, when the personal information destruction and separation and
The
In one embodiment of the present invention, the table change history thus identified is stored and reviewed by the administrator, thereby identifying and managing the personal information only for the changed items without having to conduct the entire survey every time, thereby minimizing the time and cost for managing the metadata have.
Ability to identify tables and columns where personal information is stored
Meanwhile, when generating and managing the metadata of the
In this case, information of some tables or columns is not treated as personal information due to user's mistakes or omissions. In this case, There is also a problem that the management cost is increased. In an embodiment of the present invention, at least one of the following two methods can be used to solve this problem.
In the first method, a rule for identifying a column storing personal information is defined by using a naming rule, a data type, a length, and the like for each column, and by applying this rule, The stored column can be detected.
For example, in the case of the naming rule of the column, the customer number is often referred to as "CUST_NO" and the customer name is referred to as "CUST_NM" as shown in the
It is also possible to determine whether the personal information is stored using the length or type of the data stored in the column. For example, a column in which a 13-digit number string is stored (or a column in which a 6-digit string, a hyphen, and a 7-digit string are arranged in order) can be determined as a column in which a customer's social security number is stored. As another example, information stored in a specific column may be set to be recognized as personal information such as a resident registration number, a date of birth, a name, and the like depending on data types such as numbers, letters, and date formats.
Next, the second method for identifying the table and the column in which the personal information is stored is to define the pattern of the data according to the type of the personal information in advance, and to identify the data related to the personal information in the metadata DB using this pattern.
In one embodiment, a pattern of each personal information can be defined using a regular expression for personal information such as a customer's name, resident registration number, telephone number, and e-mail address. For example, in the case of a resident registration number, the first six digits before the hyphen ("-") are the date format and the seventh digit has a value of 1 to 4 depending on the gender. Accordingly, the pattern of the resident registration number is a regular expression Can be expressed.
As another example, for an email address, there is a rule that "@" is used after the mix of alphanumeric and special characters followed by a string of zero followed by at least one period (".") In the string , So you can express the pattern for the email address as a regular expression.
If at least one of the above methods is applied when managing the metadata as described above, the personal information can be automatically searched and informed to the administrator, thereby preventing the problem that the personal information is stored in the column due to the mistake of the manager or the management omission can do.
Schedule and approval management function
The schedule and approval management (33) may have a schedule management function for receiving and registering schedule information for performing the destruction or separation / holding work of the target data, and a settlement function for receiving approval from the administrator before execution of the destruction and separation / storage job.
FIG. 6 shows an exemplary flow chart for schedule and approval of personal information destruction and separation and storage operations according to an embodiment. First, in step S310, the user registers a work project for personal information destruction and separate archive. At this stage, for example, a new job for personal information destruction and separate storage is registered in the
Thereafter, in step S320, the execution schedule of the corresponding project is set by registering the scavenging and separation holding job schedule of the registered project. The task execution may be executed immediately after completion of the target customer confirmation and target data expansion described with reference to FIGS. 3 and 4, or may be set to be executed after a certain period of time.
Next, in step S330, the settlement of the destruction and separation keeping project is exited, and in step S340, the administrator approves the settlement. Steps S330 and S340 may be performed by, for example, displaying the approval upper screen on the display of the
Execution and monitoring functions
Execution and monitoring 34 may have the function of executing the destruction or detachment of confirmed target data and monitoring and displaying the execution process and execution result.
FIG. 7 is an exemplary flow chart for performing the destruction and storage of personal information according to one embodiment. Referring to FIG. 4, in step S410, it is determined whether or not the execution time of the personal information destruction and separation / storage job according to the predetermined schedule is the execution time. If it is determined to be the job execution time, the flow advances to step S420 to transmit the extracted SQL for extracting the destroyed and separated archive data to the DBMS of the
Thereafter, in step S430, the data extracted from the
As described above, although the present invention has been described with reference to the limited embodiments and drawings, the present invention is not limited to the above embodiments. It will be understood by those skilled in the art that various changes and modifications may be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the present invention should not be limited by the described embodiments, but should be determined by the equivalents of the appended claims, as well as the appended claims.
10: Operating system
20: WAS layer
30: Application
35: User interface
50: Database
100: Personal information destruction and separation system
200: Operating System
300: Separate archive server
Claims (15)
A target customer determining function of receiving a list of customers to be destroyed or separated and stored from a first database (DB) to identify a target customer;
A target data determination function for receiving target data to be destroyed or detached and storing the target data and determining the target data;
A schedule management function for receiving and registering schedule information for performing the digestion or archiving of the determined target data; And
And an execution function for executing the destruction or separation keeping operation of the determined target data,
Wherein the target customer determining function is to determine the target customer based on an identification SQL command for each selection criterion of a plurality of selection criteria for a plurality of jobs.
Wherein the target data is determined based on a target data identification SQL command for identifying data to be destroyed or separated and stored.
And a meta management function for analyzing a table structure of each DBMS and generating a DB of the metadata when the first DB is implemented as a plurality of DBMS products, .
And collects the database catalogs of the respective DBMSs and generates the metadata DB based on the collected database catalogs.
Comparing the collected database catalog with the previously stored data in the metadata DB to determine whether the table of each DBMS is added or changed, and updating the metadata DB based on the determined result. Separate storage system.
A rule for identifying a column in which personal information is stored by using at least one of a naming rule, a data type, and a data length for a column of the database is defined, and data related to the personal information is detected Wherein the personal information destruction and separation and storage system comprises:
Wherein a pattern of data according to the type of personal information is defined in advance and data associated with personal information can be detected from the metadata DB using the pattern.
(a) receiving a list of customers to be destroyed or separated from a first database (DB), and identifying a target customer;
(b) receiving data to be destroyed or separated and stored from the first DB and confirming target data; And
(c) discarding the determined target data for the identified target customer or separately storing the determined target data in a second database (DB)
Wherein the step (b) is to determine the target data based on a target data identification SQL command for identifying target data to be destroyed or detached or archived.
(d) judging whether or not the execution of the personal information destruction and separation storage execution time according to the predetermined schedule,
Wherein the step (a) to (c) is executed when it is determined that the execution time is the execution time.
Wherein the step (a) identifies the target customer based on an identification SQL command for each selection criterion of a plurality of selection criteria according to a plurality of tasks.
(e) analyzing a table structure of each DBMS to generate a DB of the metadata when the first DB is implemented as a plurality of DBMS products before the step (a) , Personal information destruction and separate storage methods.
Wherein the step (e) collects database catalogs of the respective DBMSs and generates the metadata DB based on the collected database catalogs.
Comparing the collected database catalog with previously stored data in the metadata DB to determine whether a table of each DBMS is added or changed; And
And updating the metadata DB based on a result of the determination.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150095186A KR101636026B1 (en) | 2015-07-03 | 2015-07-03 | System and method for destructing and removing privacy data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150095186A KR101636026B1 (en) | 2015-07-03 | 2015-07-03 | System and method for destructing and removing privacy data |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101636026B1 true KR101636026B1 (en) | 2016-07-05 |
Family
ID=56502068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150095186A KR101636026B1 (en) | 2015-07-03 | 2015-07-03 | System and method for destructing and removing privacy data |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101636026B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102109467B1 (en) | 2019-04-30 | 2020-05-12 | 주식회사 데이타젠네트웍스 | System and method for identifying data using correlatio n of business domain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000033525A (en) * | 1998-11-24 | 2000-06-15 | 이계철 | Method for providing private information to call center using intelligent network |
KR20020069549A (en) * | 2001-02-26 | 2002-09-05 | 삼성전자 주식회사 | Method for allocating meomory space for each item of personal information manager in personal portable terminal, computer-readable medium thereof and personal portable teminal thereof |
JP2010020613A (en) * | 2008-07-11 | 2010-01-28 | Ricoh Co Ltd | Document management system |
KR20120089917A (en) | 2010-12-21 | 2012-08-16 | 성신여자대학교 산학협력단 | System for protection and management of personal information, and method thereof |
KR20150021239A (en) | 2013-08-20 | 2015-03-02 | 유연희 | Management system for destruction of personal information and management method thereof |
-
2015
- 2015-07-03 KR KR1020150095186A patent/KR101636026B1/en active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000033525A (en) * | 1998-11-24 | 2000-06-15 | 이계철 | Method for providing private information to call center using intelligent network |
KR20020069549A (en) * | 2001-02-26 | 2002-09-05 | 삼성전자 주식회사 | Method for allocating meomory space for each item of personal information manager in personal portable terminal, computer-readable medium thereof and personal portable teminal thereof |
JP2010020613A (en) * | 2008-07-11 | 2010-01-28 | Ricoh Co Ltd | Document management system |
KR20120089917A (en) | 2010-12-21 | 2012-08-16 | 성신여자대학교 산학협력단 | System for protection and management of personal information, and method thereof |
KR20150021239A (en) | 2013-08-20 | 2015-03-02 | 유연희 | Management system for destruction of personal information and management method thereof |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102109467B1 (en) | 2019-04-30 | 2020-05-12 | 주식회사 데이타젠네트웍스 | System and method for identifying data using correlatio n of business domain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9324087B2 (en) | Method, system, and computer program product for linking customer information | |
US10572236B2 (en) | System and method for updating or modifying an application without manual coding | |
US8639616B1 (en) | Business to contact linkage system | |
JP2004078953A (en) | Data link system and method using coded link | |
US9336286B2 (en) | Graphical record matching process replay for a data quality user interface | |
US20110055072A1 (en) | Event processing for detection of suspicious financial activity | |
CN111178005B (en) | Data processing system, method and storage medium | |
CN112463737A (en) | System and method for rapidly acquiring data aiming at multi-format data intelligent matching template | |
US20030182211A1 (en) | Assets management system, and terminal for assets management and assets management apparatus | |
US20180101913A1 (en) | Entropic link filter for automatic network generation | |
US20150010289A1 (en) | Multiple retail device universal data gateway | |
CN112199483B (en) | Information input assisting method and device, electronic equipment and storage medium | |
KR101636026B1 (en) | System and method for destructing and removing privacy data | |
US10248638B2 (en) | Creating forms for hierarchical organizations | |
JP6655582B2 (en) | Data integration support system and data integration support method | |
US10817656B2 (en) | Methods and devices for enabling computers to automatically enter information into a unified database from heterogeneous documents | |
KR102109467B1 (en) | System and method for identifying data using correlatio n of business domain | |
JP2021103592A (en) | Document management device and method for managing document | |
KR20180071699A (en) | System for online monitoring individual information and method of online monitoring the same | |
JP2002063363A (en) | Insurance contract information management system and customer index generating method | |
KR101869653B1 (en) | Administrative task computerized publishing system connected with on-nara system, and administrative task computerized publishing method based on the same | |
JP5202655B2 (en) | Business flowchart search device and program | |
US20070226085A1 (en) | System and method for automated mapping of data in a multi-valued data structure | |
JP3721315B2 (en) | Name identification system, name identification method, storage medium storing a program for causing a computer to perform processing in the system, and information coincidence determination device | |
EP3503011A1 (en) | Data analytics engine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |