WO2017024957A1 - Procédé et dispositif pour un traitement de données - Google Patents

Procédé et dispositif pour un traitement de données Download PDF

Info

Publication number
WO2017024957A1
WO2017024957A1 PCT/CN2016/092673 CN2016092673W WO2017024957A1 WO 2017024957 A1 WO2017024957 A1 WO 2017024957A1 CN 2016092673 W CN2016092673 W CN 2016092673W WO 2017024957 A1 WO2017024957 A1 WO 2017024957A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
desensitization
production
application
project
Prior art date
Application number
PCT/CN2016/092673
Other languages
English (en)
Chinese (zh)
Inventor
张金银
肖禹
江敏
曾文秋
廖育才
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2017024957A1 publication Critical patent/WO2017024957A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • the present application relates to the field of computers, and in particular to a technique for data processing.
  • the prior art cannot accurately control the processing process and environment of the data by the user, such as copying the visible data in the authorization phase, or the data sampling desensitization process is not flexible enough, and the data provider does not trust the usage data usage environment. Therefore, the contradiction between using the data and not allowing the data consumer to see or export the data is gradually highlighted.
  • the purpose of the present application is to provide a method and device for data processing, which is to solve the problem that data needs to be invisible during data usage and data security is ensured when confidential or non-confidential data exchange is performed.
  • a method for data processing which solves the problem that a service party needs data to be invisible during data usage, and the method includes:
  • the desensitization data is processed by the development project.
  • a method for data processing by using a data providing device end and a data application device end which solves the problem that data needs to be invisible when different business parties use non-confidential data exchange. Problem, the method includes:
  • the production data in the production project is desensitized to obtain corresponding desensitization data
  • the desensitization data is sent to the application development project via the development project according to result information of the development authorization process.
  • desensitization data from a development item in the data providing device is obtained by an application development project, wherein the desensitization data is obtained by desensitizing the production data of the production item in the data providing device;
  • the desensitization data is processed by the application development project.
  • a method for data processing by a data providing device end and a data application device end for use in a platform device end which solves the problem that different business parties perform confidential data exchange and use. Data is invisible and data security is guaranteed.
  • This method includes:
  • the platform device is configured to process desensitization data, wherein the desensitization data is obtained by desensitizing the production data in the data providing device;
  • the desensitization data is processed by the configured platform device.
  • an apparatus for performing data processing which solves the problem that a service party needs data invisibility to be invisible during data use, and the apparatus includes:
  • a data desensitizing device for desensitizing the production data in the production project to obtain corresponding desensitization data
  • a desensitization data transmitting device configured to send the desensitization data to a corresponding development project
  • a desensitization data processing device for processing the desensitization data by the development project.
  • an apparatus for data processing is used by a data providing device end and a data application device end, and the device solves the problem that different data is invisible when non-confidential data exchange is used by different service parties.
  • the device includes:
  • the data providing device data desensitizing device is configured to desensitize the production data in the production project to obtain corresponding desensitization data
  • the data providing device development development authorization device is used for the application in the corresponding data application device through the development project Development project for development authorization processing;
  • a desensitizing data transmitting device of the data providing device configured to send the desensitizing data to the application development project via the development project according to result information of the development authorization process
  • a desensitization data acquisition device on the data application device side for acquiring desensitization data from a development item in the data providing device through an application development project, wherein the desensitization data is obtained by taking production data of a production item in the data providing device Sensitive treatment obtained;
  • an apparatus for data processing by using a data providing device end and a data application device end on a platform device end is provided, and the device solves the problem that different business parties perform confidential data exchange and use. Data is invisible and data security is guaranteed.
  • the device includes:
  • the data providing device data desensitizing device is configured to desensitize the production data in the data providing device to obtain corresponding desensitization data
  • the data providing device desensitizing data sending device is configured to send the desensitizing data to a corresponding platform device for processing by a corresponding data application device;
  • a platform configuration device of the data application device configured to configure the platform device to process desensitization data, wherein the desensitization data is obtained by desensitizing the production data in the data providing device;
  • a device device configured on the platform device, configured to configure the platform device according to the corresponding data application device;
  • the desensitization data processing device on the platform device side is configured to process the desensitization data by using the configured platform device.
  • an embodiment of the present application desensitizes the production data in the data providing device at the data providing device end to obtain corresponding desensitization data; and acquires desensitization from the data providing device at the platform device end.
  • Data wherein the desensitization data is obtained by desensitizing the production data in the data providing device; configuring the platform device according to the corresponding data application device; processing the desensitization data through the configured platform device to solve The problem of confidential data exchange and the invisibility of data availability and data security when using different business parties, so that data is placed in a third-party security environment for circulation and use when the data provider and the user do not fully trust. It ensures the security of data flow and use.
  • FIG. 1 shows a flow chart of a method for performing data processing in accordance with an aspect of the present application
  • FIG. 2 shows a flow chart of a method for performing data processing in accordance with a preferred embodiment of the present application
  • FIG. 3 is a flowchart of a method for performing data processing implemented by a data providing device end and a data application device end according to another aspect of the present application;
  • FIG. 4 is a flow chart showing a method for performing data processing according to another embodiment of the data providing device and the data application device according to another preferred example of the present application;
  • FIG. 5 is a flowchart of a method for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another aspect of the present application;
  • FIG. 6 is a flowchart of a platform device-side method in a method for implementing data processing, which is implemented by a data providing device end, a data application device end, and a platform device end according to another preferred example of the present application;
  • FIG. 7 is a flowchart of a method for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another preferred example of the present application;
  • FIG. 8 shows a schematic diagram of an apparatus for performing data processing in accordance with another aspect of the present application.
  • FIG. 9 is a schematic diagram of an apparatus for performing data processing according to another preferred embodiment of the present application.
  • FIG. 10 is a schematic diagram of an apparatus for performing data processing according to a data providing device end and a data application device end according to another aspect of the present application;
  • FIG. 11 is a schematic diagram showing an apparatus for performing data processing, which is implemented by a data providing device end and a data application device end according to another preferred example of the present application;
  • FIG. 12 is a schematic diagram of an apparatus for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another aspect of the present application;
  • FIG. 13 is a schematic diagram of a platform device end in a device for implementing data processing, which is implemented by a data providing device end, a data application device end, and a platform device end according to another preferred embodiment of the present application;
  • FIG. 14 is a schematic diagram of an apparatus for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another preferred embodiment of the present application.
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • computer readable media does not include non-transitory computer readable media, such as modulated data signals and carrier waves.
  • the present application includes three cases of data processing, one of which is based on the control of the rights in the data use, so that the data provided by the business party is invisible in the process; and the second is based on the authorization mode, so that different business parties are in the process of non-confidential data exchange.
  • the medium-sized security circulation is also invisible; the third is based on the way of entrusting a third-party platform to ensure the security of different business parties in the process of confidential data exchange and processing.
  • the control based on the permission of the data in use makes the data provided by the business party invisible in the process of processing, that is, in the case that a business party needs to perform data processing, the business party secretly desensitizes the key features of the real data and
  • the process of providing the data developer with processing and finally processing the processing result is as follows.
  • the data processing device includes step S11, step S12, and step S13.
  • step S11 the data processing device desensitizes the production data in the production item to obtain corresponding desensitization data; in step S12, the data processing device transmits the desensitization data to the corresponding development project; The data processing device processes the desensitization data through the development project in step S13.
  • step S11 the data processing device desensitizes the production data in the production project to obtain corresponding desensitization data, which means that the service hides the key sensitive features of the real data in the controlled security environment, thereby obtaining the reserved The necessary data characteristics used by the data user hide or eliminate the data characteristics that would cause security issues to be sensitive
  • the production data is the real data that the business party needs to process.
  • the production project is the security environment controlled by the business party. It can be created by the business party and has relevant control rights such as accessing data object permissions, user management and authorization rights, and resource creation. For example, business company A needs research institute B to develop software for data of an application, and can create a production project in a data development platform that can be used by both parties.
  • the created account is accessible to the owner of the production project. Produce all the resources in the project and authorize the user or account and set the security settings of the production project.
  • the owner can assign a production account to have all the permissions except the security settings, so that the production account can develop an application for company A.
  • the real data is desensitized. Desensitize real data in a secure environment controlled by the business side, so that key security information of the data can be concealed to improve data security.
  • the data processing device sends the desensitization data to the corresponding development project, which means that the desensitization data is sent to the security of the data processing and control by the data development platform, for example, through a common trust data development platform.
  • the development project is a security environment that is trusted by the data provider for data processing by the data processing party.
  • the company A needs to perform software development processing on the data of an application in the data development platform. Create a production project and create a corresponding development project and assign development-related permissions such as creating tables, functions, resources, etc. in the development project to the development account of the B Institute, so that the desensitization data can be directly from the production project via the data development platform. Send to the development project.
  • the manner of sending the desensitization data includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices, but is not limited thereto.
  • the data processing device processes the desensitization data through the development project, that is, the data processor performs processing such as software development, data mapping, etc. on the desensitization data in a secure development project environment, but is not limited thereto.
  • the account or role of the development project to deal with the desensitization data is assigned or created by the business party providing the data.
  • the company A creates the production project and the owner of the development project assigns the B research institute or the company personnel to the development project.
  • Administrator the administrator has access to all objects in the development project, and can manage and authorize the user or role, such as assigning the data developer of the B research institute to develop the account, and the development account has the permission to create the table or function. Therefore, the desensitization data provided by Company A can be developed, thereby facilitating the secure management of the development account, and making the development account available to the real data but not visible.
  • FIG. 2 shows a flow chart of a method for performing data processing in accordance with a preferred embodiment of the present application. It includes step S11, step S12, step S13, step S14, and step S15.
  • step S11 the data processing device desensitizes the production data in the production item to obtain corresponding desensitization data; in step S12, the data processing device transmits the desensitization data to the corresponding development project; The data processing device processes the desensitization data by the development item in step S13; the data processing device returns the processing result of the desensitization data in the development item to the production item in step S14; in step S15 The medium data processing device issues the processing result through the production item.
  • step S11 and step S13 are the same as or similar to steps S11 and S13 in FIG. 1 and will not be described again.
  • the data processing device returns the processing result of the desensitization data in the development project to the production item in the data processing device in step S14, which refers to the processing result after the desensitization data is processed in the development project.
  • desensitization data processing results include, but are not limited to, software code developed based on desensitization data, plotted data charts, and the like.
  • the return method of desensitization data processing results includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices for transmission and reception.
  • the developer of the B research institute sends the code to the production project through the data development platform after developing the software code of the application through the development account in the development project based on the desensitization data, so that the company A processes the data processing result. Review or evaluate to further ensure the security of data and data processing results.
  • step S15 the data processing device issues the processing result through the production item, which means that the data provided by the data provider receives the returned desensitization data processing result in the production item, and then performs the code on the data processing result through the real data or Program performance verification or external output is not limited to this.
  • the release processing result is to verify the data processing result or to produce it through real production data.
  • Company A publishes the returned program code based on desensitization data on the data development platform in the production project, and the production account uses the real data to test the software program of the released data.
  • the data processing results are released in the production space so that the processing results are post-processed or verified within the data provider's secure environment, thereby improving the security of the data processing results.
  • the data processing device further comprises a step S16 (not shown) for setting the rights information of the development item regarding the desensitization data. That is, after the production project desensitizes the real data, the same desensitization data may More than one type of data processing, for example, software development, data analysis, etc. At this time, different uses have different data usage. Therefore, different usage rights information can be used to obtain different usage and processing of desensitization data during development. Permissions. In the above example, the data of the company A's desensitization data set during software development is read, created, etc., and the data analysis is only read-only.
  • sending the desensitization data to the development item according to the authority information in step S12 means that the desensitization data is selective according to different rights regarding desensitization data open to the development project.
  • Sent to the development project, for example, Company A will desensitize data for a month's data analysis to send only desensitization data for the current month, while the desensitization data required for development software is one year or quarter, thus making desensitization The transmission of data is more targeted and better manages the data.
  • FIG. 3 is a flowchart of a method for performing data processing implemented by a data providing device end and a data application device end according to another aspect of the present application.
  • the data providing device end includes step S11, step S12, and step S13; and the data application device end includes step S21 and step S22.
  • step S11 the data processing device desensitizes the production data in the production project to obtain corresponding desensitization data; in step S12, the data processing device performs the application development project in the corresponding data application device through the development project.
  • step S12 the data processing device performs the application development project in the corresponding data application device through the development project.
  • Developing a authorization process the data processing device transmits the desensitization data to the application development project via the development project according to the result information of the development authorization process in step S13; the data processing device passes the application development project in step S21 Obtaining desensitization data from a development item in the data providing device, wherein the desensitization data is obtained by desensitizing the production data of the production item in the data providing device; the data processing device is developed by the application in step S22 The project processes the desensitization data.
  • step S11 the data processing device desensitizes the production data in the production project to obtain the corresponding desensitization data, which means that the data providing device side, that is, the data providing device end is sensitive to the real data in the controlled security environment.
  • the concealment of features results in data that retains the necessary data features available to the data consumer and conceals or eliminates data characteristics that would result in security-sensitive data.
  • the production project is a security environment controlled by the data provider business.
  • Company A cooperates with Company C to jointly develop an application software.
  • Company A provides key data for software development and is responsible for part of software development.
  • the company is responsible for software development, so in data development In the platform, Company A creates a project space for the application, which is the data supply device.
  • the production project is the security environment for Company A to process real key data.
  • the creation owner of Project A of the company assigns the production account of the company. It has all the rights except the security settings in the production project, that is, before the data is provided by Company A, the data is desensitized in the production project, so that the key security information of the data can be concealed to improve the security of the data.
  • step S12 the data processing device performs development authorization processing on the application development project in the corresponding data application device through the development project, which means that both the data providing device end and the data application device end have both the production project and the corresponding development project, because The production data is real data and should not be sent directly to different business parties from the security point of view. Therefore, after the data is desensitized, the desensitization data is sent to the development project of the project, and the data application application development project of the device side uses the desensitization data. It is necessary to obtain the authorization of the business party represented by the data providing device side.
  • the authorization method includes authorizing the development project to the data application device, so that it can be sent through the data development platform or through SFTP or other secure file transfer methods, but is not limited thereto, or the development account in the data application device development project is performed.
  • Authorization so that the development account can directly read the desensitization data in the data-providing device-side development project.
  • C company initiates the development and control of company A in the data development platform when it needs A company data for software development.
  • Company A authorizes the development account in the development project of Company C through the ACL authorization between the tables in the data development platform, so that the desensitization data can be safely transferred in the development environment.
  • step S13 the data processing device sends the desensitization data to the application development project via the development project according to the result information of the development authorization process, which means that the data is provided after the development project of the data application device is authorized.
  • the device side sends the desensitization data in the controlled development project to the development project of the data application device.
  • the method of sending includes, but is not limited to, sending through a data development platform or developing a project in a data application device.
  • the development account is directly read according to the authorization, or is performed by SFTP or other secure file transmission method, but is not limited thereto.
  • the development account of Company C is read by the company A through the development project of the data providing device, and then the desensitization data is read according to the authority, so that the desensitization data is visible, the production data is invisible, and the real data is guaranteed in the data exchange process. Security.
  • the desensitization data obtaining means 321 acquires desensitization data from the development item in the data providing device by the application development project, wherein the desensitization data is desensitized by the production data of the production item in the data providing device
  • the processing is obtained, that is, as described above, after obtaining the authorization of the data application device, the desensitization data provided by the data providing device development project is obtained according to the authorization, and the above example is the development project in the project space created by the management company C.
  • the development account reads the desensitization data according to the authority after obtaining the authorization.
  • the data processing device processes the desensitization data through the application development project in step S22, that is, the development project managed by the data application device performs the desensitization data after acquiring the desensitization data of the data providing device end.
  • the application development project is a data development environment controlled by the data application device end, and the business party where the data application device end is located controls the development authority, thereby effectively supervising the safe circulation of data, and the above example, that is, the data
  • the project space where C Company is located in the development platform utilizes the development account of the authorized C company in the development space to develop the desensitized data of the read company A, so as to achieve desensitization data when the business side performs non-confidential data exchange processing. Visible and invisible to real data.
  • the data application device further includes a step S25 (not shown) for desensitizing the application production data in the application production project to obtain corresponding application desensitization data. That is, in the production project controlled by the data application device, the production data of the data application device can be desensitized to obtain the desensitization data of the data application device end.
  • the company A and the C company jointly carry out software development, C company While obtaining the desensitization data of Company A for development, combined with the real production data of Company C for software development, the data is desensitized in the production project of Company C controlled by the data development platform, thereby obtaining the company C. Desensitization data.
  • step S22 the data processing device processes the desensitization data and the application desensitization data through the application development project, that is, the development project of the data application device pair obtains the corresponding data application device end production project.
  • the desensitization data provided and processed, and the above example, that is, the development project of the company C in the data development platform develops and processes the desensitization data of the real data of the C company provided by the C company production project, thereby achieving In the joint development process of A and C companies, C company can combine the desensitization data of both parties to process and ensure the security of real data in the process of circulation.
  • FIG. 4 shows a flow chart showing a method for data processing implemented by the data providing device end and the data application device side according to another preferred example of the present application.
  • the data providing device end includes step S11, step S12, and step S13;
  • the data application device end includes step S21 and step S22; step S23; step S24.
  • the data processing device desensitizes the production data in the production item in step S11 to obtain Corresponding desensitization data; in step S12, the data processing device performs development authorization processing on the application development project in the corresponding data application device through the development project; in step S13, the data processing device according to the result information of the development authorization process
  • the desensitization data is sent to the application development project via the development project; in step S21, the data processing device acquires desensitization data from the development project in the data providing device through the application development project, wherein the desensitization data passes through the The production data desensitization process of the production item in the data providing device is obtained; in step S22, the data processing device processes the desensitization data through the application development project; in step S23, the data processing device stores the desensitization data in the The processing result in the application development project is provided to the application production project; in step S24, the data processing device issues the processing result through the application production project.
  • step S11, the step S12, the step S13, the step S21 and the step S22 are the same as or similar to the steps S11, S12, S13, S21 and S22 in FIG. 3 and will not be described again.
  • the processed result of the desensitization data provided by the device end is returned to the production project controlled by the data application device.
  • desensitization data processing results include, but are not limited to, software code developed based on desensitization data, plotted data charts, and the like.
  • the return method of desensitization data processing results includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices for transmission and reception.
  • the developer of Company C develops the software code of the application through the development account in the development project based on the desensitization data, and then sends the code to the production project of the C company through the data development platform, so that the company C is united.
  • the data processing results developed are uniformly reviewed or evaluated to further ensure the security of data and data processing results.
  • the data processing device issues the processing result through the application production item, that is, the data application device end receives the desensitized data processing result in the production project, and then performs the code on the data processing result through the real data or Program performance verification or external output is not limited to this.
  • the release processing result is to verify the data processing result or to obtain the data providing device end device in the production project after the authorization of the data on the data application device, and then to produce the data based on the real production data.
  • C company publishes the returned program code based on the desensitization data of company A on the data development platform in the production project, and the production account uses the real data authorized by company A to execute the software program on the released data. Test work.
  • the data processing result is released in the production space, so that the processing result is post-processed or verified in the security environment of the data provider, so that the company A and the C company cooperate in the process of data processing, and the development project authorizes the development project so that C
  • the company's development account can read the company's desensitization data, so that the development process has targeted protection and development of data permissions, development projects to improve the security of data processing results.
  • the data providing device end further includes a step S14 (not shown) for performing a production authorization process on the application production item in the data application device by the production item; step S15 (not shown), And transmitting the production data to the application production item via the production item according to result information of the production authorization process.
  • the data application device side further includes a step S26 (not shown) for acquiring production data of the production item in the data providing device by applying the production item.
  • the data processing device performs production authorization processing on the application production item in the data application device by using the production item, that is, the controlled production item of the data providing device end reads data through an authorized account, etc.
  • the production project on the data application device is authorized.
  • the authorization method includes, but is not limited to, the production project management account in the data providing device side, so that the management account of the data application device side production space can read the production data in the data providing device end by means of the access control between the tables, and the like.
  • the production account of the production project in the project space controlled by Company A authorizes the production account of the production project in the project space controlled by Company C, so that it can obtain the authority to read the real production data, thereby completing the authorization.
  • the sending, by the data processing device, the production data to the application production item via the production item according to the result information of the production authorization processing in step S15 refers to sending the production data to the data according to the authorization information of the data providing device end.
  • the above example is given, that is, after the authorization of the production project managed by the company C by the company A in the data development platform, the authorized production data of the company A is sent to the production project of the company C, Or the production account in the production project of Company C obtains the reading authority of the production data of Company A to read the production data of Company A.
  • step S26 the data processing device acquires the production data of the production item in the data providing device by applying the production item, wherein the step S23 performs the processing result in the application production item according to the production data.
  • the data application device obtains the production data of the data providing device according to the authorization
  • the processing result is verified by the production data of the data providing device.
  • the execution manner includes, but is not limited to, performing code or program performance verification or external output through real data.
  • the company C is released through the production account pair in the controlled production project.
  • the software code based on the desensitization data of Company A is tested or the software is tested by the production data provided by Company A to Company C, so that the production data is only distributed in the production project environment of A and C companies, and the desensitization data is only Circulated in the development environment of A and C companies, and guaranteed to be common
  • the line data development process only the visible side of the business development side of real data but the data is visible only to desensitization, so as to enhance the security of data in the non-confidential exchange.
  • FIG. 5 is a flowchart of a method for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another aspect of the present application.
  • the data providing device includes steps S11 and S12; the data application device includes step S21; and the platform device includes steps S31, S32, and S33.
  • step S11 the data processing device desensitizes the production data in the data providing device to obtain corresponding desensitization data; in step S12, the data processing device transmits the desensitization data to the corresponding platform device to Processing by the corresponding data application device; the data processing device acquires desensitization data from the data providing device in step S31, wherein the desensitization data is obtained by desensitizing the production data in the data providing device; The data processing device in S21 configures the platform device to process the desensitization data, wherein the desensitization data is obtained by desensitizing the production data in the data providing device; in step S32, the data processing device configures the platform device according to the corresponding data application device The data processing device processes the desensitization data through the configured platform device in step S33.
  • step S11 the data processing device desensitizes the production data in the data providing device to obtain the corresponding desensitization data, which means that the business party providing the data hides the key sensitive features of the real data at the data providing device end to obtain Retains the necessary data characteristics available to data consumers and conceals or eliminates data that can cause security-sensitive data characteristics.
  • production data refers to real data containing key sensitive features.
  • Data desensitization methods include, but are not limited to, desensitization directly on the data development platform or through manual screening. For example, Company A and Company D have certain types of data.
  • step S12 the data processing device sends the desensitization data to the corresponding platform device for processing by the corresponding data application device, which means that the desensitization data is sent to the data processing device end and the data providing device at the data providing device end.
  • the third-party data processing platform device side trusted by the service represented by the terminal enables the data application device to perform data processing in the third-party platform.
  • the corresponding platform device refers to a third-party data processing platform that is trusted by both parties that need to perform data flow, such as a jointly created controllable correlation number.
  • Company A and Company D jointly entrust a third party as the control and arbitration party in the exchange process, and the third party supervises one.
  • the project space is safely set up, and Company A sends the desensitization data to the project space controlled by the third party for Company D to process it in a third party.
  • the method of sending the desensitization data may be directly transmitted in the background through the data development platform or transmitted through a related protocol for secure transmission of the encrypted file, but is not limited thereto.
  • the data processing device acquires desensitization data from the data providing device in step S31, wherein the desensitization data is obtained by desensitizing the production data in the data providing device.
  • the platform device side is used as a data providing device and a security environment controlled by a third party trusted by the data application device end, and accepts or acquires the desensitization data of the data providing device end under a certain authority, thereby facilitating the data application device end.
  • the project space created by the third party in the data platform is authorized by the project space, such as the project space of A, to directly authorize the third-party project space to read the desensitization data, thereby reading or accepting A.
  • the company's desensitization data is authorized by the project space, such as the project space of A, to directly authorize the third-party project space to read the desensitization data, thereby reading or accepting A.
  • the data processing device configures the platform device to process the desensitization data in step S21, wherein the desensitization data is obtained by desensitizing the production data in the data providing device. That is, the data application device side performs the direct authorization of the development account or the project space package authorization on the platform device side, so that the data application device can process the desensitization data in the security environment controlled by the platform set end, For example, Company D authorizes the project space controlled by third parties in the data development platform, so that developers of Company D can process the data in the third-party project space.
  • the method for configuring the platform device may be to directly authorize the project space controlled by the platform or authorize the development-related account in the platform, so that the data application device can perform data processing through the account, but is not limited thereto.
  • the data processing device configures the platform device according to the corresponding data application device, and the platform device device performs the setting according to the data application device end, so that the data application device device can process the desensitization data in a security environment controlled by the platform device.
  • the manner in which the platform device is configured according to the corresponding data application device includes, but is not limited to, the development account of the authorized data application device end can perform data processing in the project space controlled by the platform device or the data application device directly performs authorization processing on the platform device end.
  • the platform device is configured to enable the data application device to process the desensitized data in the security management environment during the confidential data exchange, thereby improving the security of the confidential data.
  • step S33 the data processing device processes the desensitization data through the configured platform device, and the data application device is desensitized according to the permission of the device device in the third-party security environment controlled by the platform device.
  • Data processing in the above example, A, D company authorized the third-party project space in the data development platform, the developer of the D company is added to the third-party project space for data processing, so that the data application device can The use of data to provide confidential data on the device side, while the confidential data can not be copied in a secure third-party environment, thereby improving the security of the use and processing of confidential data.
  • FIG. 6 is a schematic diagram of a platform device-side method in a method for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another preferred embodiment of the present application.
  • the platform device end includes step S34, step S31, step S32, and step S33.
  • the data processing device creates an item in the platform device in step S34; the data processing device acquires desensitization data from the data providing device through the item in step S31, wherein the desensitization data passes through the opposite
  • the production data desensitization process is obtained in the data providing device; the data processing device configures the item according to the corresponding data application device in step S32; and the data processing device processes the desensitization data through the configured item in step S33 .
  • step S34 the data processing device creates a project in the platform device, which means that a secure data flow and a processing space are created in the platform device trusted by the data providing device and the data application device, so that the confidential data can be secure.
  • the protection is received.
  • Company A and Company D jointly commissioned the data development platform or a third party trusted by both parties to create a secure project space in the data development platform, so that A, Company D can process and share data in the project space.
  • the data processing device acquires desensitization data from the data providing device through the item in step S31, wherein the desensitization data is obtained by desensitizing the production data in the data providing device.
  • the project space created by the platform device side obtains desensitization data in the data providing device side by directly authorizing the project space of the data providing device side.
  • Company A is in the data development platform to the third party. The project space is authorized so that the desensitization data can only be accessed in the third-party project space, thereby limiting the circulation and processing range of the confidential data, thereby improving the security of the data.
  • step S32 the data processing device configures the item according to the corresponding data application device, that is, the platform device side sets the project space according to the authorization of the data application device end, and the third-party project space is obtained as an example.
  • the authorization of D company's project space is added to the developer of D company in the third project space, so that developers of Company D can process the desensitization data of Company A in the third-party project space.
  • step S33 the data processing device processes the desensitized data through the configured item, that is, the developer or the account of the data application device is configured, and then the platform device end is in the controlled project space.
  • the data provides desensitization data provided by the device side for processing.
  • the desensitization data of the confidential data provided by the company A is processed in the third-party project space, thereby Limiting the flow of confidential data to the project space further enhances the security of confidential data.
  • FIG. 7 is a flowchart of a method for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another preferred embodiment of the present application.
  • the data providing device end includes step S11, step S13, and step S12; the data application device end includes step S21; and the platform device end includes step S34, step S35, step S31, step S32, step S33, and step S36 and step S37.
  • step S34 the data processing device creates an item in the platform device; in step S11, the data processing device desensitizes the production data in the data providing device to obtain corresponding desensitization data; in step S13 The data processing device performs authorization processing on the items in the platform device; in step S35, the data processing device acquires authorization information of the data providing device and the data application device for the item; in step S12, the data processing device The desensitization data is sent to the corresponding platform device for processing by the corresponding data application device; in step S31, the data processing device acquires desensitization data from the data providing device through the item according to the authorization information, where The desensitization data is obtained by desensitizing the production data in the data providing device; the data processing device configures the platform device to process desensitization data in step S21, wherein the desensitization data is passed through the data providing device The production data desensitization process is obtained; in step S32, the data processing device is configured according to
  • step S11, step S12, and step S21 are the same as or similar to step S11, step S12, and step S21 in FIG. 5 and will not be described again.
  • Step S34 is the same as or similar to step S34 in FIG. 6, and will not be described again.
  • Authorizing the item in the platform device by the platform authorization device 713 in the data providing device refers to authorizing the project space controlled by the trusted platform device at the data providing device end.
  • the authorized party The platform device item can be packaged and authorized directly through the project in the data providing device, so that the confidential data provided by the data providing device can be obtained by the platform device project, and the above example is in the data development platform.
  • the company's project space packages and authorizes the third-party project space, so that the account of the third-party project space can read the desensitization data or the third-party project space has the right to accept desensitization data.
  • step S35 the data processing device acquires the authorization information of the data providing device and the data application device for the item, and refers to receiving the authorization of the data providing device end and the data application device end of the platform device end.
  • the flow and processing of confidential data are transferred in a secure environment of mutual trust.
  • the project space of Company A and Company D package and authorize the third-party project space, thereby making the company A take off.
  • Sensitive data can be streamed in third-party project spaces and developers of Company D can develop Desensitization data for Company A in a third-party space.
  • Data is transferred and processed in a secure and controllable environment through project authorization on the platform device side to improve data security.
  • step S31 the data processing device acquires desensitization data from the data providing device through the item according to the authorization information, wherein the desensitization data is taken off by the production data in the data providing device Sensitive treatment is obtained. That is, the project on the platform device side obtains the desensitization data according to the authorization of the data providing device end, wherein the obtaining manner includes, but is not limited to, reading the desensitized data within the authority according to the authorization of the project, In the data development platform, Company A grants the third-party project the right to read and copy the desensitized data of the confidential data, so that the third-party project acquires the desensitization data of Company A.
  • the items in the data providing device, the data application device, and the platform device include a production project and a development project.
  • the production project refers to a project space in the project that processes real data, and is controlled by each business party;
  • the development project is Refers to the project space where the developer handles the desensitization data in the project, and is used by the development account assigned by the business party.
  • the data processing device is further configured to acquire authorization information of the data providing device and the data application device for the production item. That is, the production project on the data development device side and the data application device side package and authorize the production items in the platform device side of the common trust, so that the real data to be processed within the allowable range of the two can be shared in a safe production project environment.
  • Company A and Company D authorize the production projects in the third-party projects in the data development platform, and obtain the real data required by the two parties to jointly develop the software after obtaining the authorization.
  • the data processing device is further configured to acquire desensitization data from the data providing device through the development item according to the authorization information, wherein the desensitization data is passed through the data providing device Production data desensitization is obtained.
  • the desensitization data in the platform device is desensitized by the data providing device
  • third-party development projects obtain desensitization data from company A, thereby adding developers to Developers in third-party development projects can use the development project to process and use the desensitization data of Company A, thus ensuring that desensitization data can be used by developers of Company D in a third-party security environment, but because it is in a third party.
  • the desensitized data cannot be copied or used for other purposes in a controlled environment, thus ensuring the security of confidential data.
  • the data processing device is further configured to configure the development item according to the corresponding data application device. That is, the data application device can process the desensitization data provided by the data providing device in the platform device by adding the development account in the data application device to the development project or the like through the platform device end.
  • the development project space shared by A and D companies in the data development platform adds the developer account of Company D to the project space of the third party according to the application of Company D, and then processes the desensitization data of Company A.
  • the data processing device is further configured to process the desensitization data through the configured development item in step S33.
  • the desensitization data provided by the data providing device is processed in the development project of the platform device side, and the developer of the D company in the data development platform is connected as an example.
  • the account number is added to the development of the desensitization data of Company A in the third-party development project space, so that the desensitization data cannot be copied or reserved for use in a third-party controlled environment, and the confidential data is guaranteed. Security.
  • step S36 the data processing device provides the processing result of the desensitization data in the application development project to the application production project.
  • desensitization data processing results include, but are not limited to, software code developed based on desensitization data, plotted data charts, and the like.
  • the return method of desensitization data processing results includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices for transmission and reception.
  • the developer of Company D develops the software code of the application through the development account in the third-party development project based on the desensitization data, and then sends the code back to the production project through the data development platform, so that Company A is in the third party.
  • Data processing results are reviewed or evaluated in the production project space to further ensure the security of data and data processing results.
  • step S37 the data processing device issues the processing result of the desensitization data in the development project through the production item.
  • the release processing result is to verify the data processing result or to produce it through real production data.
  • Company A publishes the returned program code based on desensitization data on the data development platform in the production project, and the production account uses the real data in the third-party project space to execute the software program on the released data. Test work.
  • the data processing results are published in the third-party production space, so that the processing results are post-processed or verified within the data provider's secure environment, thereby improving the logarithm According to the safety of the processing results.
  • the data application device further includes a step S22 (not shown) for performing authorization processing on the items in the platform device. That is, the data application device uses the data to provide the data of the device end, and in the case that the data needs to be processed together with the data, the platform can be authorized to obtain the data to apply the confidential data of the device or the desensitization data thereof.
  • the data development platform D company needs to combine the confidential data of Company D with the desensitization data of Company A to develop or research the software in the third-party development environment. Therefore, the project space controlled by Company D is the first.
  • the three-party platform project is authorized to provide desensitization data of D company's confidential data, so that the dual-issue data of the company's dual-issue data is properly protected when the shared data is processed.
  • the platform device end further includes a step S38 (not shown) for acquiring application desensitization data from the data application device through the development item according to the authorization information, wherein the application is desensitized The data is obtained by desensitizing the application production data in the data application device.
  • the data processing device is further configured to process the desensitization data and the application side desensitization data by the configured development item.
  • the platform device side obtains the desensitization data according to the authorization of the data application device, wherein the development project account including but not limited to the platform device obtains the access permission of the development project of the data application device side or the data application device sends the desensitization data to the device end
  • the development project of D company authorizes the development project of the third party, so that the desensitization data of the confidential data of D company can be separately or cooperated by the developer in the third-party development project.
  • the company's desensitization data is processed together, so that the confidential data of both parties in the third party is shared, and the third-party security management environment makes the data output need to be mutually permitted by both parties, thus protecting the data security.
  • the control based on the permission of the data in use makes the data provided by the business party invisible in the process of processing, that is, in the case that a business party needs to perform data processing, the business party secretly desensitizes the key features of the real data and
  • the process of providing the data developer with processing and finally processing the processing result is as follows.
  • FIG. 8 shows a schematic diagram of an apparatus for performing data processing in accordance with another aspect of the present application.
  • the data processing device includes a data desensitizing device 111, a desensitizing data transmitting device 112, and a desensitizing data processing device 113.
  • the data desensitizing device 111 in the data processing device desensitizes the production data in the production item to obtain corresponding desensitization data; the desensitization data transmitting device 112 sends the desensitization data to the corresponding development.
  • the desensitization data processing device 113 processes the desensitization data by the development project.
  • the data desensitizing device 111 in the data processing device desensitizes the production data in the production project to obtain the corresponding desensitization data, which means that the business hides the key sensitive features of the real data in the controlled security environment to obtain Retaining the necessary data features available to data users and hiding or eliminating them can cause security problems Data that senses the characteristics of the data.
  • the production data is the real data that the business party needs to process.
  • the production project is the security environment controlled by the business party. It can be created by the business party and has relevant control rights such as accessing data object permissions, user management and authorization rights, and resource creation.
  • business company A needs research institute B to develop software for data of an application, and can create a production project in a data development platform that can be used by both parties.
  • the created account is accessible to the owner of the production project.
  • the owner can assign a production account to have all the permissions except the security settings, so that the production account can develop an application for company A.
  • the real data is desensitized. Desensitize real data in a secure environment controlled by the business side, so that key security information of the data can be concealed to improve data security.
  • the desensitization data transmitting device 112 sends the desensitization data to the corresponding development project, which means sending the desensitized data to a security environment controlled by the data processing and controlling the data in a secure manner, for example, through a data platform of mutual trust.
  • the development project is a security environment that is trusted by the data provider for data processing by the data processing party.
  • the company A needs to perform software development processing on the data of an application in the data development platform. Create a production project and create a corresponding development project and assign development-related permissions such as creating tables, functions, resources, etc. in the development project to the development account of the B Institute, so that the desensitization data can be directly from the production project via the data development platform.
  • the manner of sending the desensitization data includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices, but is not limited thereto.
  • the desensitization data processing device 113 processes the desensitization data through the development project, which means that the data processor performs processing such as software development, data mapping, etc. on the desensitization data in a secure development project environment, but is not limited thereto. .
  • the account or role of the development project to deal with the desensitization data is assigned or created by the business party providing the data.
  • the company A creates the production project and the owner of the development project assigns the B research institute or the company personnel to the development project.
  • Administrator the administrator has access to all objects in the development project, and can manage and authorize the user or role, such as assigning the data developer of the B research institute to develop the account, and the development account has the permission to create the table or function. Therefore, the desensitization data provided by Company A can be developed, thereby facilitating the secure management of the development account, and making the development account available to the real data but not visible.
  • FIG. 9 shows a schematic diagram of an apparatus for performing data processing in accordance with another preferred embodiment of the present application.
  • the data processing device includes a data desensitizing device 211, a desensitizing data transmitting device 212, a desensitizing data processing device 213, a data processing result providing device 214, and a data processing result issuing device 215.
  • the data desensitizing device 211 in the data processing device desensitizes the production data in the production item to obtain corresponding desensitization data; the desensitization data transmitting device 212 sends the desensitization data to the corresponding development.
  • the desensitization data processing device 213 processes the desensitization data by the development project; the data processing result providing device 214 returns the processing result of the desensitization data in the development project to the production project; data processing The result issuing device 215 issues the processing result through the production item.
  • the data desensitizing device 211 and the desensitizing data processing device 213 are the same as or similar to the data desensitizing device 111 and the desensitizing data processing device 113 in FIG. 8 and will not be described again.
  • the data processing result providing means 214 in the data processing device returns the processing result of the desensitization data in the development item to the production item, which means that the processing result after the desensitization data is processed in the development item is returned.
  • desensitization data processing results include, but are not limited to, software code developed based on desensitization data, plotted data charts, and the like.
  • the return method of desensitization data processing results includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices for transmission and reception.
  • the developer of the B research institute sends the code to the production project through the data development platform after developing the software code of the application through the development account in the development project based on the desensitization data, so that the company A processes the data processing result. Review or evaluate to further ensure the security of data and data processing results.
  • the data processing result issuing device 215 issues the processing result through the production item, which means that the data provided by the data provider receives the returned desensitization data processing result in the production item, and then performs the code or the program on the data processing result through the real data.
  • Performance verification or external output is not limited to this.
  • the release processing result is to verify the data processing result or to produce it through real production data.
  • Company A publishes the returned program code based on desensitization data on the data development platform in the production project, and the production account uses the real data to test the software program of the released data.
  • the data processing results are released in the production space so that the processing results are post-processed or verified within the data provider's secure environment, thereby improving the security of the data processing results.
  • the data processing device further includes desensitization data authority setting means 216 (not shown) for setting authority information of the development item regarding the desensitization data. That is, after the production project desensitizes the real data, the same desensitization data may be used for more than one type of data processing, for example, software development, data analysis, etc., at this time, different uses of the data are different, so by setting Different permission information can be used differently for the desensitization data during development.
  • the data of the company A's desensitization data set during software development is read, created, etc., and the data analysis is only read-only.
  • the desensitizing data transmitting device 212 sending the desensitization data to the development project according to the authority information refers to selectively desensitizing data according to different rights regarding desensitization data open to a development project.
  • Sending to the development project, for example, Company A will need to perform desensitization data for a month of data analysis to send only desensitization data for the current month, while the desensitization data required for development software is one year or one quarter, thus making it take off
  • the transmission of sensitive data is more targeted and better manages the data.
  • FIG. 10 is a schematic diagram of an apparatus for performing data processing implemented by a data providing device end and a data application device end according to another aspect of the present application.
  • the data providing device includes a data desensitizing device 311, a development authorization device 312, and a desensitization data transmitting device 313.
  • the data application device includes a desensitizing data acquiring device 321 and a desensitizing data processing device 322.
  • the data desensitizing device 311 desensitizes the production data in the production project to obtain corresponding desensitization data;
  • the development authorization device 312 develops and authorizes the application development project in the corresponding data application device through the development project;
  • the sensitive data transmitting device 313 sends the desensitized data to the application development project via the development project according to the result information of the development authorization process;
  • the desensitization data obtaining device 321 acquires the development from the data providing device through the application development project Desensitization data of the item, wherein the desensitization data is obtained by desensitizing the production data of the production item in the data providing device;
  • the desensitization data processing device 322 processes the desensitization data by the application development project.
  • the data desensitizing device 311 desensitizes the production data in the production project to obtain the corresponding desensitization data, which means that the data providing device side, that is, the data providing device end is sensitive to the real data in the controlled security environment.
  • the production project is a security environment controlled by the data provider business.
  • Company A cooperates with Company C to jointly develop an application software.
  • Company A provides key data for software development and is responsible for part of software development.
  • the company is responsible for software development. Therefore, in the data development platform, Company A creates a project space for the application, which is the data supply device.
  • the production project is the security environment for Company A to process real critical data, and the creation of owner A project space. Assigning the company's production account, the production account has all the rights except the security settings in the production project, that is, the data is desensitized in the production project before the company A provides the data, so that the key security information of the data can be Be concealed to improve data security.
  • the development authorization device 312 develops the authorization processing for the application development project in the corresponding data application device through the development project, which means that both the data providing device end and the data application device end have both the production project and the corresponding development project, because the production data is The real data should not be sent directly to different business parties from the security point of view. Therefore, after the data is desensitized, the desensitization data is sent to the development project of the project, and the development project of the data application device needs to obtain the desensitization data before using the desensitization data.
  • the data provides authorization for the business party represented by the device side.
  • the authorization method includes authorizing the development project to the data application device, so that it can be sent through the data development platform or through SFTP or other secure file transfer methods, but is not limited thereto, or the development account in the data application device development project is performed.
  • Authorization so that the development account can directly read the desensitization data in the data-providing device-side development project.
  • C company initiates the development and control of company A in the data development platform when it needs A company data for software development.
  • Company A authorizes the development account in the development project of Company C through the ACL authorization between the tables in the data development platform, so that the desensitization data can be safely transferred in the development environment.
  • the desensitization data transmitting device 313 sends the desensitization data to the application development project via the development project according to the result information of the development authorization process, and refers to the data providing device after the development project of the data application device end is authorized.
  • the terminal sends the desensitization data in the controlled development project to the development project on the data application device side.
  • the method of sending includes, but is not limited to, sending through a data development platform or developing a project in a data application device.
  • the development account is directly read according to the authorization, or is performed by SFTP or other secure file transmission method, but is not limited thereto.
  • the development account of Company C is read by the company A through the development project of the data providing device, and the desensitization data is read according to the authority, so that the desensitization data is visible and the production data is invisible, and the protection is guaranteed.
  • the security of real data during the data exchange process is guaranteed.
  • the desensitization data obtaining means 321 acquires desensitization data from the development item in the data providing device through the application development project, wherein the desensitization data is obtained by desensitizing the production data of the production item in the data providing device, That is, as described above, after the data application device is authorized, the desensitization data provided by the data providing device development project is obtained according to the authorization, and the above example, that is, the development account in the development project in the project space created by the C company is controlled. After obtaining authorization, the desensitization data is read according to the authority.
  • the desensitization data processing device 322 processes the desensitization data by using the application development project, where the development project managed by the data application device processes the desensitization data after acquiring the desensitization data of the data providing device end.
  • the application development project is a data development environment controlled by the data application device end, and the business party where the data application device end is located controls the development authority, thereby effectively supervising the safe circulation of data, and the above example, that is, the data
  • the project space where C Company is located in the development platform utilizes the development account of the authorized C company in the development space to develop the desensitized data of the read company A, so as to achieve desensitization data when the business side performs non-confidential data exchange processing. Visible and invisible to real data.
  • the data application device side further includes a data desensitizing device 325 (not shown) for desensitizing the application production data in the application production project to obtain corresponding application desensitization data. That is, in the production project controlled by the data application device, the production data of the data application device can be desensitized to obtain the desensitization data of the data application device end.
  • the company A and the C company jointly carry out software development, C company While obtaining the desensitization data of Company A for development, combined with the real production data of Company C for software development, the data is desensitized in the production project of Company C controlled by the data development platform, thereby obtaining the company C. Desensitization data.
  • the desensitization data processing device 322 is further configured to process the desensitization data and the application desensitization data by using the application development project, that is, the data application device-side development project obtains its corresponding data application device.
  • the desensitization data provided in the end production project is processed and processed.
  • the above example that is, the development project of C company in the data development platform develops the desensitization data of the real data of the C company provided by the C company production project. Processing, so that A and C companies in the joint development process, C company can combine the desensitization data of both parties for processing and can ensure the security of real data in the process of circulation.
  • FIG. 11 shows a schematic diagram of a device for performing data processing, which is implemented by a data providing device end and a data application device end according to another preferred embodiment of the present application, wherein the data providing device The end includes a data desensitizing device 411, a development authorization device 412, and a desensitization data transmitting device 413; the data application device end includes desensitization data acquiring device 421 and desensitization data processing device 422; data processing result providing device 423; data processing The result is published 424.
  • the data providing device The end includes a data desensitizing device 411, a development authorization device 412, and a desensitization data transmitting device 413;
  • the data application device end includes desensitization data acquiring device 421 and desensitization data processing device 422; data processing result providing device 423; data processing The result is published 424.
  • the data desensitizing device 411 desensitizes the production data in the production project to obtain corresponding desensitization data; and the development authorization device 412 develops and authorizes the application development project in the corresponding data application device through the development project;
  • the sensitive data transmitting device 413 sends the desensitized data to the application development project via the development project according to the result information of the development authorization process;
  • the desensitization data acquiring device 421 acquires the development from the data providing device through the application development project Desensitization data of the item, wherein the desensitization data is obtained by desensitizing the production data of the production item in the data providing device;
  • the desensitization data processing device 422 processes the desensitization data by the application development project;
  • the data processing result providing means 423 supplies the processing result of the desensitization data in the application development item to the application production item;
  • the data processing result issuing means 424 issues the processing result through the application production item.
  • the data desensitizing device 411, the development authorizing device 412, the desensitizing data transmitting device 413, the desensitizing data acquiring device 421, and the desensitizing data processing device 422 are the same as the data desensitizing device 311 and the development authorizing device 312 in FIG.
  • the desensitization data transmitting device 313, the desensitizing data acquiring device 321, and the desensitizing data processing device 322 are the same or similar and will not be described again.
  • the data processing result providing means 423 in the data application device side provides the processing result of the desensitization data in the application development project to the application production item, and refers to the data providing device in the development project of the data application device side
  • the processed result of the desensitization data provided by the terminal is returned to the production project controlled by the data application device.
  • desensitization data processing results include, but are not limited to, software code developed based on desensitization data, plotted data charts, and the like.
  • the return method of desensitization data processing results includes, but is not limited to, a background system of the data development platform or a secure channel such as SFTP is established between the computer devices for transmission and reception.
  • the developer of Company C develops the software code of the application through the development account in the development project based on the desensitization data, and then sends the code to the production project of the C company through the data development platform, so that the company C is united.
  • the data processing results developed are uniformly reviewed or evaluated to further ensure the security of data and data processing results.
  • the data processing result issuing device 424 issues the processing result through the application production item, which means that the data application device receives the returned desensitization data processing result in the production project, and then performs the code or the program on the data processing result through the real data.
  • Performance verification or external output is not limited to this.
  • the release processing result is to verify the data processing result or to obtain the data providing device end device in the production project after the authorization of the data on the data application device, and then to produce the data based on the real production data.
  • Company C returns to the production project.
  • the program code based on the desensitization data development of company A is released on the data development platform, and the production account uses the real data authorized by company A to test the software program of the released data.
  • the data processing result is released in the production space, so that the processing result is post-processed or verified in the security environment of the data provider, so that the company A and the C company cooperate in the process of data processing, and the development project authorizes the development project so that C
  • the company's development account can read the company's desensitization data, so that the development process has targeted protection and development of data permissions, development projects to improve the security of data processing results.
  • the data providing device end further includes a production authorization device 414 (not shown) for performing production authorization processing on the application production item in the data application device by the production item; and the production data transmitting device 415 ( Not shown) for transmitting the production data to the application production item via the production item according to result information of the production authorization process.
  • the data application device side further includes a production data acquisition device 426 (not shown) for acquiring production data of the production items in the data providing device by applying the production item.
  • the production authorization device 414 (not shown) performs production authorization processing on the application production item in the data application device by the production item, that is, the controlled production item of the data providing device end is read by the authorized account.
  • Data, etc. authorize production projects on the data application device side.
  • the authorization method includes, but is not limited to, the production project management account in the data providing device side, so that the management account of the data application device side production space can read the production data in the data providing device end by means of the access control between the tables, and the like.
  • the production account of the production project in the project space controlled by Company A authorizes the production account of the production project in the project space controlled by Company C, so that it can obtain the authority to read the real production data, thereby completing the authorization.
  • a production data transmitting device 415 for transmitting the production data to the application production item via the production item according to the result information of the production authorization process means authorizing information according to the data providing device side
  • the production data is sent to the controlled production project of the data application device side.
  • the authorized production data of the company A is sent to the C.
  • the reading authority of the production data of company A is obtained to read the production data of company A.
  • a production data obtaining means 426 (not shown) for acquiring production data of the production item in the data providing device by applying the production item, wherein the data processing result issuing means 423 is based on the production data
  • the execution result of the processing in the application production project refers to that after the data application device obtains the production data of the data providing device according to the authorization, after obtaining the processing result obtained based on the desensitization data of the data providing device on the controlled production item, the data is passed.
  • the executing party The formula includes, but is not limited to, code or program performance verification or external output through real data.
  • the company C releases the desensitization data based on the company A through the production account in the controlled production project.
  • the obtained software code is tested or tested by the production data provided by Company A to Company C, so that the production data is only distributed in the production project environment of A and C companies.
  • the desensitization data is only in A and C companies.
  • the circulation in the development environment ensures that when the data development process is jointly performed, only the business party can see the real data, but the developer only sees the desensitization data, thereby improving the security of the data during non-confidential exchange.
  • the different business parties are secured in the process of confidential data exchange and processing, that is, the business side providing data to the two parties in the business involved in the confidential data exchange entrusts the data to the mutual trust security.
  • the data processing business side adds the developer authorization to the third party for data processing, thus ensuring the effect that the confidential data is available but not replicable in a secure management environment, as follows.
  • FIG. 12 is a schematic diagram of an apparatus for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another aspect of the present application.
  • the data providing device includes a data desensitizing device 511 and a desensitizing data transmitting device 512.
  • the data application device includes a platform configuration device 521.
  • the platform device includes a desensitizing data acquiring device 531, a configuration device 532, and a desensitizing data processing device. 533.
  • the data desensitizing device 511 in the data providing device performs desensitization processing on the production data in the data providing device to obtain corresponding desensitization data; the desensitizing data transmitting device 512 transmits the desensitized data to the corresponding platform.
  • the device is processed by the corresponding data application device; the desensitization data obtaining device 531 in the platform device end acquires desensitization data from the data providing device, wherein the desensitization data is desensitized by the production data in the data providing device
  • the data acquisition device platform configuration device 521 configures the platform device to process the desensitization data, wherein the desensitization data is obtained by desensitizing the production data in the data providing device;
  • the platform device end configuration device 532 is configured according to The platform device is configured to correspond to the data application device; the desensitization data processing device 533 processes the desensitization data through the configured platform device.
  • the data desensitizing device 511 in the data providing device desensitizes the production data in the data providing device to obtain the corresponding desensitized data, which means that the data providing device is sensitive to the real data at the data providing device end.
  • the concealment of features results in data that retains the necessary data features available to the data consumer and conceals or eliminates data characteristics that would result in security-sensitive data.
  • production data refers to real data containing key sensitive features.
  • Data desensitization methods include, but are not limited to, desensitization directly on the data development platform or through manual screening. For example, Company A and Company D have certain types of data.
  • the desensitizing data sending device 512 sends the desensitized data to the corresponding platform device for processing by the corresponding data application device, and means sending the desensitized data to the data processing device end and the data providing device end at the data providing device end.
  • the third-party data processing platform device side trusted by the represented business parties enables the data application device side to perform data processing in the third-party platform.
  • the corresponding platform device refers to a third-party data processing platform that is trusted by both parties of the data flow, such as a data processing space or platform project that can jointly create related data processing permissions, but is not limited thereto.
  • Company A and Company D jointly entrust a third party as the control and arbitration party in the exchange process.
  • the third party supervises a project space and performs security settings.
  • Company A sends desensitization data to the first
  • the project space controlled by the three parties is for the company D to process it in a third party.
  • the method of sending the desensitization data may be directly transmitted in the background through the data development platform or transmitted through a related protocol for secure transmission of the encrypted file, but is not limited thereto.
  • the desensitization data acquisition means 531 in the platform device side acquires desensitization data from the data providing device, wherein the desensitization data is obtained by desensitizing the production data in the data providing device.
  • the platform device side is used as a data providing device and a security environment controlled by a third party trusted by the data application device end, and accepts or acquires the desensitization data of the data providing device end under a certain authority, thereby facilitating the data application device end.
  • the project space created by the third party in the data platform is authorized by the project space, such as the project space of A, to directly authorize the third-party project space to read the desensitization data, thereby reading or accepting A.
  • the company's desensitization data is authorized by the project space, such as the project space of A, to directly authorize the third-party project space to read the desensitization data, thereby reading or accepting A.
  • the platform configuration device 521 in the data application device configures the platform device to process the desensitization data, wherein the desensitization data is obtained by desensitizing the production data in the data providing device. That is, the data application device side performs the direct authorization of the development account or the project space package authorization on the platform device side, so that the data application device can process the desensitization data in the security environment controlled by the platform set end, For example, Company D authorizes the project space controlled by third parties in the data development platform, so that developers of Company D can process the data in the third-party project space.
  • the method for configuring the platform device may be to directly authorize the project space controlled by the platform or authorize the development-related account in the platform, so that the data application device can perform data processing through the account, but is not limited thereto.
  • the platform device configuration device 532 configures the platform device according to the corresponding data application device.
  • the platform device device is configured according to the data application device end, so that the data application device terminal can process the desensitization data in a security environment controlled by the platform device.
  • the manner in which the platform device is configured according to the corresponding data application device includes but is not limited to The development account of the authorization data application device can perform data processing in the project space controlled by the platform device or the data application device directly performs authorization processing on the platform device end.
  • the platform device is configured to enable the data application device to process the desensitized data in the security management environment during the confidential data exchange, thereby improving the security of the confidential data.
  • the desensitization data processing device 533 processes the desensitization data by using the configured platform device, and the data application device end desensitizes the data according to the authority of the device platform in the third-party security environment controlled by the platform device.
  • a and D companies authorized the third-party project space in the data development platform, and then added the developer of the D company to the third-party project space for data processing, so that the data application device can be used.
  • Data provides confidential data on the device side, and at the same time, confidential data cannot be copied in a secure third-party environment, thereby improving the security of confidential data during use and processing.
  • FIG. 13 is a schematic diagram of a platform device end in a device for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another preferred embodiment of the present application.
  • the platform device end includes a platform item creation device 634, a desensitization data acquisition device 631, a configuration device 632, and a desensitization data processing device 633.
  • the platform item creation device 634 in the platform device side creates an item in the platform device;
  • the desensitization data obtaining device 631 acquires desensitization data from the data providing device through the item, wherein the desensitization data Obtained by the desensitization process of the production data in the data providing device;
  • the configuration device 632 configures the item according to the corresponding data application device;
  • the desensitization data processing device 633 processes the desensitization data through the configured item.
  • the platform item creation device 634 in the platform device side creates a project in the platform device, which means creating a secure data flow and processing space in the platform device trusted by the data providing device end and the data application device end, so that the confidential data is made. You can receive protection in a secure project space.
  • Company A and Company D jointly commission a data development platform or a third party trusted by both parties to create a secure project space in the data development platform. So that A and D companies can process and share data in the project space.
  • the desensitization data acquiring means 631 acquires desensitization data from the data providing device by the item, wherein the desensitization data is obtained by desensitizing the production data in the data providing device.
  • the project space created by the platform device side obtains desensitization data in the data providing device side by directly authorizing the project space of the data providing device side.
  • Company A is in the data development platform to the third party. The project space is authorized so that the desensitization data can only be accessed in the third-party project space, thereby limiting the circulation and processing range of the confidential data, thereby improving the security of the data.
  • the configuration device 632 configures the item according to the corresponding data application device, that is, the platform device side sets the project space according to the authorization of the data application device end.
  • the third-party project space obtains the authorization of the project space of the D company.
  • the developers of Company D are added, so that the developers of Company D can process the desensitization data of Company A in the third-party project space.
  • the desensitization data processing device 633 processes the desensitization data through the configured item, that is, the developer or the account of the data application device side is configured, and then the platform device end pairs the data in the controlled project space.
  • the desensitization data provided by the device is provided for processing.
  • the desensitization data of the confidential data provided by the company A is processed in the third-party project space, thereby Limiting the flow of confidential data to the project space further enhances the security of confidential data.
  • FIG. 14 is a schematic diagram of an apparatus for implementing data processing implemented by a data providing device end, a data application device end, and a platform device end according to another preferred embodiment of the present application.
  • the data providing device end includes a data desensitizing device 711, a platform authorization device 713, and a desensitization data transmitting device 712;
  • the data application device end includes a configuration device 721;
  • the platform device end includes a platform item creating device 734,
  • the platform item creation means 734 creates an item in the platform device; the data desensitization means 711 desensitizes the production data in the data providing device to obtain corresponding desensitization data; the platform authorization means 713 pairs the platform The item in the device performs authorization processing; the authorization obtaining device 735 acquires authorization information of the data providing device and the data application device for the item; the desensitization data transmitting device 712 sends the desensitization data to the corresponding platform device For the corresponding data application device to process; the desensitization data obtaining device 731 acquires desensitization data from the data providing device through the item according to the authorization information, wherein the desensitization data passes through the data providing device The production data desensitization process is obtained; the platform configuration device 721 configures the platform device to process the desensitization data, wherein the desensitization data is obtained by desensitizing the production data in the data providing device; 732 configuring the item according to the corresponding data
  • the data desensitizing device 711, the desensitizing data transmitting device 712, and the platform arranging device 721 are the same as or similar to the data desensitizing device 511, the desensitizing data transmitting device 512, and the platform arranging device 521 in FIG.
  • the platform project creation device 734 is the same as or similar to the platform project creation device 634 in FIG. 13 and will not be described again.
  • Authorizing the item in the platform device by the platform authorization device 713 in the data providing device refers to authorizing the project space controlled by the trusted platform device at the data providing device end.
  • the authorization method can directly package and authorize the platform device item through the item in the data providing device, so that the confidential data provided by the data providing device end can be obtained by the platform device item, and the above example is in the data.
  • the project space of Company A in the development platform packages and authorizes the third-party project space, so that the account of the third-party project space can read the desensitization data or the third-party project space has the right to accept desensitization data.
  • the authorization obtaining device 735 in the platform device end obtains the authorization information of the data providing device and the data application device for the item, and refers to the authorization of the data providing device end and the data application device end of the platform device end. Therefore, the flow and processing of confidential data are transferred in a secure environment of mutual trust.
  • the project space of company A and company D packages and authorizes the third-party project space, thereby making company A Desensitization data can be streamed in third-party project spaces and developers of Company D can develop desensitization data for Company A in a third-party space. Data is transferred and processed in a secure and controllable environment through project authorization on the platform device side to improve data security.
  • the desensitization data obtaining means 731 in the platform device end acquires desensitization data from the data providing device through the item according to the authorization information, wherein the desensitization data is passed through the data providing device Production data desensitization is obtained. That is, the project on the platform device side obtains the desensitization data according to the authorization of the data providing device end, wherein the obtaining manner includes, but is not limited to, reading the desensitized data within the authority according to the authorization of the project, In the data development platform, Company A grants the third-party project the right to read and copy the desensitized data of the confidential data, so that the third-party project acquires the desensitization data of Company A.
  • the items in the data providing device, the data application device, and the platform device include a production project and a development project.
  • the production project refers to a project space in the project that processes real data, and is controlled by each business party;
  • the development project is Refers to the project space where the developer handles the desensitization data in the project, and is used by the development account assigned by the business party.
  • the authorization obtaining device 735 of the platform device end is further configured to acquire authorization information of the data providing device and the data application device for the production item. That is, the production project on the data development device side and the data application device side package and authorize the production items in the platform device side of the common trust, so that the real data to be processed within the allowable range of the two can be shared in a safe production project environment.
  • Company A and Company D authorize the production projects in the third-party projects in the data development platform, and obtain the real data required by the two parties to jointly develop the software after obtaining the authorization.
  • the desensitization data obtaining device 731 in the platform device end is further configured to acquire desensitization data from the data providing device by using the development item according to the authorization information, wherein the desensitization data passes the The production data desensitization process in the data providing device is obtained.
  • the desensitization data in the platform device is provided by the data providing device side to the desalination data to the development project that can be used only by the data application device developer, and according to the above example, according to the authorization of the company A for the third party data,
  • the third-party development project obtains the desensitization data of Company A, so that the developer who adds the developer to the third-party development project can process and use the desensitization data of Company A through the development project, thereby ensuring that the desensitization data can be It is used by developers of Company D in a third-party security environment, but because the desensitized data cannot be copied or reserved for use in a third-party controlled environment, the security of confidential data is guaranteed.
  • the platform device end configuration device 732 is further configured to configure the development project according to the corresponding data application device. That is, the data application device can process the desensitization data provided by the data providing device in the platform device by adding the development account in the data application device to the development project or the like through the platform device end.
  • the development project space shared by A and D companies in the data development platform adds the developer account of Company D to the project space of the third party according to the application of Company D, and then processes the desensitization data of Company A.
  • the desensitization data processing device 733 in the platform device end is further configured to process the desensitization data through the configured development item.
  • the desensitization data provided by the data providing device is processed in the development project of the platform device side, and the developer of the D company in the data development platform is connected as an example.
  • the account number is added to the development of the desensitization data of Company A in the third-party development project space, so that the desensitization data cannot be copied or reserved for use in a third-party controlled environment, and the confidential data is guaranteed. Security.
  • the data processing result providing means 736 in the platform device side provides the processing result of the desensitization data in the application development project to the application production item.
  • desensitization data processing results include, but are not limited to, software code developed based on desensitization data, plotted data charts, and the like.
  • the return method of desensitization data processing results includes However, it is not limited to the background system of the data development platform or the establishment of a secure channel such as SFTP between the computer devices for transmission and reception.
  • the developer of Company D develops the software code of the application through the development account in the third-party development project based on the desensitization data, and then sends the code back to the production project through the data development platform, so that Company A is in the third party.
  • Data processing results are reviewed or evaluated in the production project space to further ensure the security of data and data processing results.
  • the data processing result issuing means 737 in the platform set end issues the processing result of the desensitizing data in the development item through the production item.
  • the release processing result is to verify the data processing result or to produce it through real production data.
  • Company A publishes the returned program code based on desensitization data on the data development platform in the production project, and the production account uses the real data in the third-party project space to execute the software program on the released data. Test work.
  • the data processing results are released in the third-party production space so that the processing results are post-processed or verified within the data provider's secure environment, thereby improving the security of the data processing results.
  • the data application device side further includes a platform authorization device 722 (not shown) for performing authorization processing on the items in the platform device. That is, the data application device uses the data to provide the data of the device end, and in the case that the data needs to be processed together with the data, the platform can be authorized to obtain the data to apply the confidential data of the device or the desensitization data thereof.
  • a platform authorization device 722 for performing authorization processing on the items in the platform device. That is, the data application device uses the data to provide the data of the device end, and in the case that the data needs to be processed together with the data, the platform can be authorized to obtain the data to apply the confidential data of the device or the desensitization data thereof.
  • D company needs to combine the confidential data of Company D with the desensitization data of Company A to develop or research the software in the third-party development environment. Therefore, the project space controlled by Company D is the first.
  • the three-party platform project is authorized to provide desensitization data of D company's confidential data, so that
  • the platform device side further includes an application-side desensitization data acquisition device 738 (not shown) for acquiring application-side desensitization data from the data application device through the development project according to the authorization information, where The application desensitization data is obtained by desensitizing the application side production data in the data application device.
  • the desensitization data processing device 733 is further configured to process the desensitization data and the application side desensitization data through the configured development item.
  • the platform device side obtains the desensitization data according to the authorization of the data application device, wherein the development project account including but not limited to the platform device obtains the access permission of the development project of the data application device side or the data application device sends the desensitization data to the device end
  • the development project of D company authorizes the development project of the third party, so that the desensitization data of the confidential data of D company can be separately or cooperated by the developer in the third-party development project.
  • the company's desensitization data is processed together, so that the confidential data of both parties in the third party is shared, and the third-party security management environment makes the data output need to be shared by both parties. Same as allowed, thus protecting the security of the data.

Abstract

L'invention concerne un procédé et un dispositif pour un traitement de données. Le procédé consiste de manière spécifique : au niveau d'une extrémité de dispositif de fourniture de données, à réaliser un traitement de désensibilisation sur des données de production dans un dispositif de fourniture de données pour obtenir des données de désensibilisation correspondantes (S11) ; au niveau d'une extrémité de dispositif de plateforme, à obtenir les données de désensibilisation à partir du dispositif de fourniture de données, les données de désensibilisation étant obtenues en désensibilisant les données de production dans le dispositif de fourniture de données (S31) ; à configurer un dispositif de plateforme selon un dispositif d'application de données correspondant (S32) ; à traiter les données de désensibilisation par l'intermédiaire du dispositif de plateforme configuré (S33). Par comparaison avec l'état de la technique, au moyen de la réalisation d'une assurance de tiers sur la sécurité de données en fonction d'une plateforme d'échange et d'utilisation de données, les problèmes relatifs aux faits que les données doivent être disponibles mais invisibles lorsque différentes parties de service échangent des données confidentielles et les utilisent et que la sécurité de données doit être assurée, sont résolus, de telle sorte que les données sont placées dans un environnement sécurisé de tiers pour une circulation et une utilisation dans le cas où une partie de fourniture de données et une partie d'utilisation ne se font pas entièrement confiance l'une à l'autre, permettant ainsi de garantir la sécurité des données en circulation et en utilisation.
PCT/CN2016/092673 2015-08-10 2016-08-01 Procédé et dispositif pour un traitement de données WO2017024957A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510486640 2015-08-10
CN201510486640.2 2015-08-10

Publications (1)

Publication Number Publication Date
WO2017024957A1 true WO2017024957A1 (fr) 2017-02-16

Family

ID=57982970

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/092673 WO2017024957A1 (fr) 2015-08-10 2016-08-01 Procédé et dispositif pour un traitement de données

Country Status (2)

Country Link
CN (1) CN106446704A (fr)
WO (1) WO2017024957A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489990A (zh) * 2018-05-15 2019-11-22 中国移动通信集团浙江有限公司 一种敏感数据处理方法、装置、电子设备及存储介质
WO2022048464A1 (fr) * 2020-09-01 2022-03-10 华为技术有限公司 Procédé de masquage de données, appareil de masquage de données et dispositif de stockage

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059081A (zh) * 2019-03-13 2019-07-26 深圳壹账通智能科技有限公司 基于数据展示的数据输出方法、装置及计算机设备
CN112073465A (zh) * 2020-08-07 2020-12-11 上海上讯信息技术股份有限公司 一种基于sftp传输的动态脱敏方法与设备
CN112163214A (zh) * 2020-09-22 2021-01-01 杭州数梦工场科技有限公司 数据访问的方法和装置
CN112417505A (zh) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 一种数据处理方法、装置、设备及介质
CN112270415B (zh) * 2020-11-25 2024-03-22 矩阵元技术(深圳)有限公司 一种加密机器学习的训练数据准备方法、装置和设备
CN113127929B (zh) * 2021-04-30 2024-03-01 天翼安全科技有限公司 数据脱敏方法、脱敏规则处理方法、装置、设备及存储介质
CN114979281B (zh) * 2022-07-11 2022-11-08 成都信息工程大学 一种应用于工业互联网云服务平台的数据交互方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080270370A1 (en) * 2007-04-30 2008-10-30 Castellanos Maria G Desensitizing database information
US20080288548A1 (en) * 2007-05-14 2008-11-20 Oracle International Corporation Desensitizing data in cloning
US20090132575A1 (en) * 2007-11-19 2009-05-21 William Kroeschel Masking related sensitive data in groups
CN103778380A (zh) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 数据脱敏和反脱敏方法及相关设备
CN104270465A (zh) * 2014-10-23 2015-01-07 成都双奥阳科技有限公司 一种云存储的保护系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101630431B (zh) * 2008-07-17 2011-04-13 航天信息股份有限公司 多客户端集中式开票数据处理方法
WO2014147748A1 (fr) * 2013-03-19 2014-09-25 株式会社東芝 Dispositif et programme de traitement de code
CN104618330B (zh) * 2014-12-26 2018-12-25 小米科技有限责任公司 业务处理方法、装置及终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080270370A1 (en) * 2007-04-30 2008-10-30 Castellanos Maria G Desensitizing database information
US20080288548A1 (en) * 2007-05-14 2008-11-20 Oracle International Corporation Desensitizing data in cloning
US20090132575A1 (en) * 2007-11-19 2009-05-21 William Kroeschel Masking related sensitive data in groups
CN103778380A (zh) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 数据脱敏和反脱敏方法及相关设备
CN104270465A (zh) * 2014-10-23 2015-01-07 成都双奥阳科技有限公司 一种云存储的保护系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489990A (zh) * 2018-05-15 2019-11-22 中国移动通信集团浙江有限公司 一种敏感数据处理方法、装置、电子设备及存储介质
CN110489990B (zh) * 2018-05-15 2021-08-31 中国移动通信集团浙江有限公司 一种敏感数据处理方法、装置、电子设备及存储介质
WO2022048464A1 (fr) * 2020-09-01 2022-03-10 华为技术有限公司 Procédé de masquage de données, appareil de masquage de données et dispositif de stockage

Also Published As

Publication number Publication date
CN106446704A (zh) 2017-02-22

Similar Documents

Publication Publication Date Title
WO2017024957A1 (fr) Procédé et dispositif pour un traitement de données
US10157286B2 (en) Platform for adopting settings to secure a protected file
Stefan et al. Protecting Users by Confining {JavaScript} with {COWL}
US9172724B1 (en) Licensing and authentication with virtual desktop manager
Parekh et al. An analysis of security challenges in cloud computing
KR102174032B1 (ko) 액세스 관리 방법, 정보 처리 장치, 프로그램, 및 기록 매체
KR101745843B1 (ko) 개인 데이터를 보호하기 위한 방법 및 디바이스
US20210397680A1 (en) Systems and methods for dynamically enforcing digital rights management via embedded browser
US20170185790A1 (en) Dynamic management of protected file access
US11057219B2 (en) Timestamped license data structure
US20190080101A1 (en) Dynamically provisioning virtual machines
US20170005798A1 (en) Binding software application bundles to a physical execution medium
CN114096965A (zh) 容器的黑盒安全性
Grothe et al. How to break microsoft rights management services
TW200905516A (en) Method and system for protecting file data against divulgence
KR101952139B1 (ko) 사용자 단말과 연동된 게이트웨이 서버에서 drm 기능을 제공하는 방법
KR101643677B1 (ko) 연산 리소스 실행의 안전 보호
US20180260536A1 (en) License data structure including license aggregation
US20180260540A1 (en) Source-based authentication for a license of a license data structure
US9733852B2 (en) Encrypted synchronization
EP2947593B1 (fr) Partage de session d'appareil de sécurité
Gremaud et al. Privacy-preserving IoT cloud data processing using SGX
JP2015185071A (ja) 情報追跡システム及び情報追跡方法
US20180260541A1 (en) License data structure including location-based application features
Boopathy et al. Enhanced encryption and decryption gateway model for cloud data security in cloud storage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16834581

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16834581

Country of ref document: EP

Kind code of ref document: A1