Sensitive information management control method and apparatus

A sensitive information, management and control technology, applied in electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as heavy development workload, information leakage, encrypted information cracking, etc., to save development work and improve security. improve the efficiency of safety management and control

Inactive Publication Date: 2016-04-06
CHINA MOBILE GROUP ANHUI
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problem with the existing technical solutions is that every time a customer-sensitive information type is added, a field needs to be added, and all system modules related to this information type or field need to be coded from the interaction layer to the service layer and then to the data layer. Transformation, the development workload is huge; and although the existing encryption method has the key management function, once the key is leaked, the encrypted information can be cracked immediately, resulting in information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information management control method and apparatus
  • Sensitive information management control method and apparatus
  • Sensitive information management control method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to illustrate the embodiments and technical solutions of the present invention more clearly, the technical solutions of the present invention will be described in more detail below in conjunction with the accompanying drawings and embodiments. Apparently, the described embodiments are part of the embodiments of the present invention, not all of them. Example. The embodiments of the basic invention, and all other embodiments obtained by persons of ordinary skill in the art without creative effort, all belong to the scope of protection of the present invention.

[0050] The sensitive information management control device provided by the embodiment of the present invention can be integrated in the business support system of the telecommunications industry, and can also be independent of the business support system, so the sensitive information management control method provided by the embodiment of the present invention can be applied to business support The sensi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a sensitive information management control method and apparatus. The method comprises: identifying sensitive information from received information according to a preset identification strategy; carrying out encryption on the sensitive information according to a preset encryption strategy; using the encrypted sensitive information as a substitute of the original sensitive information, and storing the encrypted sensitive information into a preset storage space; when the sensitive information is required to be output, carrying out decryption on the encrypted sensitive information acquired from the storage space; and outputting the decrypted sensitive information. The present invention also discloses a sensitive information management control apparatus.

Description

technical field [0001] The invention relates to the fields of telecommunication service support and information security, in particular to a method and device for managing and controlling sensitive information. Background technique [0002] In the business support system of the telecommunications industry, a large amount of customer sensitive information is involved. In order to ensure the security of the sensitive information in the transmission process and data storage, the existing technical scheme camouflages and encrypts the sensitive information, and adds fields in the database table. Therefore, it is necessary to modify the background data storage program to store the camouflaged and encrypted customer sensitive information in the database; it is also necessary to modify the service layer programs such as services, interfaces, and middleware to increase Data masquerading and encryption processing; at the same time, it is necessary to transform the foreground program o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30
Inventor 郑万美刘喜周崎
Owner CHINA MOBILE GROUP ANHUI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products