A sensitive data identification method and device

A sensitive data and identification method technology, which is applied in the field of information security, can solve the problems of time-consuming and labor-intensive detection of sensitive data, and achieve the effect of efficiently and automatically identifying sensitive data and reducing the probability of missing sensitive data

Active Publication Date: 2019-10-18
CHINA MOBILE GRP HENAN CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing technology identifies sensitive data manually, and the database administrator searches and determines the sensitive data based on personal experience. This method is time-consuming and laborious, and the probability of missing sensitive data is high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A sensitive data identification method and device
  • A sensitive data identification method and device
  • A sensitive data identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention provide a sensitive data identification method and device. In the embodiment of the present invention, N rows of data to be identified are obtained from the data table, N≥1; according to the keyword dictionary, it is judged whether the data to be identified includes the keywords in the keyword dictionary; The column in which the keyword is included determines all data in the corresponding column in the data table as sensitive data. Since keywords are included in the keyword dictionary, when the keywords in the keyword dictionary are included in the data to be identified, it is determined that sensitive data is included in the data to be identified, and further because the N rows of data to be identified are only a part of the data table, Therefore, all the data in the columns corresponding to the keywords determined in the data table are determined as sensitive data, thereby achieving the purpose of efficiently and automatically iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the field of information safety software and in particular relates to a sensitive data identifying method and apparatus to identify sensitive data with high efficiency. In the embodiment, N lines of to-be-identified data in a data list can be acquired; N>=1; according to a key word dictionary, whether a key word of the key word dictionary is included in the to-be-identified data; and if so, all data corresponding to a data list can be determined as sensitive data. The key word is included in the key word dictionary, so when the key word of the key word dictionary is included in the to-be-identified data, the to-be-identified data is determined to contain the sensitive data; further, the N lines of to-be-identified data is one part of the data list, so all data of relative lines of the determined key word and in the data list can be determined to be the sensitive data; sensitive data can be automatically identified with high efficiency; and sensitive data check leakage possibility can be reduced.

Description

technical field [0001] The embodiments of the present invention relate to the field of information security, and in particular, to a sensitive data identification method and device. Background technique [0002] Sensitive data generally refers to the private information of users. Telecom operators have a large number of private information of users. Criminals often steal sensitive data of users from the database of telecom operators, resulting in frequent leakage of sensitive data. The leakage of sensitive data not only has a serious impact on the operator's own core secrets, industry competitiveness and market reputation, but also causes varying degrees of harm to users' privacy and personal information security. [0003] There are many channels for the transfer of sensitive data, which runs through the entire data life cycle and covers multiple links such as data generation, analysis, statistics, transfer, and invalidation. For example, sensitive data leaks are most likel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/903
Inventor 郭远胜
Owner CHINA MOBILE GRP HENAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products