Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for local desensitization of data

A data localization and desensitization technology, which is applied in the field of data desensitization, can solve problems such as difficulty in analysis and statistics, loss of format and meaning, and inability to know, and achieve the effect of easy analysis and improved protection strength

Inactive Publication Date: 2016-12-07
成都知道创宇信息技术有限公司
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the mobile business analysis system stores a large amount of data, including a large amount of customer sensitive data. In order to effectively protect the sensitive data of customers, it is necessary to desensitize the data; however, it is often necessary to do some statistics and analysis on user data. How to It is currently a technical problem to meet the needs of analysis and protect data. At present, encryption algorithms are generally used for data protection, and Hash is usually calculated for private data, and then the obtained Hash value is used to replace the original private data for desensitization. For example, the private data is Email address user3@example.com, calculate MD5 for the above email address, get 97d6d9441ff85fdc730e02a6068d267b, replace the email address with the above value; this method makes the format and meaning of the data completely lost after desensitization, and becomes a string of hexadecimal numbers characters; it is impossible to know that the data is an Email address, which makes it difficult to do analysis and statistics; and the protection strength is not enough. For example, given the MD5 value of a mobile phone number, all mobile phone numbers can be exhausted quickly on the current CPU, so as to find Provide the corresponding mobile phone number; even many websites provide the function of querying the data corresponding to the MD5 value, so the protection strength is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for local desensitization of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0025] Such as figure 1 As shown, a local data desensitization method includes the following steps:

[0026] According to the format and meaning of sensitive data, determine the partial data that needs to be desensitized;

[0027] Determine a desensitization key;

[0028] Calculate HMAC for the desensitized key and the partial data that needs to be desensitized;

[0029] Replace the local data that needs to be desensitized with the calculation result to obtain the desensitized data.

[0030] All or part of the calculation results can be used to replace the local data that needs to be desensitized; usually the HMAC calculation result data is relatively long, and part of the calculation results can be used to replace the local data that needs to be desensitized.

[0031] Further, the data mainly includes ID number, mobile phone number, Email ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for local desensitization of data. The method comprises the steps of determining local data needing desensitization according to sensitive data format and significance; determining a desensitization key; performing a Hash message authentication code (HMAC) according to the desensitization key and the local data needing desensitization, and obtaining desensitized data. According to the method, the data format and part of significance are reserved while data protection strength is improved, and data is subject to analysis, statistics and processing easily.

Description

technical field [0001] The invention relates to a data desensitization method, in particular to a partial data desensitization method. Background technique [0002] At present, the mobile business analysis system stores a large amount of data, including a large amount of customer sensitive data. In order to effectively protect the sensitive data of customers, it is necessary to desensitize the data; however, it is often necessary to do some statistics and analysis on user data. How to It is currently a technical problem to meet the needs of analysis and protect data. At present, encryption algorithms are generally used for data protection, and Hash is usually calculated for private data, and then the obtained Hash value is used to replace the original private data for desensitization. For example, the private data is Email address user3@example.com, calculate MD5 for the above email address, get 97d6d9441ff85fdc730e02a6068d267b, replace the email address with the above value...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 刘光旭
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products