Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data desensitization method and related equipment

A data desensitization and desensitization technology, which is applied in the database field, can solve problems such as equipment misrecognition, inability to perform secondary identification, and low simulation performance, so as to achieve reliable protection, improve data processing efficiency and simulation degree, and optimize The effect of processing

Inactive Publication Date: 2016-12-07
BEIJING WISEWEB TECH
View PDF7 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is only suitable for processing a small amount of data in the mobile terminal, and because it uses a data transformation method to replace the original data, the transformed data does not conform to the original data generation rules, its simulation is not high, and it is easy to be misrecognized by the device Wrong, unable to perform secondary identification
For example, for the ID card number, the data desensitized by this method completely loses the characteristics of the ID card number. At this time, if the desensitized data needs to be processed again, the device cannot recognize that this is the ID card number.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The data desensitization method described in the present invention comprises the following steps:

[0021] A) Locate sensitive fields; read the information in the original data, identify and locate sensitive fields in it; the identification method can use regular expressions or java rule algorithms, or use a combination of the two, for example, for date of birth, ID card Numerical sensitive fields such as numbers adopt the regular expression recognition method, and text sensitive fields such as names and addresses adopt java rule algorithm. For complex sensitive fields such as user names and network names, which contain both data and text, and even special characters, two recognition methods, regular expressions and java rule algorithms, can be used for comprehensive judgment to improve the recognition accuracy.

[0022] B) Establish a rule base for generating sensitive fields; formulate rules for generating sensitive fields, and store the rules in the rule base for gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a database technology, in particular to a data desensitization method and related equipment. The method comprises the steps of sensitive field positioning, sensitive field generation rule base establishing, desensitized data generating and the like. Accordingly, massive high-simulation data desensitization processing can be achieved, the purposes of optimizing the processing process and improving the data processing efficiency and simulation degree are achieved, and reliable protection on sensitive and private data is achieved while big data processing and utilizing are achieved.

Description

technical field [0001] The invention relates to a database technology, in particular to a data desensitization method and related equipment. Background technique [0002] Data desensitization refers to the transformation of certain sensitive information through desensitization rules to achieve reliable protection of sensitive private data. This way, the masked data can be safely used in development, testing, and other non-production environments, as well as outsourced environments. [ In the case of customer security data or some commercially sensitive data, the real data is transformed and provided for testing without violating system rules, such as ID number, mobile phone number, card number, customer number and other personal information. Data desensitization. Chinese patent 2013107503350 discloses a "Data Desensitization and Anti-Desensitization Method and Related Devices", the steps of which include detecting the data write operation to the mobile terminal, performing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 莫倩郑兵王升蔡锦森
Owner BEIJING WISEWEB TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products