Dynamically adjusting data protection method and system based on role sensitive field

A data protection and dynamic adjustment technology, applied in the field of information security, can solve problems such as increased development burden, unsatisfactory statistics, and unusable data

Inactive Publication Date: 2016-12-14
北京同余科技有限公司
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The above invention fixes the tables, records, fields and encryption methods that need to be desensitized when initializing the database, which cannot meet the needs of users with different roles to protect different tables and sensitive fields, nor can it meet the needs of users with different roles to protect the same sensitive fields. Sensitive fields use different masking functions and parameters for different protection requirements
At the same time, the encryption method requires special storage of the key; and the encrypted data cannot be used normally without decryption, which cannot meet the needs of statistics without leaking sensitive information of users
If the operation of data encryption and decryption is added to the client program, it will increase the development burden and cannot avoid the possibility of the key being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamically adjusting data protection method and system based on role sensitive field
  • Dynamically adjusting data protection method and system based on role sensitive field
  • Dynamically adjusting data protection method and system based on role sensitive field

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described in detail below in conjunction with the accompanying drawings. figure 1 It is a structural diagram of the system, mainly including a data processing unit, a sensitive information setting unit, and a sensitive information storage unit, wherein a lookup table is stored in the sensitive information storage unit. figure 2 It is the work flow diagram when the data processing unit receives a SQL statement, including the first step, the second step, the third step and the seventh step in the data operation stage in the following description; image 3 It is the workflow flowchart when it is determined that the SQL statement is a SELECT or DELETE statement, including the fourth step in the data operation phase in the following description; Figure 4 It is the workflow diagram when it is determined that the SQL statement is an INSERT statement, including the fifth step in the data operation stage in the following description; Fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the information safety field, and provides a dynamically adjusting data protection method and system based on role sensitive fields; the system comprises the following elements: a sensitive information setting unit used for setting sensitive fields, desensitization functions and parameters for different role data by a manager; a sensitive information storage unit used for storing a search list; a data processing unit used for storing desensitization functions, obtaining a user role and verifying the completeness of the search list, and modifying a SQL sentence according to rules stored in the sensitive information storage unit. The invention also discloses a method: using the data processing unit to parse the SQL sentence; and modifying the SQL sentence according to the requirements of the search list. The method and system set different sensitive field and desensitization functions for different role data, and can set different desensitization functions and parameters for the same sensitive field, thus satisfying different sensitive information protection degree demands by different roles; in addition, the desensitization data is stored in the database, thus reducing data leak damages.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a database sensitive information protection technology, in particular to a data protection method and system for dynamic adjustment of role-based sensitive fields. Background technique [0002] Today's database security is very important to many enterprise networks, even related to the survival and development of an enterprise. For example: in the process of medical and health informatization, a large number of names and ID information of residents who are sick and visiting residents are involved; in the banking system, a large amount of customer information and transaction logs are involved. These information are the sensitive information or privacy of users. Once these data are leaked, it will cause user privacy leakage accidents, which will have a bad impact on users, the units involved and the society. [0003] In order to prevent leakage of information from a database, var...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30
CPCG06F21/6227G06F16/2433
Inventor 付海涛赵小录芦效峰
Owner 北京同余科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products