Masking type data desensitization method and related equipment

A data desensitization and masking technology, which is applied in the database field, can solve problems such as equipment misrecognition, inability to perform secondary identification, and low simulation performance, so as to achieve reliable protection, improve data processing efficiency and simulation degree, and optimize The effect of processing

Inactive Publication Date: 2017-01-04
BEIJING WISEWEB TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is only suitable for processing a small amount of data in the mobile terminal, and because it uses a data transformation method to replace the original data, the transformed data does not conform to the original data generation rules, its simulation is not high, and it is easy to be misrecognized by the device Wrong, unable to perform secondary identification
For example, for the ID card number, the data desensitized by this method completely loses the characteristics of the ID card number. At this time, if the desensitized data needs to be processed again, the device cannot recognize that this is the ID card number.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Mask type data desensitization method described in the present invention comprises the following steps:

[0022] A) Establish a rule base for generating sensitive fields; formulate rules for generating sensitive fields, and store the rules in the rule base for generating sensitive fields; the rules for generating sensitive fields can be completely equivalent to the rules for generating sensitive fields in original data, such as ID number Generation rules, date generation rules, company name generation rules, etc., so that complete high-simulation can be achieved, so that people cannot directly identify the authenticity of the new field itself, but can be identified by various external devices such as ID card recognizers ; In addition, distinguishing features can also be added on the basis of the generation rules of sensitive fields in the original data. For example, on the basis of the generation rules of the ID number, it is stipulated that: a certain digit in the gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to database technique, in particular to a masking type data desensitization method and related equipment. The masking type data desensitization method comprises the following steps of establishing a sensitive field generation rule base, positioning a sensitive field, generating a desensitization data masking, calling desensitization data and the like. The masking type data desensitization method has the advantages that the large-batch and highly-simulated data desensitization can be realized, the processing process is optimized, the data processing efficiency and simulation degree are improved, and the reliable protection of sensitive privacy data is realized in the process of big data processing and utilization.

Description

technical field [0001] The invention relates to a database technology, in particular to a mask-type data desensitization method and related equipment. Background technique [0002] Data desensitization refers to the transformation of certain sensitive information through desensitization rules to achieve reliable protection of sensitive private data. This way, the masked data can be safely used in development, testing, and other non-production environments, as well as outsourced environments. [ In the case of customer security data or some commercially sensitive data, the real data is transformed and provided for testing without violating system rules, such as ID number, mobile phone number, card number, customer number and other personal information. Data desensitization. Chinese patent 2013107503350 discloses a "Data Desensitization and Anti-Desensitization Method and Related Devices", the steps of which include detecting the data write operation to the mobile terminal, p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 莫倩郑兵王果张传文
Owner BEIJING WISEWEB TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products