Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database masking system and method based on big data

A database and big data technology, applied in the field of database desensitization systems based on big data, can solve problems such as data desensitization, inability to meet the needs of multi-level agencies or departments desensitization management and monitoring, and privacy risk leakage.

Active Publication Date: 2017-04-26
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF5 Cites 70 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] First, the big data platform collects a large amount of sensitive privacy data and provides services for various business departments. Usually, the big data platform will ensure data security through user authentication, authority control and data encryption technologies, but any authorized access user Personnel who own data may lead to the leakage of data risks, and those without authority may also infer information through research on data mining analysis, resulting in the leakage of privacy risks
Most of the existing data desensitization products provide static data desensitization function, but how to realize real-time dynamic desensitization in the production environment while ensuring the performance of the system is an urgent problem to be solved;
[0012] Second, most current database desensitization systems use a rule-based approach to discover sensitive data, but this approach not only reduces the efficiency of sensitive data discovery, but also fails to identify sensitive data with semantics;
[0015] Fifth, existing data desensitization products can provide desensitization services for independent organizations, and cannot meet the needs of multi-level organizations or departments for desensitization management and monitoring;
[0016] Sixth, data desensitization must not only ensure that the sensitivity of the data is removed, but also meet the needs of users as much as possible. Most of the existing data desensitization is to desensitize the data, ignoring the verification of the correctness of the desensitization results, validity and authenticity;
[0017] Seventh, sensitive privacy data is very important. When it leaks, it cannot be effectively audited and supervised. Therefore, security audit and supervision of data desensitization are urgently needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database masking system and method based on big data
  • Database masking system and method based on big data
  • Database masking system and method based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0132] In order to better understand the present invention, the present invention will be described in detail below in conjunction with the accompanying drawings.

[0133] A database desensitization system based on big data of the present invention mainly includes a system management module, a data source management module, a sensitive data discovery module, a desensitization task management module, a desensitization configuration management module, a desensitization verification module, and a multi-level management module , Security audit module. Such as figure 1 As shown, a big data-based database desensitization system of the present invention includes a system management module that constructs roles for the database desensitization system and performs functional authorization and management on the roles, and a data source that provides data source management for the database desensitization system A management module, a sensitive data discovery module that automatically d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database masking system based on big data. The system comprises a system management module for constructing a role for the database masking system, and performing function authorization and management on the role, a data source management module for providing data source management for the database masking system, a sensitive data discovery module for automatically discovering sensitive data in the database and submitting the sensitive data to a user to adjust and confirm, a masking task management module for configuring and managing the masking task of the database masking system; a masking configuration management module for managing and defining the sensitive data and performing masking algorithm and masking strategy management, a masking verification module for verifying the masking by comparing data before the masking with data after the masking, a multi-stage management module for realizing the status monitoring and strategy issuing and data synchronization of multi-stage masking equipment, and a security auditing module for analyzing the acquired masking log data in real time to guarantee the security of the database masking system. The invention further discloses a database masking method based on the big data.

Description

technical field [0001] The invention relates to the cross-technical field of computer technology and information security, in particular to a database desensitization system and method based on big data. Background technique [0002] With the rapid development of Internet technology, the government and enterprises have accumulated a large amount of sensitive information and data, and these data will be used in many work scenarios, for example, business analysis (accurate positioning of users, mining of business value of big data) , sharing and exchange, development and testing, and even some outsourcing services, all use real business data and information. Once these sensitive data are leaked, it will not only bring huge losses to the government and enterprises themselves, but also incalculable damage to individual and enterprise users. [0003] Today, sensitive personal, financial and health information is subject to a variety of different industry and government data priv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6245G06F2221/2141
Inventor 陈天莹李全兵李霄
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products