Method and system of data masking

A data desensitization and desensitization technology, which is applied in the data desensitization system and data desensitization field, can solve the problems of high storage and computing consumption and lack of flexibility in scheduling, so as to ensure security, save storage and computing consumption, The effect of improving data desensitization efficiency

Active Publication Date: 2017-05-31
ALIBABA (CHINA) CO LTD
View PDF8 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] It can be seen that according to the different desensitization requirements of different users, the existing technology needs to configure different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of data masking
  • Method and system of data masking
  • Method and system of data masking

Examples

Experimental program
Comparison scheme
Effect test

example

[0107] Example: long_hash(id)

[0108] crc32

[0109] Function description: use the CRC32 algorithm to encrypt the input, and the result is a long integer

[0110] Parameter: field name

[0111] Example: long_hash(id)

[0112] crc64

[0113] Function description: CRC64 algorithm encrypts the input, and the result is a long integer

[0114] Parameter: field name

[0115] Example: long_hash(id)

[0116] md5

[0117] Function description: The md5 algorithm encrypts the input, and the parameter string is a salt value (that is, the encryption interference value), which can improve the security of the encryption

[0118] Parameters: field name, salt

[0119] Example: md5(id,'md5_salt')

[0120] encrypt

[0121] Function description: encryption function, the parameter is the specified key (can be decrypted, please use it with caution)

[0122] Parameters: field name, encryption key

[0123] Example: encrypt(id,'encrypt_key')

[0124] d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and system of data masking. The method of data masking comprises the steps of reading a structuralized query language; when it is judged that the structuralized query language is in accordance with a preset masking rule, rewriting the structuralized query language according to the masking rule; executing the rewritten structuralized query language, and outputting a query result. According to the method and system of data masking, dynamic data masking can be achieved, a masked query result can be flexibly output, and the safety of the data can be guaranteed.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a data desensitization method and a data desensitization system. Background technique [0002] With the advent of the big data era, the mining of big data business value, the precise positioning of users, and the huge business value contained in big data are gradually being tapped, but at the same time it also brings a huge challenge - the protection of personal privacy information. Personal information and personal behavior (such as location information, consumption behavior, network access behavior), etc., these are people's privacy, that is, sensitive information. How to protect the user's privacy information on the basis of big data value mining will also be the key to data detachment. A puzzle that Min must solve. [0003] Data desensitization refers to the transformation of certain sensitive information through desensitization rules, changing its value wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F17/30
CPCG06F21/60G06F21/604G06F16/24565
Inventor 曾文秋
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products