A method and system for desensitizing data

A data desensitization and desensitization technology, which is applied in the data desensitization system and data desensitization field, can solve the problems of high storage and computing consumption and lack of flexibility in scheduling, so as to ensure security, save storage and computing consumption, The effect of improving data desensitization efficiency

Active Publication Date: 2019-08-09
ALIBABA (CHINA) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] It can be seen that according to the different desensitization requirements of different users, the existing technology needs to configure different desensitization scheduling tasks and generate different target tables, which consumes a lot of storage and computing, and the scheduling lacks flexibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for desensitizing data
  • A method and system for desensitizing data
  • A method and system for desensitizing data

Examples

Experimental program
Comparison scheme
Effect test

example

[0107] Example: long_hash(id)

[0108] crc32

[0109] Function description: use the CRC32 algorithm to encrypt the input, and the result is a long integer

[0110] Parameter: field name

[0111] Example: long_hash(id)

[0112] crc64

[0113] Function description: CRC64 algorithm encrypts the input, and the result is a long integer

[0114] Parameter: field name

[0115] Example: long_hash(id)

[0116] md5

[0117] Function description: The md5 algorithm encrypts the input, and the parameter string is a salt value (that is, the encryption interference value), which can improve the security of the encryption

[0118] Parameters: field name, salt

[0119] Example: md5(id,'md5_salt')

[0120] encrypt

[0121] Function description: encryption function, the parameter is the specified key (can be decrypted, please use it with caution)

[0122] Parameters: field name, encryption key

[0123] Example: encrypt(id,'encrypt_key')

[0124] d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data desensitization method and system. The method comprises: reading a structured query language (101); when it is judged that the structured query language satisfies a preset desensitization rule, rewriting the structured query language according to the desensitization rule (102); and executing the rewritten structured query language, and outputting a query result (103). The present method can realize dynamic data desensitization, flexibly output a query result after desensitization, and guarantee the security of data.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a data desensitization method and a data desensitization system. Background technique [0002] With the advent of the big data era, the mining of big data business value, the precise positioning of users, and the huge business value contained in big data are gradually being tapped, but at the same time it also brings a huge challenge - the protection of personal privacy information. Personal information and personal behavior (such as location information, consumption behavior, network access behavior), etc., these are people's privacy, that is, sensitive information. How to protect the user's privacy information on the basis of big data value mining will also be the key to data detachment. A puzzle that Min must solve. [0003] Data desensitization refers to the transformation of certain sensitive information through desensitization rules, changing its value wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F16/2455
CPCG06F21/60
Inventor 曾文秋
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products