Data processing method and device for database

A data processing and database technology, applied in the field of data security, can solve problems such as increased investment, errors, and inability to meet data availability requirements, and achieve the effects of reducing labor costs and preventing leakage

Inactive Publication Date: 2017-07-18
中国移动通信集团陕西有限公司
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The first point: the shielding scheme of the database manufacturer is only effective for its own database, and does not support the database of other manufacturers, resulting in an increase in investment;
[0006] The second point: Existing database manufacturers often use the symbol "***" to replace sensitive data or replace desensitization rules with simple data when desensitizing data, but for bank card numbers or ID numbers The data identified by the verification cannot meet the requirements for data availability after desensitization;
[0007] The third point: no automatic or batch processing mechanism is provided, that is, the existing solutions basically require the administrator to manually specify the data source and gradually formulate the conversion strategy. Therefore, when the task reaches tens of thousands or even more than 100,000 data tables When the administrator sets fuzzy rules on the data tables one by one, it is very time-consuming and monotonous, which may cause errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device for database
  • Data processing method and device for database
  • Data processing method and device for database

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0062] According to an aspect of an embodiment of the present invention, a data processing method for a database is provided. The method firstly identifies sensitive data from the target data required by the user; Perform segmentation processing; finally, according to the data characteristics of the sensitive data in each section, perform data desensitization on the sensitive data in each section according to a predetermined desensitization algorithm corresponding to the data characteristics. Therefore, the database processing method of the embodiment of the present invention ensures that after data conversion, the original data characteristics are guaranteed and the sensitivity of the data itself is removed, thereby preventing the leakage of sensitive information.

[0063] like figure 1 As shown, the method includes:

[0064] Step S11, identifying sensitive data from the target data required by the user.

[0065] Users need to extract the required data from the data source ...

no. 2 example

[0090] According to another aspect of the embodiments of the present invention, a data processing device for a database is also provided, such as figure 2 As shown, the device 200 includes:

[0091] An identification module 203, configured to identify sensitive data from the target data required by the user;

[0092] A segmentation module 205, configured to segment the sensitive data identified by the identification module 203 according to data characteristics;

[0093] The desensitization module 207 is configured to, according to the data characteristics of each section of the sensitive data obtained by the segmentation module 205, according to a predetermined desensitization algorithm corresponding to the data characteristics, desensitize the sensitive data of each section Data desensitization.

[0094] Optionally, as in image 3 shown, also includes:

[0095] The extraction module 201 is configured to obtain the data usage application submitted by the user, and extract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method and device for a database. The method comprises the steps that sensitive data is recognized from target data needing to be used by a user; the recognized sensitive data is subjected to segment processing according to data features; and according to the data features of the sensitive data in each segment, data desensitization is performed on the sensitive data in each segment according to a predetermined desensitization algorithm corresponding to the data features. According to the scheme, the data is segmented according to the data features, proper conversion is performed according to different features of the data in different segments, it is ensured that after data conversion, original data features are guaranteed, and sensitivity of the data is removed, and therefore leakage of sensitive information is prevented.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data processing method and device for a database. Background technique [0002] The leakage of sensitive data in the production database has attracted the attention of database manufacturers. All manufacturers have provided desensitization solutions for production database data when used externally. The representative one is Oracle's Data Masking Pack. [0003] As a product package in Oracle Enterprise Manager (Enterprise Manager), DataMasking Pack is embedded with rich data modification rules. Through various algorithms, it can quickly complete the modification of sensitive data in batches, thus ensuring that the cloned database has a complete data volume. Equal to the amount of data in the production database, the sensitive data is disguised again, such as ID number, phone number, credit card number, name, date, home address, salary, etc., which looks like real data is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/219G06F16/27G06F16/284
Inventor 罗海星
Owner 中国移动通信集团陕西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products