Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive information desensitization method and system for data sharing

A sensitive information, data-oriented technology, applied in the intersection of information technology and data security, can solve problems such as mismatch between type and source data type, inability to guarantee the uniqueness of identification and format consistency requirements, data loading errors, etc.

Active Publication Date: 2017-12-15
ENJOYOR COMPANY LIMITED
View PDF9 Cites 87 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Patent No. CN201510755773.5 discloses a format-preserving desensitization method for different types of private data, so that it can be stored in ciphertext, which can avoid the ciphertext length being greater than the defined length of the table field, resulting in data loading, and avoiding the number The type of the encrypted field does not match the source data type, resulting in an error in data loading
[0004] However, in the above-mentioned desensitization system or desensitization method, there are certain limitations.
The main reasons are: (1) most desensitization systems and methods are aimed at the structured data of the database, but how to deal with unstructured data (such as text data) is not involved; (2) lack of consideration of sensitive data desensitization If the desensitization depth of sensitive data is not enough, prevent the use of non-sensitive data to reconstruct sensitive data; (3) the uniqueness of identification and format consistency requirements after data desensitization cannot be guaranteed. For example, hospital data is generally identified by ID number And to locate individuals, if the desensitization algorithm or encryption algorithm is used, the identity card information will lose the uniqueness of the identity and the consistency of the format

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information desensitization method and system for data sharing
  • Sensitive information desensitization method and system for data sharing
  • Sensitive information desensitization method and system for data sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] Example: such as figure 1 As shown, a sensitive information desensitization system oriented to data sharing includes a system management unit for setting and managing system user account information, and constructing role and authority configuration; a data source management unit for storing data source information; capable of automatically identifying each Sensitive information in type data sources, and a sensitive information identification unit that can calculate the correlation of sensitive attributes in a data source set; a sensitive information processing unit that can automatically create desensitization tasks and match desensitization strategies and desensitization algorithms; can safely and effectively A data output unit that controls the use of sensitive data. The system management unit includes building a desensitization system user account and access control, identifying the user's role and authority, and only allowing legal and authorized users to operate c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a sensitive information desensitization method and system for data sharing. According to the method, by adopting statistics, a natural language processing technology and a machine learning technology, the protection of sensitive data in the whole process from data publishing to data application and usage, and automatic identification of sensitive information of such as named entities and addresses is put forward on the basis of the establishment of a sensitive information keyword library, named entities, addresses and the like is put forward; a Sigmoid function is used for calculating the correlation degree of sensitive attributes; a desensitization strategy is carried out in a combined mode of establishing a sensitive attribute generation rule library and adopting a named entity desensitization rule and a core desensitization algorithm; deep desensitization calculation is conducted in combination with numerical sensitive attributes and classified sensitive attributes separately, the desensitization degree of a whole data set is obtained, and the controlled output of data and the like are achieved by downloading a link address hash; thus, the safety of data sensitive information and a sensitive information processing strategy which meets analysis and mining requirements to the maximize degree can be ensured, and the method and system have the advantages of being good in desensitization effect, high in reliability and the like.

Description

technical field [0001] The present invention relates to the intersecting technical field of information technology and data security, in particular to a sensitive information desensitization method and system for data sharing. Background technique [0002] In recent years, the integration of information technology and economic society has triggered the rapid growth of data, and data has become an important development resource. In 2016, the government vigorously promoted the interconnection, openness and sharing of information systems and public data, accelerated the integration of government information platforms, eliminated information islands, recommended data resources to be opened to the society, guided social development, and better served the public. However, in the context of big data, open data sharing also brings challenging issues. Various data leakage incidents occur frequently, such as the information leakage incident of nearly 6,000 newborns in Anhui, the annua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30
CPCG06F16/353G06F21/6254
Inventor 张云云王开红于海龙吴培文陈涛
Owner ENJOYOR COMPANY LIMITED
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products