Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data sensitivity identification method and apparatus

An identification method and identification device technology, applied in the field of data processing, can solve problems such as inaccurate data desensitization strategies, lack of unified judgment rules, and leakage of sensitive data, and achieve the effects of improved security, accurate classification, and accurate sensitivity classification

Active Publication Date: 2018-04-20
AGRICULTURAL BANK OF CHINA +1
View PDF9 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when the industry conducts data desensitization processing, it often conducts sensitivity identification based on experience. Sensitive data classification is relatively arbitrary and lacks unified judgment rules. Sensitivity classification generally only considers the possible losses caused by a single sensitive data leakage. Data desensitization strategies are often inaccurate, and there is still a risk of sensitive data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sensitivity identification method and apparatus
  • Data sensitivity identification method and apparatus
  • Data sensitivity identification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see figure 1 A data sensitivity identification method provided in Embodiment 1 of the present invention is characterized in that the method includes the following steps:

[0051] S11. Obtain sensitive data in the data source, and classify the sensitive data to obtain the sensitive data category;

[0052] It should be noted that since the sensitive category is the core of the sensitivity classification, it contains data columns with the same leakage hazard characteristics. In the existing process of classifying sensitive categories, people's subjective experience is often used for classification, but the present invention mainly relies on data structure information or data instance information for classification. That is, the process is:

[0053] Obtain sensitive data from data sources;

[0054] When the sensitive data includes data structure information, according to the data structure information and the data structure information in the preset sensitive category, c...

Embodiment 2

[0070] Referring to embodiment one of the present invention and figure 1 The specific process of steps S11 to S13 described in , firstly classify the acquired sensitive data, mainly according to the data structure information and data instance information. Classification results in sensitive subcategories.

[0071] For example, see Table 1-1 for the main sensitive categories and sensitive subcategories of a commercial bank.

[0072] Table 1-1 Main sensitive categories and sensitive subcategories

[0073]

[0074] Based on Table 1-1, according to the specific requirements of internal data formats of different commercial banks, record the data result characteristics of each sensitive category and sensitive subcategory in the format of Table 1-2, such as data column names, data column types and other data structures information; and the data instance feature is the data instance information contained in the data column.

[0075] Table 1-2 Sensitive category classification f...

Embodiment 3

[0112] Corresponding to the data sensitivity identification method disclosed in Embodiment 1 and Embodiment 2 of the present invention, Embodiment 3 of the present invention also provides a data sensitivity identification device, see Figure 4 , the device consists of:

[0113] A classification module 1, configured to obtain sensitive data in a data source, and classify the sensitive data to obtain a sensitive data category;

[0114] A grading module 2, configured to perform grading processing on the sensitive data category to obtain a sensitive data level group according to preset leakage loss characteristics;

[0115] The calculation module 3 is configured to perform risk calculation on the sensitive data level group to obtain the overall risk value of the sensitive data.

[0116] Correspondingly, the method also includes:

[0117] The associated recording module 4 is configured to determine a set of related sensitive data categories according to the sensitive data categor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sensitivity identification method and apparatus. The method comprises the steps of obtaining sensitive data in a data source and classifying the sensitive data to obtainsensitive data types; according to a preset leakage loss characteristic, performing grading processing on the sensitive data types to obtain a sensitive data level group; and performing risk calculation on the sensitive data level group to obtain an overall risk value of the sensitive data. By performing more accurate classification and grading processing on the sensitive data and analyzing an association risk relationship, a proper desensitization policy can be established for the sensitive data under guidance, so that the security of the sensitive data is improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data sensitivity identification method and device. Background technique [0002] The application system data volume of commercial banks is huge, and there are a lot of sensitive data in it. However, commercial banks are usually based on production data when deploying development environments, test environments, and drill environments. Therefore, large-scale data desensitization is required to ensure data security. Among them, the core of data desensitization is the identification of sensitive data, identifying data that may be sensitive, so as to guide the formulation of appropriate desensitization strategies and carry out desensitization processing. [0003] At present, when the industry conducts data desensitization processing, it often conducts sensitivity identification based on experience. Sensitive data classification is relatively arbitrary and lacks unified jud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F17/30G06Q10/06G06Q40/02
CPCG06F21/604G06F21/6245G06Q10/0635G06Q40/02G06F16/2462G06F16/285
Inventor 周期律焦伟侯军蔡仕志杨启龙牛晔
Owner AGRICULTURAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products