Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensitive-information desensitization method and system of transaction message

A technology for transaction messages and sensitive information, applied in the field of data processing, can solve the problems of low dispersion, low dispersion of transaction messages, and inability to cover data in transaction messages, and achieves the effect of improving dispersion.

Active Publication Date: 2018-04-20
AGRICULTURAL BANK OF CHINA
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, there are mainly two methods for desensitizing transaction messages containing sensitive information: 1. For a small amount of transaction messages, the sensitive information is replaced with meaningless constants; 2. For the transaction messages in the database table, According to the known database table name and the sensitive information field that needs to be replaced, the fixed field position is replaced with the preset field; among them, the processing method of the first method destroys the data distribution characteristics and logic characteristics of the original transaction message, In addition, the desensitized transaction message contains the same meaningless constant, which leads to the fact that the desensitized transaction message cannot match the basic data of the test environment, and the dispersion is low, making it difficult to meet the requirements of the desensitized transaction report. Requirements for automatic message playback in the comprehensive scenario of the document; the processing method of the second method will also make the desensitized transaction message contain the same preset fields, resulting in low dispersion of the desensitized transaction message. Difficult to meet the requirements of automated message playback in comprehensive scenarios for desensitized transaction messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive-information desensitization method and system of transaction message
  • Sensitive-information desensitization method and system of transaction message
  • Sensitive-information desensitization method and system of transaction message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] The embodiment of this application provides a method for desensitizing sensitive information of transaction messages, such as figure 1 shown, including:

[0051] S101: Obtain a transaction message;

[0052] S102: When the transaction message contains sensitive information, query the transaction message desensitization rule table according to the transaction message, and determine whether the transaction message desensitization rule table is set with th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a sensitive-information desensitization method and system of a transaction message. When the sensitive-information desensitization method of the transaction message desensitizes the transaction message containing sensitive information, a desensitization rule about the transaction message is determined according to a preset transaction message desensitization rule table storing a correspondence relationship of the sensitive information and the desensitization rule, then the transaction message is desensitized according to the determined desensitization rule to achieve the purpose of replacing the sensitive information in the transaction message on the premise of not changing data distribution characteristics and logic characteristics of the desensitized transactionmessage, and generated replacement fields are different according to different sensitive information and desensitization rules corresponding thereto. A dispersion degree of the desensitized transaction message is increased, and an effect of enabling the desensitized transaction message to satisfy a requirement of automated message playback of a comprehensive scene is facilitated.

Description

technical field [0001] The present application relates to the technical field of data processing, and more specifically, to a method and system for desensitizing sensitive information of transaction messages. Background technique [0002] With the continuous development of electronic information technology, all kinds of transactions and transaction information are stored in the form of transaction messages, especially large trading companies, e-commerce platforms and banking systems store a large number of transaction messages. These transaction messages usually record sensitive information about customers or companies, such as account, phone information, and transaction account information. Once a transaction message containing such sensitive information is leaked, it will have a bad impact on the company and the individual customer. [0003] When an enterprise builds an internal integrated application system test environment, it usually needs to perform integrated scenario...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6263H04L63/0428H04L63/302
Inventor 王炜徐赫张少博牛晗晖栗新军阳酉良刘佳亮张瑞杰
Owner AGRICULTURAL BANK OF CHINA