Sensitive data storage method, device and system

A sensitive data and data technology, applied in the field of data security, can solve the problems of reducing the storage security of sensitive data, leakage of sensitive data, etc., and achieve the effect of improving storage security

Inactive Publication Date: 2018-07-17
诚壹泰合(北京)科技有限公司
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the sensitive data desensitization processing method is to read the original sensitive data from the database for desensitization processing. If the attacker attacks the database...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data storage method, device and system
  • Sensitive data storage method, device and system
  • Sensitive data storage method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a sensitive data storage method, device and system capable of improving the storage security of sensitive data. The method includes: extracting a service keyword from the sensitive data according to a preset service matching rule; desensitizing the extracted service keyword to obtain a desensitized keyword; replacing the service keyword in the corresponding sensitive databy the desensitized keyword to obtain desensitized data; storing the desensitized data in a first device, wherein the stored desensitized data has a mapping relationship with a service identifier corresponding to the service matching rule, and storing the service keyword in a second device and constructing a mapping relationship between the stored desensitized data and the service keyword.

Description

technical field [0001] The present application relates to the technical field of data security, in particular, to a sensitive data storage method, device and system. Background technique [0002] With the development of information technology and Internet technology, massive amounts of data are generated every day and stored in corresponding databases, which contain a large amount of user privacy data, that is, sensitive data, such as user name, ID number, mobile phone number , various card numbers, customer numbers, etc. If these sensitive data are leaked, it will pose a great threat to the user's information security. [0003] In order to improve the security of sensitive data, at present, after receiving a data access request, the database performs data desensitization processing on the stored data, and returns the desensitized data to the user. Among them, data desensitization refers to using desensitization rules to deform sensitive data. The desensitization rules incl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/30
CPCG06F16/48H04L63/0245H04L63/0428H04L63/10
Inventor 周圣韬马良李海岩
Owner 诚壹泰合(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products