Metadata sensitive information field identification method, device, equipment and storage medium
A sensitive information and identification method technology, applied in the field of information security, can solve problems such as low work efficiency, singleness, and inability to distinguish sensitive information from evaluation forms, and achieve the effect of improving work efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] The first embodiment of the present invention provides a metadata sensitive information field identification method, such as figure 1 As shown, the identification methods of metadata sensitive information fields include:
[0027] Step S10, obtain the system view of the metadata database, and search for a list of all users in the system view.
[0028] In step S10, the metadata in the large database includes a system list and a user list, and the metadata system view is obtained in the large database. The system view is a transformation of the data in the large database and is another way to view the data in the table. The view can be regarded as a moving window. The view is obtained from one or more actual tables. The data in the table is stored in a large database. The table that generates the view is called the system table of the view, and the SELECT statement can be used Get all the table names in the system view of the large database, exclude the system table, get ...
Embodiment 2
[0054] The second embodiment of the present invention provides a metadata sensitive information field identification device, such as image 3 As shown, the metadata sensitive information field identification device 3 includes:
[0055] The user list search module 31 is used to obtain the system view of the metabase, and searches for all user lists in the system view;
[0056] A matching module 32, configured to obtain preset line data of each user list, and match the preset line data with preset sensitive information fields;
[0057] A summary module 33, configured to output the user table name, sensitive information fields and data corresponding to the preset row data to the sensitive information summary table when the preset row data matches the preset sensitive information field successfully;
[0058] The evaluation module 34 is configured to receive the table to be evaluated and display the sensitive information fields and data of the table to be evaluated when it is dete...
Embodiment 3
[0071] The third embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, a method for identifying metadata-sensitive information fields in the above-mentioned embodiment 1 is implemented , to avoid repetition, it will not be repeated here. Alternatively, when the computer program is executed by the processor, the functions of the modules / units in the metadata-sensitive information field identification device in the above-mentioned embodiment 2 are realized, and details are not repeated here to avoid repetition.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



