Check patentability & draft patents in minutes with Patsnap Eureka AI!

Metadata sensitive information field identification method, device, equipment and storage medium

A sensitive information and identification method technology, applied in the field of information security, can solve problems such as low work efficiency, singleness, and inability to distinguish sensitive information from evaluation forms, and achieve the effect of improving work efficiency

Active Publication Date: 2021-10-12
CHINA PING AN LIFE INSURANCE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the security of sensitive information has always been paid attention to by people. The identification of sensitive information usually relies on manual identification. For example, when reviewing many evaluation forms in the database that need to be sent out, it is necessary to manually judge whether the evaluation forms contain sensitive information one by one. , the work efficiency is low, and currently there are procedures for identification. However, in the prior art, a relatively simple text similarity algorithm strategy is usually used, for example, the full-text md5 identification algorithm is used for identification, that is, on-site full-text identification for each form to be evaluated. The recognition speed is slow, therefore, the procedures adopted in the prior art cannot achieve fast recognition, the identification efficiency is low, and the sensitive information in the evaluation form cannot be quickly distinguished

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Metadata sensitive information field identification method, device, equipment and storage medium
  • Metadata sensitive information field identification method, device, equipment and storage medium
  • Metadata sensitive information field identification method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] The first embodiment of the present invention provides a metadata sensitive information field identification method, such as figure 1 As shown, the identification methods of metadata sensitive information fields include:

[0027] Step S10, obtain the system view of the metadata database, and search for a list of all users in the system view.

[0028] In step S10, the metadata in the large database includes a system list and a user list, and the metadata system view is obtained in the large database. The system view is a transformation of the data in the large database and is another way to view the data in the table. The view can be regarded as a moving window. The view is obtained from one or more actual tables. The data in the table is stored in a large database. The table that generates the view is called the system table of the view, and the SELECT statement can be used Get all the table names in the system view of the large database, exclude the system table, get ...

Embodiment 2

[0054] The second embodiment of the present invention provides a metadata sensitive information field identification device, such as image 3 As shown, the metadata sensitive information field identification device 3 includes:

[0055] The user list search module 31 is used to obtain the system view of the metabase, and searches for all user lists in the system view;

[0056] A matching module 32, configured to obtain preset line data of each user list, and match the preset line data with preset sensitive information fields;

[0057] A summary module 33, configured to output the user table name, sensitive information fields and data corresponding to the preset row data to the sensitive information summary table when the preset row data matches the preset sensitive information field successfully;

[0058] The evaluation module 34 is configured to receive the table to be evaluated and display the sensitive information fields and data of the table to be evaluated when it is dete...

Embodiment 3

[0071] The third embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, a method for identifying metadata-sensitive information fields in the above-mentioned embodiment 1 is implemented , to avoid repetition, it will not be repeated here. Alternatively, when the computer program is executed by the processor, the functions of the modules / units in the metadata-sensitive information field identification device in the above-mentioned embodiment 2 are realized, and details are not repeated here to avoid repetition.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and in particular relates to a metadata sensitive information field identification method, device, equipment and storage medium. The metadata sensitive information field identification method includes obtaining the system view of the metadata database, finding all user lists in the system view; obtaining the preset row data of each user list, and matching the preset row data with the preset sensitive information fields ; When the preset row data matches the preset sensitive information field successfully, output the user table name, sensitive information field and data corresponding to the preset row data to the sensitive information summary table; receive the table to be evaluated and detect the pending evaluation When the table name is in the sensitive information summary table, it displays the sensitive information fields and data of the table to be evaluated. The technical solution of the invention can quickly distinguish the sensitive information in the metadata and output it to the sensitive information summary table, and quickly identify the sensitive information in the table to be evaluated through the sensitive information summary table.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a metadata sensitive information field identification method, device, equipment and storage medium. Background technique [0002] At present, the security of sensitive information has always been paid attention to by people. The identification of sensitive information usually relies on manual identification. For example, when reviewing many forms to be evaluated in the database that need to be sent out, it is necessary to manually judge whether the forms to be evaluated contain sensitive information one by one. , the work efficiency is low, and currently there are procedures for identification. However, in the prior art, a relatively simple text similarity algorithm strategy is usually used, for example, the full-text md5 identification algorithm is used for identification, that is, on-site full-text identification for each form to be evaluated. The ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/245G06F16/22
Inventor 戴秀凤
Owner CHINA PING AN LIFE INSURANCE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More