Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensitive data protection method and system

A sensitive data and data technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve desensitization and other problems, and achieve the effect of protecting computing assets

Active Publication Date: 2018-10-16
西安烽火软件科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of data protection in scheme 2 is to return some sensitive data to the client to achieve the effect of data desensitization, but in this method data users cannot use these data for data analysis and mining

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data protection method and system
  • Sensitive data protection method and system
  • Sensitive data protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0029] A sensitive data protection method and system disclosed in the present invention, the schematic diagram of its system architecture is as follows image 3 shown, including:

[0030] The data storage module is used to store data, and can authorize analysis result data to designated users.

[0031] In the data publishing module, the data owner publishes the data structure for the data user to develop analy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive data protection system. A system architecture comprises a data storage module, a data release module, a user resource management module and a job management module;and the job management module comprises a job storage module, a job scheduling module and a job executor. The invention furthermore discloses a method corresponding to the sensitive data protection method and system. A data structure is released, data assets are effectively protected, and a data owner can be used for a third party to perform development, analysis and mining under the condition ofnot opening data reading and copying permissions; and job sharing can be realized, calculation assets are effectively protected, and a data user can analyze and mine data in the data structure released by the data owner under the condition of not leaking an own algorithm.

Description

technical field [0001] The invention discloses a sensitive data protection method and system, and relates to the technical field of information data security processing. Background technique [0002] Many enterprises and organizations in the industry have high-value data, but when it comes to factors such as user privacy, security, and IT data reproducibility, these data cannot be released for use, nor can they be traded. These constraints make these companies sit on mountains of gold and silver and cannot mine them. These companies urgently need to be able to allow third parties to use it while ensuring data security and non-proliferation. Sensitive data protection solutions widely used in the industry include: [0003] Solution 1: Protection method for encrypted sensitive data [0004] Frame diagram such as figure 1 As shown, it is usually a sensitive data protection method based on the group key policy, including steps: the server receives the request for data downloa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6227
Inventor 杨磊周帅锋曹俊亮赵智峰
Owner 西安烽火软件科技有限公司