Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for protecting sensitive data

A sensitive data and data technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve desensitization and other problems, and achieve the effect of protecting computing assets

Active Publication Date: 2021-10-08
西安烽火软件科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of data protection in scheme 2 is to return some sensitive data to the client to achieve the effect of data desensitization, but in this method data users cannot use these data for data analysis and mining

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for protecting sensitive data
  • A method and system for protecting sensitive data
  • A method and system for protecting sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0029] A sensitive data protection method and system disclosed in the present invention, the schematic diagram of its system architecture is as follows image 3 shown, including:

[0030] The data storage module is used to store data, and can authorize analysis result data to designated users.

[0031] In the data publishing module, the data owner publishes the data structure for the data user to develop analy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system for protecting sensitive data. The system architecture includes a data storage module, a data release module, a user resource management module and a job management module. The job management module includes a job storage module, a job scheduling module and a job execution module. device. The invention also discloses a method corresponding to the sensitive data protection system. The invention releases the data structure, effectively protects data assets, and the data owner can provide third-party development, analysis and mining without opening the data reading and copying authority; it can also realize job sharing, effectively protect computing assets, and use data A party can analyze and mine the data in the data structure released by the data owner without revealing its own algorithm.

Description

technical field [0001] The invention discloses a sensitive data protection method and system, and relates to the technical field of information data security processing. Background technique [0002] Many enterprises and organizations in the industry have high-value data, but when it comes to factors such as user privacy, security, and IT data reproducibility, these data cannot be released for use, nor can they be traded. These constraints make these companies sit on mountains of gold and silver and cannot mine them. These companies urgently need to be able to allow third parties to use it while ensuring data security and non-proliferation. Sensitive data protection solutions widely used in the industry include: [0003] Solution 1: Protection method for encrypted sensitive data [0004] Frame diagram such as figure 1 As shown, it is usually a sensitive data protection method based on the group key policy, including steps: the server receives the request for data downloa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6227
Inventor 杨磊周帅锋曹俊亮赵智峰
Owner 西安烽火软件科技有限公司