Data desensitization method, device, apparatus and medium for unstructured data access

A technology for unstructured data and data desensitization, applied in the field of data desensitization and data sharing, can solve the problems such as the inability to provide unstructured data desensitization methods and the leakage of unstructured data sensitive information, so as to prevent leakage and improve The effect of the degree of protection

Active Publication Date: 2019-02-12
SHENZHEN YUN AN BAO TECH CO LTD
View PDF11 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The object of the present invention is to provide a data desensitization method, device, equipment and storage medium for unstructured data access, aiming to solve the problem of unstructured data desensitization due to the inability of the prior art to provide an effective unstructured data desensitization method The Problem of Sensitive Information Leakage in Structured Data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data desensitization method, device, apparatus and medium for unstructured data access
  • Data desensitization method, device, apparatus and medium for unstructured data access
  • Data desensitization method, device, apparatus and medium for unstructured data access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows the implementation process of the data desensitization method for unstructured data access provided by Embodiment 1 of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are shown, and the details are as follows:

[0031] In step S101, a request for declaration of data access rights sent by a user is received, and according to the declaration request, the user access rights of the user are reviewed to obtain corresponding user access rights.

[0032] The embodiments of the present invention are applicable to data sharing and interaction platforms, systems or devices, such as personal computers, servers, and the like. The user declares the data access authority to the preset third-party application authority declaration module, and the third-party application authority declaration module checks whether the user has the data query authority and the user's data access scope accordin...

Embodiment 2

[0041] figure 2 It shows the implementation process of step S104 in the first embodiment provided by the second embodiment of the present invention to carry out sensitive data identification and desensitization processing on the non-desensitized data through the sensitive data identification and desensitization engine. The relevant parts of the embodiments of the present invention are described in detail as follows:

[0042] In step S201, the sensitive data identification and desensitization engine performs data type analysis on the non-desensitized data to determine that the non-desensitized data is image data or text document data.

[0043] In the embodiment of the present invention, the non-desensitized data is analyzed by the pre-established sensitive data identification and desensitization engine, and the non-desensitized data is determined to be image data or text document data according to the analysis result.

[0044] In step S202, analyze the data type of the undese...

Embodiment 3

[0073] image 3 It shows the implementation process of step S203 in the second embodiment provided by the third embodiment of the present invention to identify and desensitize the sensitive information in the picture data through the pre-trained picture information identification and desensitization model. Out of the part related to the embodiment of the present invention, detailed description is as follows:

[0074] In step S301, text region positioning is performed on image data through a text detection model.

[0075] In the embodiment of the present invention, when using the text detection model to locate the text region of the picture data, preferably, the following steps are used to realize the location of the text region:

[0076] (1) Utilize the convolution part of the VGG-16 convolutional neural network that has trained parameters in the text detection model to extract the picture features in the picture data, and obtain the corresponding feature map;

[0077] (2) G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of data desensitization and data sharing, and provides a data desensitization method, device, apparatus and medium for unstructured data access. Themethod comprises the steps of after the application for data access rights sent by the user has been approved, getting the corresponding user access, and then receiving the query request of the user to the unstructured data of the database, auditing the query requests for user access, after approval, based on query request, performing data query operations in databases that have user access to obtain the corresponding undesensitized data, recognizing and desensitizing the non-desensitized data by the sensitive data recognition and desensitization engine to obtain the corresponding desensitizeddata to return the desensitized data to the user, thereby realizing the access of the user to the unstructured data in the database, effectively preventing the leakage of the sensitive information inthe unstructured data, and improving the protection degree of the sensitive information in the unstructured data.

Description

technical field [0001] The invention belongs to the technical field of data desensitization and data sharing, and in particular relates to a data desensitization method, device, equipment and medium during unstructured data access. Background technique [0002] With the advent of the era of big data, the big data sharing platform for information transmission and machine learning has become an important information interaction platform in daily office, communication, and collaborative interaction. However, in the process of information transmission and data sharing through the network, This has caused the leakage of data privacy and the secondary reselling of key data sets. Therefore, how to disclose data to third-party applications on the premise of protecting data privacy has become a key issue for big data sharing platforms. [0003] There are generally two ways to solve this problem: [0004] One is to build a data leakage prevention system for a big data sharing platfor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/62G06F16/33G06F16/35G06N3/04
CPCG06F21/31G06F21/6218G06N3/045
Inventor 刘川意方滨兴潘鹤中段少明韩培义
Owner SHENZHEN YUN AN BAO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products