A method and system for desensitizing mixed data
A mixed data and desensitization technology, applied in the field of information security, can solve the problem of low efficiency of mixed data desensitization
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] An embodiment of the present invention provides a mixed data desensitization method, such as figure 1 As shown, the desensitization method of the mixed data includes the following steps:
[0039] Step S1: Obtain the mixed data to be desensitized. The source of the mixed data to be desensitized in the embodiment of the present invention may be a database such as hive, hbase, mongo, etc., and the mixed data containing various types of sensitive information is stored in the above database.
[0040] Step S2: Split and classify the mixed data to be desensitized to obtain a set of split dictionaries.
[0041] In a preferred embodiment, in step S2, the mixed data to be desensitized is split and classified to obtain the step of splitting the dictionary set, such as figure 2 shown, including:
[0042] Step S21: Split the mixed data to be desensitized into different field data according to the data type. In a preferred embodiment, the data type includes at least one of Chine...
Embodiment 2
[0070] An embodiment of the present invention provides a hybrid data desensitization system, such as Figure 4 As shown, the hybrid data masking system includes:
[0071] The data to be desensitized acquisition module 1 is used to acquire mixed data to be desensitized. This module executes the method described in step S1 in Embodiment 1, which will not be repeated here.
[0072] The split dictionary set acquisition module 2 is used to split and classify the mixed data to be desensitized to obtain a split dictionary set. This module executes the methods described in step S2, step S21-step S23 in Embodiment 1, which will not be repeated here.
[0073] The sensitive information type marking module 3 is configured to mark the corresponding sensitive information type in the split dictionary set, and obtain the split dictionary set identifying the sensitive information type. This module executes the method described in step S3 in Embodiment 1, which will not be repeated here.
...
Embodiment 3
[0077] An embodiment of the present invention provides a computer device, such as Figure 5 As shown, it includes: at least one processor 401 , such as a CPU (Central Processing Unit, central processing unit), at least one communication interface 403 , memory 404 , and at least one communication bus 402 . Wherein, the communication bus 402 is used to realize connection and communication between these components. Wherein, the communication interface 403 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 403 may also include a standard wired interface and a wireless interface. The memory 404 may be a high-speed RAM memory (Ramdom Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 404 may also be at least one storage device located away from the aforementioned processor 401 . where processor 401 can execute figure 1 In the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com