Data desensitization processing method and device and electronic equipment

A technology of data desensitization and processing method, applied in the field of devices and electronic equipment, data desensitization processing method, can solve problems such as economic loss and enterprise trust crisis, and achieve the effect of solving security

Pending Publication Date: 2019-04-05
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once a leak occurs, it will bring a huge crisis of trust and economic losses to the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data desensitization processing method and device and electronic equipment
  • Data desensitization processing method and device and electronic equipment
  • Data desensitization processing method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] The embodiment of this application provides a data desensitization processing method, such as figure 1 As shown, the method includes: step S101 and step S102.

[0054] Wherein, step S101, acquire sensitive objects in business data, and determine the data category to which the sensitive objects belong.

[0055] For this embodiment of the application, the sensitive data refers to the data that needs to be anti-disclosure processing so as to prevent others from directly viewing it.

[0056] In practical applications, business data can be customer information, specifically including customer name, contact information, company account number and other information with commercial value; or, business data can also be other personal information, specifically including mobile phone number, name, ID card Key information such as number, residential address, etc.

[0057]Specifically, the method provided by the embodiment of the present application can be applied to testing tools...

Embodiment 2

[0080] The embodiment of the present application provides a data desensitization processing device, such as figure 2 As shown, the data desensitization processing apparatus 20 may include: an object acquisition module 201 and a desensitization processing module 202 .

[0081] Wherein, the object obtaining module 201 is used to obtain sensitive objects in business data, and determine the data category to which the sensitive objects belong;

[0082] The desensitization processing module 202 is configured to desensitize sensitive objects using a desensitization policy corresponding to the data classification.

[0083] For the embodiment of the present application, the desensitization policy is set for different data categories, so as to desensitize sensitive data.

[0084] For example, assume that the desensitization strategy library includes four desensitization strategies: strategy 1, strategy 2, strategy 3, and strategy 4. The data classification may include name, age, gende...

Embodiment 3

[0104] The embodiment of the present application provides an electronic device, such as Figure 4 as shown, Figure 4 The electronic device 400 shown includes: a processor 4001 and a memory 4003 . Wherein, the processor 4001 is connected to the memory 4003 , such as through a bus 4002 . Further, the electronic device 400 may further include a transceiver 4004 . Wherein, the transceiver is used for providing communication functions between electronic devices and other devices. It should be noted that, in practical applications, the transceiver 4004 is not limited to one, and the structure of the electronic device 400 does not limit the embodiment of the present application.

[0105] The processor 4001 may be a CPU, a general processor, DSP, ASIC, FPGA or other programmable logic devices, transistor logic devices, hardware components or any combination thereof. It can implement or execute the various illustrative logical blocks, modules and circuits described in connection w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data desensitization processing method, a data desensitization processing device and electronic equipment. The method comprises the following steps: acquiring a sensitive object in business data, and determining a data category to which the sensitive object belongs; And carrying out desensitization processing on the sensitive object by utilizing a desensitization strategy corresponding to the data classification. According to the embodiment of the invention, by obtaining the sensitive data in the service data and determining the data classification corresponding to the sensitive data, the sensitive data can be subjected to desensitization processing according to the desensitization strategy corresponding to the data classification, and the purposeof ensuring the information security of the service data is achieved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular, the present application relates to a data desensitization processing method, device and electronic equipment. Background technique [0002] As the market grows and business develops, the security of business data, especially data involving user personal information and customer data, is particularly important. Once a leak occurs, it will bring a huge crisis of trust and economic losses to the enterprise. [0003] Therefore, in the case of customer security data or some commercially sensitive data, real data will be transformed and provided for testing without violating system rules, such as personal information such as ID number, mobile phone number, card number, customer number, etc. Data desensitization is required. Therefore, while ensuring the availability of data, it is also within a certain range to ensure that malicious attackers cannot associate data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 赵盘垒
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products