Unlock instant, AI-driven research and patent intelligence for your innovation.

Data table access method and device, computer device and storage medium

An access method and data table technology, applied in the field of data processing, can solve the problems of sensitive data leakage and low data security, and achieve the effect of improving security and avoiding leakage

Pending Publication Date: 2019-09-17
CHINA PING AN LIFE INSURANCE CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, personnel with access rights can access sensitive data, which can still easily lead to sensitive data leakage, resulting in low data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data table access method and device, computer device and storage medium
  • Data table access method and device, computer device and storage medium
  • Data table access method and device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0039] The data table access method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. Wherein, the terminal 102 can be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the server 104 can be realized by an independent server or a server cluster composed of multiple servers.

[0040] In one embodiment, such as figure 2 As shown, a data table access method i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data table access method and device, a computer device and a storage medium. The method comprises the following steps of receiving a data table access request sent by a terminal; performing access authority verification on the received data table access request; after the access authority passes the verification, inquiring a data table identifier in the data table access request in a data table white list; when the data table identifier is queried in the data table white list, obtaining a desensitization data table corresponding to the queried data table identifier; and returning the obtained desensitization data table to the terminal. By adopting the method, the desensitization data table corresponding to the data table identifier can be obtained, and the obtained desensitization data table is returned to the terminal, so that the leakage of the sensitive data is avoided, and the data security is improved.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a data table access method, device, computer equipment and storage medium. Background technique [0002] With the development of computer technology and Internet technology, big data technology has emerged, and more and more data are transmitted or stored through the Internet. Many businesses can be handled directly through the Internet, and most of them need to fill in some sensitive data when handling business, and store the sensitive data in the corresponding large database. [0003] However, in order to ensure data security, traditional technologies use data access control to ensure data security in the database and avoid data leakage. However, personnel with access rights can access sensitive data, which still easily leads to leakage of sensitive data, resulting in low data security. Contents of the invention [0004] Based on this, it is necessary to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F16/22
CPCG06F21/604G06F16/2282
Inventor 刘志涛
Owner CHINA PING AN LIFE INSURANCE CO LTD