Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data protection method and device

A data protection and data technology, applied in the field of communication, can solve the problem of difficult data protection operation, and achieve the effect of high-performance data protection function

Pending Publication Date: 2019-11-12
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The embodiment of the present application provides a data protection method and device to at least solve the problem in the related art that it is difficult to implement data protection and operation in a big data environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device
  • Data protection method and device
  • Data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0035] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence.

[0036] The embodiment of this application provides a solution for user equipment to obtain data from a database execution engine. The database execution engine is different from related technologies, and has a built-in data protection device. After receiving the data request information from the client, the data is protected internally. The data protection may include data desensitization, data filtering, etc.

[0037] The embodiment of this ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data protection method and device, and the method comprises: a database execution engine receiving data request information transmitted by a client; obtaining a preset strategy corresponding to the identity identifier of the client carried in the data request information, and executing data protection operation on the requested data by the database execution engine according to the preset strategy to obtain target data; and the database execution engine sending the target data to the client. According to the invention, the problem of high difficulty in implementing data protection operation in a big data environment in related technologies is solved. The scheme of an external desensitization server is abandoned, the data protection device is arranged in the big data database execution engine, and the high-performance data protection function is achieved through the distributed processing capacity of the big data database engine on the premise that the user request logic and the data original value are not changed.

Description

technical field [0001] The present application relates to the communication field, and in particular, to a data protection method and device. Background technique [0002] In related technologies, data desensitization is a technology that uses desensitization rules to deform certain sensitive information to achieve reliable protection of sensitive private data. [0003] In the related technologies, technologies, solutions, and products that realize database desensitization are often desensitized by means of middleware conversion through an external desensitization server or a desensitization proxy gateway. [0004] figure 1 It is a flow chart of data protection through a desensitization server in related technologies, such as figure 1 shown, including the following steps: [0005] Step 1: Send a query request, specifically, the application program sends the request to the data desensitization server; [0006] Step 2: rewrite the query request, specifically, the data dese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F9/54G06F2209/541G06N5/022G06N5/04G06F21/6218G06F21/6254H04W12/02G06F21/6245H04L63/20G06F16/2457G06F16/2282G06F16/2455G06F16/248G06N5/025
Inventor 牛家浩张强申山宏王德政
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More