Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data desensitization control method, electronic device and computer readable storage medium

A control method and data desensitization technology, applied in the field of information security, can solve the problem of low data table processing efficiency

Active Publication Date: 2019-12-03
PING AN TECH (SHENZHEN) CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the desensitization mechanism in the related art, the processing efficiency of the data table is not high. For the case of a large amount of data such as a large number of data tables, it takes a long time to complete the desensitization of sensitive information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data desensitization control method, electronic device and computer readable storage medium
  • Data desensitization control method, electronic device and computer readable storage medium
  • Data desensitization control method, electronic device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0035] The embodiment of this application proposes a data desensitization control method, see figure 2 , the method includes:

[0036] Step 201, obtaining the identification information of the target data table;

[0037] In this embodiment, the target data table is a data table required by the data demander. Optionally, the identification information of the target data table may be a table name, or a field name in the table, etc., which is not limited in this embodiment. In this embodiment, the table name and field name for determining the target data may be provided by the data requester.

[0038] Optionally, obtaining the identification information of the target data table includes: obtaining the identification information of the target data table sent by the data demander, or obtaining the identification information of the target data table stored locally.

[0039] Step 202, identifying the target data table from the database of the production environment according to th...

no. 2 example

[0077] The second embodiment of the present invention provides an electronic device, see image 3 , the electronic device includes:

[0078] An acquisition module 301, configured to acquire the identification information of the target data table;

[0079] The import module 302 is used to identify the target data table from the database of the production environment according to the identification information, import the target data table into the target database, and lock the target data table in the target database to prohibit the data demander of the target data table from accessing the target database The target data table in;

[0080] The first processing module 303 is used for if the target data tables in the target database come from different tasks, then adopt a multi-task parallel processing method, and simultaneously discover sensitive information on the target data tables under different tasks, wherein, for each task According to the rule of discovering sensitive i...

no. 3 example

[0094] see Figure 4 , Figure 4 It is an electronic device provided by the third embodiment of the present invention. The electronics can be used to implement figure 2 The data desensitization control method in the illustrated embodiment. like Figure 4 As shown, the electronic device mainly includes:

[0095] A memory 401 , a processor 402 , a bus 403 and computer programs stored in the memory 401 and operable on the processor 402 . The memory 401 and the processor 402 are connected through the bus 403 . When the processor 402 executes the computer program, it realizes figure 2 The data desensitization control method in the illustrated embodiment. Wherein, the number of processors may be one or more, which is not limited in this embodiment.

[0096] The memory 401 may be a high-speed random access memory (RAM, Random Access Memory) memory, or a non-volatile memory (non-volatile memory), such as a disk memory. The memory 401 is used to store executable program eleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data desensitization control method, an electronic device and a computer readable storage medium, and the method comprises the steps: recognizing a target data table from a database of a production environment according to the obtained recognition information, importing the target data table into a target database, and locking; using a multi-task parallel processing mode,performing sensitive information discovery on the target data tables under different tasks at the same time; aiming at the target data table under each task, using a plurality of processes to discover sensitive information of target data tables of all tasks at the same time; for each target data table, dividing the target data table of which the data volume is greater than a preset data volume threshold into a plurality of sub-data tables, and running a plurality of threads in a process corresponding to the target data table to discover sensitive information of the sub-data tables at the sametime; and desensitizing the sensitive information found in all the target data tables, and unlocking the target data tables after desensitization. Sensitive information is discovered through a multi-process and multi-thread concurrent processing mode, so that the data desensitization efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a data desensitization control method, an electronic device, and a computer-readable storage medium. Background technique [0002] With the rapid development of China's economy, Chinese enterprises continue to grow and develop. Many enterprises have built their own IT teams and gradually launched new business systems. With the continuous increase of business systems, the basic data of enterprise management is getting larger and larger. The number of enterprise development and maintenance personnel is also increasing, but the enterprise's internal IT management standards are lagging behind. Many sensitive data related to privacy are directly used by development and maintenance personnel without any de-privacy, and corporate sensitive data is leaked. The risks increase every year. [0003] At present, the use of data desensitization can transform sensit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 杨振燕李博
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products