Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for preventing sensitive data leakage

A sensitive data and sensitive technology, applied in the fields of digital data protection, data processing applications, electrical digital data processing, etc., can solve the problem of not forming anti-leakage methods and processes, achieve intuitive circulation and use process, improve accuracy, reduce The effect of the risk of leakage

Active Publication Date: 2020-01-17
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +1
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to overcome the path tracking problem of sensitive data in the whole life cycle process of transmission, storage, processing, conversion and analysis and mining in the prior art, and to process non-sensitive results after conversion or analysis and mining The problem of data inverse transformation into sensitive data has not yet formed a comprehensive and systematic anti-leakage method and process defect, so as to provide a method and system for preventing sensitive data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing sensitive data leakage
  • Method and system for preventing sensitive data leakage
  • Method and system for preventing sensitive data leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The embodiment of the present invention provides a method for preventing leakage of sensitive data, which can be applied to the field of big data security governance, such as figure 1 As shown, the method for preventing leakage of sensitive data includes the following steps:

[0032] Step S1: Establish the original sensitive field library of the source business system by using a preset sensitive field discovery algorithm.

[0033]In the embodiment of the present invention, since the sensitive fields are all generated from the source business system, it is necessary to sort out the sensitive data in the source business, and at the same time use the preset sensitive field discovery algorithm to establish the original sensitive field library of the source business system to facilitate unified management For all sensitive field information, the preset sensitive field discovery algorithm in the embodiment of the present invention is a relatively mature algorithm in the prior...

Embodiment 2

[0083] This embodiment provides a system for preventing leakage of sensitive data, such as Figure 8 shown, including:

[0084] The original sensitive field library building module 1 is used to create the original sensitive field library of the source business system by using the preset sensitive field discovery algorithm; this module executes the method described in step S1 in Embodiment 1, which will not be repeated here.

[0085] The metadata acquisition module 2 is used to acquire metadata during the whole life cycle of sensitive data; this module executes the method described in step S2 in Embodiment 1, and details are not repeated here.

[0086] The model and code analysis module 3 is used to analyze the model and code in the sensitive data transfer process, and obtain the blood relationship and usage path of the sensitive data in the whole link; this module executes the method described in step S3 in Embodiment 1, and in This will not be repeated here.

[0087] The se...

Embodiment 3

[0093] An embodiment of the present invention provides a computer device, such as Figure 9 As shown, it includes: at least one processor 401 , such as a CPU (Central Processing Unit, central processing unit), at least one communication interface 403 , memory 404 , and at least one communication bus 402 . Wherein, the communication bus 402 is used to realize connection and communication between these components. Wherein, the communication interface 403 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 403 may also include a standard wired interface and a wireless interface. The memory 404 may be a high-speed RAM memory (Ramdom Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 404 may also be at least one storage device located away from the aforementioned processor 401 . The processor 401 may execute the method for pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for preventing sensitive data leakage. The method comprises the following steps: establishing an original sensitive field library by utilizing a preset sensitive field discovery algorithm; obtaining metadata in the whole life cycle process of the sensitive data; according to the original sensitive field library and the metadata, analyzing a model and acode in a sensitive data circulation process, and obtaining a blood relationship and a use path of sensitive data in a full link; obtaining a sensitive data use list by utilizing the blood relationship and the use path of the sensitive data; analyzing the sensitive data conversion process by using a preset data feature analysis algorithm to obtain a sensitive data check list; performing early warning and auditing sensitive data. According to the method, the original sensitive field library, metadata management, model and code analysis, sensitive data blood relationship, sensitive data contentfeature analysis and early warning audit are combined, so that the transfer and use process of the sensitive data is more intuitive and clearer, and the risk of sensitive data leakage in each link inthe full life cycle of the data is effectively reduced.

Description

technical field [0001] The invention relates to the technical field of data security governance, in particular to a method and system for preventing sensitive data leakage. Background technique [0002] The power grid field has a large amount of sensitive data such as marketing data, scheduling data, and personal electricity consumption information data. Due to the scattered sources, large scale, rapid growth, various types, different structures, and irregular descriptions of the data, the granularity of sensitive data is inconsistent. First, the span of time and space is large, so there is a risk of sensitive data leakage in all links of data transmission, storage, processing, analysis and mining. [0003] At present, the methods for protecting sensitive data are mostly sensitive data discovery method, sensitive data classification and classification, sensitive data access control, etc. Tracking problems, dealing with the conversion or reverse conversion of non-sensitive r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q50/06
CPCG06F21/6209G06F21/6227G06Q50/06
Inventor 刘卫卫梁潇郑晓崑高昆仑
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products