Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensitive table group discovery method and system

A group, sensitive technology, applied in relational databases, digital data protection, computer security devices, etc., can solve the problems of poor real-time scanning of tools, small labeling range, and resource occupation, and achieve the effect of fast and efficient search

Inactive Publication Date: 2020-02-11
SHANGHAI GUAN AN INFORMATION TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a method that can accurately and efficiently find sensitive data tables and can reflect the shortcomings of the manual labeling method in the prior art, in view of the shortcomings of low work efficiency, small labeling range, poor real-time performance of tool scanning and resource occupation. Method and system for inter-relationship, sensitive table groups

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive table group discovery method and system
  • Sensitive table group discovery method and system
  • Sensitive table group discovery method and system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0056] Example 1: Sql tool analysis example:

[0057] Input: "create table T2 as select c1 as c1'from T1"

[0058] Output: T1, c1, T2, c1', in which the target table name T2 is recognized according to create, the original table name T1 is recognized according to from, and the original column name c1 and target column name c1' are recognized according to select.

example 2

[0059] Example 2: Sql tool analysis example:

[0060] Input: "create table T3 as select c1 as c2'from T1;

[0061] insert into T3(c2’) select c2 from T1;”

[0062] Output: T1, c2, T3, c2', among which the target table name T3 is recognized according to insert, the original table name T1 is recognized according to from, and the original column name c2 and target column name c2' are recognized according to select.

[0063] S1024: Store all the relationships between the original table and the target table in the parsing table, so as to establish a blood-relationship table of the data in the database, which is recorded as Blood-relationship, and its content is in the form of Table 1: blood-relationship table.

[0064] Table 1 blood relationship table

[0065] original table name original column name belong target table name target column name T1 c1 -> T2 c1 T1 c2 -> T3 c3 T1 c4 -> T3 c2 T1 c5 -> T3 c4 T1 c5 ->...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a sensitive table group sending method and a system. The sensitive table group sending method comprises the following steps: S101, determining labeled sensitive data in a database; S102, obtaining a database operation log, analyzing sql statements in the operation log, obtaining a table and a column name, and establishing a blood relationship table; S103, constructing a chain type creation relation graph among the information tables in the database; and S104, searching a sensitive table group having a direct or indirect blood relationship with the sensitive data based onthe chain type creation relationship graph established in the step S103 in combination with the labeled sensitive data in the step S101. According to the method provided by the invention, on the premise of high accuracy, the group relationship of the sensitive table is highlighted, and the sensitive data storage management efficiency of enterprises, organizations or individuals to the database isgreatly improved.

Description

technical field [0001] The invention relates to the technical field of computer data security, in particular to a method and system for discovering groups of sensitive tables. Background technique [0002] Sensitive data generally refers to information and data with a high degree of confidentiality of enterprises, organizations or individuals. In different industries, the categories of these sensitive data are also different, but the management methods for sensitive data are basically using database management systems. Some user operations may cause the spread of a large amount of sensitive data stored in the database, that is, some sensitive data is copied from the information table to other tables, resulting in many new information tables that are not marked with confidentiality. These newly created information tables may be queried, copied, exported, etc. by other users, resulting in leakage of sensitive data. Therefore, it is extremely important to control the groups of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F16/22G06F16/28
CPCG06F21/6218G06F16/2282G06F16/284
Inventor 陶景龙梁淑云刘胜马影王启凡魏国富徐明殷钱安余贤喆周晓勇
Owner SHANGHAI GUAN AN INFORMATION TECH