Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for carrying out security protection on sensitive data through natural language analysis

A sensitive data and security protection technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of security incidents affecting social security, e-government business operation, etc., to reduce workload and data The probability of leakage incidents and the effect of improving efficiency

Inactive Publication Date: 2020-02-14
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Government services often collect and store a large amount of sensitive government data in the course of their work. Once these sensitive data are leaked, it will have an impact on the operation of e-government business, and even serious security incidents will directly affect social security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out security protection on sensitive data through natural language analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0019] To protect the core sensitive data in e-government services, it is first necessary to discover sensitive data, and decompose sentences, article summaries, paragraphs, or entire articles into individual word sets by segmenting the returned data from the service gateway, and then set the Sensitive word matching rules to discover sensitive data such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for carrying out security protection on sensitive data through natural language analysis, and belongs to the technical field of e-government data security. According tothe invention, sensitive data is automatically discovered, and sensitive data are found and subjected to security protection according to data grading and classifying rules and corresponding safety protection measures; meanwhile, sensitive data use conditions and data flow direction information are monitored, and rules and models are formed; and the security protection and security risk perception capacity of the sensitive data is enhanced according to user permission.

Description

technical field [0001] The invention relates to electronic government data security technology, in particular to a method for automatically discovering and protecting sensitive data by using natural language analysis technology. Background technique [0002] With the continuous development of cloud computing and big data technology, the wave of e-government informatization is becoming more and more profound. However, with the rapid development of cloud computing and big data, the data security of e-government affairs has become increasingly prominent in recent years. During the rapid construction of e-government affairs in various places, the construction of data security guarantee system is often ignored, which leads to the overall system security. The performance is very weak, and there are great data security risks. It can even be said that these e-government data are "running naked" and will be destroyed in one blow. [0003] The security of e-government data is the li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/33G06F16/35
CPCG06F21/604G06F21/6218G06F2221/2141G06F16/3344G06F16/35
Inventor 刘昊东张雪莲赵志锋
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products