Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive information processing method and device, storage medium and equipment

A technology for sensitive information and processing methods, applied in the fields of storage media and equipment, processing methods for sensitive information, and devices, can solve problems such as high maintenance costs, inability to track the source of sensitive information leakage, save time and manpower, and facilitate the location of sensitive information. The effect of the source of information leakage

Pending Publication Date: 2020-05-05
BEIKE TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiments of the present invention is to provide a processing method, device, storage medium and equipment for sensitive information, which solves the problem that in the prior art, multiple business parties need to upgrade encryption rules with the data provider at the same time, the maintenance cost is high, and it cannot be tracked The problem of the source of sensitive information leakage, by using the random key corresponding to the business party’s identity to encrypt and decrypt sensitive data, is completely transparent to the business party, and the encryption rules can be regularly updated without the business party’s awareness, saving time and manpower , in addition, store the business party requesting decryption of sensitive data and sensitive data, so as to locate the source of sensitive information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information processing method and device, storage medium and equipment
  • Sensitive information processing method and device, storage medium and equipment
  • Sensitive information processing method and device, storage medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific implementation manners of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation manners described here are only used to illustrate and explain the embodiments of the present invention, and are not intended to limit the embodiments of the present invention.

[0027] figure 1 It is a schematic flowchart of a sensitive information processing method provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0028] Step 101, receiving the data request sent by the business party, the data request including the business party identification and the requested sensitive data identification information;

[0029] Step 102, extracting corresponding sensitive data from the database according to the requested sensitive data identification information;

[0030] Step 103, encrypt the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a sensitive information processing method and device, a storage medium and equipment, belongs to the technical field of computers, and solves the problems thatmultiple service parties need to upgrade encryption rules with a data provider at the same time, the maintenance cost is high, and a sensitive information leakage source cannot be tracked. The methodcomprises the following steps: receiving a data request comprising a service party identifier and requested sensitive data identifier information; extracting sensitive data from a database; encrypting the sensitive data by using a random key corresponding to the service party identifier in the current life cycle, and returning the ciphertext to the service party; when a decryption request containing the service party identifier and the ciphertext is received, extracting a random key corresponding to the service party identifier in the current life cycle; decrypting the ciphertext by using therandom key to obtain sensitive data, and associatively storing the service party identifier and the sensitive data in a behavior database; and returning the sensitive data to the business party. Theembodiment of the invention is suitable for the sensitive data processing process.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a sensitive information processing method, device, storage medium and equipment. Background technique [0002] In the era of big data, more and more attention is paid to personal privacy to prevent information leakage. Companies will also take a series of measures to track data usage and protect sensitive information. In the prior art, the company usually adopts the following technical solution for processing sensitive information: using symmetric encryption technology to encrypt and decrypt the sensitive information. The data service provider uses a key to encrypt, and the business party that calls sensitive information uses the key to decrypt. However, this technical solution has the following deficiencies: (1) The business party needs to obtain the corresponding decryption algorithm. If there are multiple sets of encryption rules, it needs to be connected multiple ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6227G06F21/6245G06F21/602
Inventor 崔云鹏
Owner BEIKE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products