Java annotation-based dynamic configuration data desensitization method

A technology of data desensitization and dynamic configuration, applied in the field of data desensitization, it can solve the problems of sensitive data exposure, dynamic configuration data desensitization, etc.

Inactive Publication Date: 2020-10-02
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a method for desensitizing dynamic configuration data based on java annotations to solve the problem of sensitive data exposure caused by human or program problems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Java annotation-based dynamic configuration data desensitization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] see figure 1 , a method for desensitizing dynamic configuration data based on java annotations, the steps are as follows:

[0016] Step 1: Configure the java basic environment and import the open source framework;

[0017] Specifically, install jdk to ensure the basic environment for java code to run. jdk is a software development kit for java language, which includes JVM standards and java core class libraries. In order to provide basic class libraries, import spring and other open source frameworks to provide faster For code development, configure environment variables to provide the underlying operating environment.

[0018] Step 2: Write a custom annotation to identify the desensitized data and the data that carries the data desensitization annotation in the information returned by the interceptor interception request;

[0019] Specifically, the interceptor implements interception through the HandlerInterceptorAdapter provided by spring. The process of business co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a java annotation-based dynamic configuration data desensitization method. The method comprises the following steps of 1, configuring a java basic environment and importing anopen source framework; 2, compiling user-defined annotation identification desensitized data and data carrying data desensitized annotations in information returned by an interceptor interception request; 3, reading the rule file, and matching the rule file with the intercepted data type to obtain a corresponding desensitization mode; and 4, performing data desensitization according to the data type. According to the method, private data desensitization operation can be performed more efficiently and quickly under the condition of performing security privacy protection on data by using a web program developed by java language, so that desensitized data highly simulated with source data is output to the outside.

Description

technical field [0001] The invention relates to the field of data desensitization methods, in particular to a method for dynamically configuring data desensitization based on java annotations. Background technique [0002] In the information age, data is a valuable asset. Whether enterprises or government units, they collect, store, and share data intentionally or unintentionally every day, and the scale is getting bigger and bigger. In daily life, people often lack the protection of sensitive data. awareness, this will inadvertently spread some sensitive data, such as ID number, etc., which will cause problems such as data leakage. The traditional technical method will carry out a sensitive mark on the data, which is used to remind the person who obtained the data, or use the method of invoking tools to perform secondary processing on the obtained data, and then return the data in the corresponding format. However, in the currently developed projects, when someone attacks ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 张浩
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products