Sensitive data analysis method, device, equipment and storage medium

A sensitive data and analysis method technology, applied in the Internet field, can solve problems such as simple and impractical sensitive data analysis methods, prone to abnormalities, and unable to meet users' sensitive data analysis needs, and achieve the effect of improving analysis and query performance

Pending Publication Date: 2020-11-13
SANGFOR TECH INC
View PDF15 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Invisible watermarking of sensitive data, the invisible watermarking scheme for structured data is very complicated. After the structured data is easily watermarked, abnormalities are prone to occur when parsing sensitive data, and this kind of invisible watermarking scheme is prone to software compatibility problems
Moreover, the sensitive data analysis methods of related technologies are simple and impractical, and have been unable to meet the growing needs of users for sensitive data analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data analysis method, device, equipment and storage medium
  • Sensitive data analysis method, device, equipment and storage medium
  • Sensitive data analysis method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0027] It should be understood that some embodiments described here are only used to explain the technical solutions of the present application, and are not intended to limit the technical scope of the present application.

[0028] A schematic diagram of the implementation flow of a sensitive data analysis method provided in the embodiment of this application, which is applied to the analysis end, such as Figure 1A As shown, the method includes:

[0029] Step S101, obtain a specific log, the specific log includes the log of the sensitive data of the terminal in the intranet under a specific event;

[0030] Network devices, systems and service programs, etc., will generate an event record called a log (log) during operation; each line of log records the description of relate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a sensitive data analysis method, a device, equipment and a storage medium. The method comprises the steps: obtaining a specific log which comprises a log, related to sensitive data, of a terminal in an intranet under a specific event; determining N parts of queried dimension information, where N is an integer greater than or equal to 1; and analyzing thespecific log according to each part of dimension information to obtain an analysis report under each part of dimension information.

Description

technical field [0001] The embodiment of the present application relates to the technical field of the Internet, and involves but is not limited to a sensitive data analysis method, device, equipment, and storage medium. Background technique [0002] Sensitive data, also known as private data, commonly includes name, ID number, address, phone number, bank account number, email address, password, medical information, educational background and other data. Most of the relevant technologies for the identification of sensitive data flow use invisible watermarks to identify sensitive data, so that the flow path can be traced according to the invisible watermarks. Invisible watermarking of sensitive data, the invisible watermarking scheme for structured data is very complicated. After the structured data is easily watermarked, abnormalities are prone to occur when sensitive data is parsed, and this kind of invisible watermarking scheme is prone to software compatibility problems. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 蔡家坡
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products