Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe access method of sensitive data

A sensitive data, secure access technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as data leakage, database breach, sensitive data security loopholes, etc. The effect of incognito access, compromise or reduced risk of being attacked

Inactive Publication Date: 2020-12-18
CHINA ELECTRONIC TECH GRP CORP NO 38 RES INST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above method realizes the protection of sensitive data to a certain extent, but there are still loopholes in the security of sensitive data, because sensitive data resides in the system, on the one hand, the database may be breached and cause data leakage; on the other hand, for For systems with B / S or C / S architecture, data may be transmitted through the network to increase the risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method of sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0031] Such as figure 1 As shown, this embodiment provides a technical solution: develop a software for personnel genealogy analysis, that is, when a person is clicked, the family tree relationship diagram of the person is dynamically displayed, and when each person is right-clicked in the figure, Display the basic information of the person: name, ID number. Name and ID number are sensitive data used by this module. There is a unique custom ID for each person in the system, and the personnel data sequence PSeq (ID, name, ID number) is established and stored in the mobile medium, and the personnel information tabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe access method for sensitive data, which belongs to the technical field of sensitive data protection and comprises the following steps: S1, encrypting sensitive data of amobile medium; S2, detecting an insertion state of a moving medium; S3, decrypting the sensitive data of the mobile medium; and S4, dynamically accessing the sensitive data as required. According tothe invention, the sensitive data required by the system is encrypted and stored in the mobile medium instead of a system database or a file, so that the physical isolation of the sensitive data is realized; only a mobile medium manager or a specific person can contact the sensitive data stored in the mobile medium, so that the leakage risk of the sensitive data is greatly reduced; the system compiles a corresponding program according to service requirements to realize decryption, dynamic on-demand reading, analysis and the like of the sensitive data of the mobile medium instead of persistently storing the sensitive data in a system database or a system file; and when the mobile medium is pulled out, all the sensitive data are traceless in the system, and traceless access of the sensitivedata is ensured.

Description

technical field [0001] The invention relates to the technical field of sensitive data protection, in particular to a method for safely accessing sensitive data. Background technique [0002] With the advent of the Internet and the era of big data, the amount of data on the Internet is increasing, and there are more and more sensitive data in the data, such as personal ID cards, bank card numbers, personal home addresses, phone numbers, mobile geographic trajectories, etc. This kind of data often needs to be applied by certain software systems to achieve certain functions, such as personnel portraits, suspicious personnel research and judgment, and case research and judgment. In traditional methods, such sensitive data is generally stored in system databases or files (local or network). When the specific functional modules of the system are running, such data will be read from the database or files for specific data analysis or application display. [0003] At the storage l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/60G06F21/62
CPCG06F21/34G06F21/602G06F21/6245
Inventor 王建吕孝忠牛珊珊王亚汀陈飞马敏陈楠
Owner CHINA ELECTRONIC TECH GRP CORP NO 38 RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products