Timed task-based data increment static desensitization implementation method and system

A technology of timed tasks and implementation methods, applied in the field of big data security, can solve problems such as hidden security risks, incremental data sensitivity and privacy cannot be protected in a timely manner, and achieve security privacy, data privacy and sensitivity. The effect of protection, robust security cycle

Pending Publication Date: 2021-04-16
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the data static desensitization function of data security products can only desensitize existing data, and cannot track incremental data (new data, updated data) and perform desensitization in real time, so the sensitivity of incremental data and privacy cannot be protected in time, and there are hidden dangers to privacy and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Timed task-based data increment static desensitization implementation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] as attached figure 1 As shown, the method for implementing static desensitization of data increments based on timed tasks of the present invention is specifically as follows:

[0044] S1. Create a scheduled task: deploy a scheduled task registration center, configure a scheduled task executor and register to the registration center, create a scheduled task at the same time, set the execution cycle and task parameters of the scheduled task, and start the scheduled task;

[0045] S2. Filter incremental data: regularly filter out incremental data by scheduled tasks;

[0046] S3. Execute data desensitization: the scheduled task periodically calls the API interface for performing incremental data desensitization to realize incremental desensitization.

[0047] The timing task in this embodiment is based on the xxl-job open source framework for secondary development. It is deployed as a timing task executor through configuration items and sends a registration request to the ...

Embodiment 2

[0061]The data incremental static desensitization system based on timing tasks of the present invention is developed using Java technology, implemented based on the SpringBoot framework, and releases the timing incremental desensitization function as an API interface, allowing front-end developers and application services to call; front-end Developers are used to develop web front-end pages, develop static pages and functional functions based on jsp and js related technologies in web technology, and support customers to freely choose the options of full desensitization, incremental desensitization, timing execution and manual execution to realize database and The selection of data tables supports MySQL, Oracle, Sqlserver and DB2 relational databases; the system includes,

[0062] Create a module for deploying the scheduled task registration center, configure the scheduled task executor and register to the registration center, create a scheduled task at the same time, set the ex...

Embodiment 3

[0076] An embodiment of the present invention also provides a computer-readable storage medium, in which a plurality of instructions are stored, and the instructions are loaded by a processor, so that the processor executes the XXXX method in any embodiment of the present invention. Specifically, a system or device equipped with a storage medium may be provided, on which a software program code for realizing the functions of any of the above embodiments is stored, and the computer (or CPU or MPU of the system or device) ) to read and execute the program code stored in the storage medium.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a timed task-based data increment static desensitization realization method and system, belongs to the technical field of data security, and aims to solve the technical problem of how to realize real-time static desensitization of incremental data, protect data privacy more safely and timely and realize real-time static desensitization of incremental data. The adopted technical scheme is as follows: the method specifically comprises the following steps: creating a timing task: deploying a timing task registration center, configuring a timing task executor and registering to the registration center, simultaneously creating the timing task, setting an execution period and task parameters of the timing task, and starting the timing task; incremental data screening, wherein incremental data are screened out regularly through timed tasks; and executing data desensitization: periodically calling an API interface for executing incremental data desensitization by a timed task to realize incremental desensitization. The system comprises a creation module, a screening module and a desensitization module.

Description

technical field [0001] The invention relates to the technical field of big data security, in particular to a method and system for implementing static desensitization of data increments based on timing tasks. Background technique [0002] According to the monitoring of the International Data Information (IDC) company, the amount of global data doubles approximately every two years. The arrival of big data has led a revolution, prompting the rapid development of big data and cloud service technology. In applications such as data mining, mining, and analysis, governments and enterprises have increasingly strong demands for big data security, and data security is playing an increasingly important role. Therefore, how to protect data privacy and sensitive data in a more secure and timely manner has become a challenge that the industry is increasingly concerned about. [0003] At present, the data static desensitization function of data security products can only desensitize exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/22G06F16/2455G06F16/23G06F9/48G06F16/25G06F16/28
Inventor 王哲张滨孙思清
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products