Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting sensitive data and private data

A technology for private data and sensitive data, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as lack of data protection, incorrect protection methods, lack of consistency in protection methods, etc., to meet access requirements, Consistent Conservation Mode, Reduced Missing Effects

Pending Publication Date: 2021-06-22
北京神州数字科技有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The protection of existing sensitive data and personal privacy data depends on the implementation of each specific data collection system and data application system. The lack of unified management and planning, and the lack of consistency in protection methods can easily lead to the lack of data protection. Protection methods Incorrect;
[0005] 2. The existing protection of sensitive data and private data lacks an access control mechanism;
[0006] 3. In the existing sensitive data and privacy data protection methods, only simple data desensitization is carried out, which is difficult to meet the access requirements of different system data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting sensitive data and private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] Such as figure 1 As shown, a method for protecting sensitive data and private data, the method includes:

[0045] Configure protection rules;

[0046] Register sensitive / private data in accordance with the protection rules described;

[0047] The data requester requests the permission of the sensitive / private data fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting sensitive data and private data. The method comprises the following steps: configuring a protection rule; registering sensitive / private data; the data requester requests the permission of sensitive / private data to the control center; receiving a sensitive / private data permission request, sensitive / private data access permission information is created, and the sensitive / private data permission returns to the data requester; the privacy and sensitive data storage performs desensitization, mapping, encryption or plaintext processing on the sensitive / privacy data; and the privacy and sensitive data storage returns the processed sensitive / privacy data to the data requester. A unified management and planning method is provided for sensitive data and personal privacy data, protection modes are consistent, data protection missing is reduced, and a permission control mechanism for sensitive data and privacy data protection access is provided; and the access requirements of different system data are met.

Description

technical field [0001] The invention belongs to the field of data protection, in particular to a method for protecting sensitive data and private data. Background technique [0002] In recent years, the basic strategic resource attributes of data have been further highlighted. Data has become the supporting resource and tool of the national government and various commercial organizations, and the application of data has fully penetrated our lives. All kinds of comprehensive information are entered into different storage locations for application. At the same time, the overuse and leakage of sensitive data and violations of personal privacy data are becoming more and more serious, so the protection of private data and sensitive data has gradually become the focus. [0003] Problems with existing technology: [0004] 1. The protection of existing sensitive data and personal privacy data depends on the implementation of each specific data collection system and data applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6245G06F21/6254G06F21/602
Inventor 王磊
Owner 北京神州数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products