Sensitive data identification method and device, equipment and medium

A technology of sensitive data and identification methods, applied in the fields of digital data protection, electrical digital data processing, computer security devices, etc., can solve problems such as data acquisition, and achieve the effect of improving a good experience

Pending Publication Date: 2021-06-29
中移动信息技术有限公司 +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, it is impossible to dynamically identify sensitive data according to the purpose of user acquisition of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data identification method and device, equipment and medium
  • Sensitive data identification method and device, equipment and medium
  • Sensitive data identification method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0045] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensitive data identification method and device, equipment and a medium. The method comprises: obtaining a file scanning request of a user for a target file; analyzing the file scanning request to obtain scene information and scanning information; based on the scanning information, determining a first sensitive parameter and a second sensitive parameter corresponding to each type of to-be-confirmed data; for each type of to-be-confirmed data, calculating sensitivity corresponding to the to-be-confirmed data based on the first sensitive parameter and a second sensitive parameter corresponding to the to-be-confirmed data; and for each type of to-be-confirmed data, if the sensitivity corresponding to the to-be-confirmed data is less than a preset target sensitivity threshold, determining that the to-be-confirmed data is sensitive data, the target sensitivity threshold being a threshold associated with the scene information and corresponding to the to-be-confirmed data. According to the embodiment of the invention, personalized sensitive data identification can be carried out on the data according to the application scene requirements of the user.

Description

technical field [0001] The present invention relates to the field of data services, in particular to a sensitive data identification method, device, equipment and medium. Background technique [0002] With the development of the business support system, the security protection of its business operation data is becoming more and more important, so data desensitization protection has become the top priority of the current security work. [0003] The current sensitive data identification method is: pre-specified. For example, if the user specifies the ID card information as sensitive information, when the ID card information appears in the document, it will be identified as sensitive data and desensitized. [0004] In the current desensitization method, sensitive data is fixed. However, different users have different needs for sensitive data. In the prior art, it is impossible to dynamically identify sensitive data according to different purposes for users to obtain data. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 王茜敖锦蓉代建东丁雪莲
Owner 中移动信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products