Data encryption method and device for different sensitive fields

A data encryption and sensitive technology, applied in the fields of digital data protection, electrical digital data processing, digital data processing components, etc., can solve the problems of insufficient encryption of data segments, easily cracked passwords, and poor data confidentiality. Effects of data leakage

Pending Publication Date: 2022-03-04
上海健交科技服务有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of big data and data analysis technology, large and medium-sized enterprises generally involve important sensitive data. Usually, the confidentiality of these data is relatively poor. Once the data is leaked, it may bring great harm to the company or individual. Negative impact. In the existing technology, although the data is encrypted, it is usually a relatively simple encryption method, and the password is easy to be cracked, which cannot fundamentally solve the problem of leakage
[0003] Not only that, many existing encryption methods usually encrypt the data uniformly. This encryption method does not divide the privacy level of the data well, which will cause the data segments that do not need to be encrypted to be over-encrypted, and the data that needs to be encrypted will be over-encrypted. The degree of segment encryption is not enough, and the privacy of data cannot be encrypted and protected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device for different sensitive fields

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with specific embodiment, further illustrate the present invention. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0039] Embodiments of the present invention relate to a data encryption method for different sensitive fields, please refer to figure 1 ,include:

[0040] Step (1): Create a local sensitive keyword database, and mark encryption levels for sensitive words in the local sensitive keyword database.

[0041] In the step (1), the sensitive words in the local sensitive keyword database are marked with an encryption level, specifical...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data encryption method and device for different sensitive fields, and the method comprises the steps: (1) creating a local sensitive keyword library, and marking encryption levels for sensitive words in the local sensitive keyword library; step (2), constructing different secret keys for sensitive words with different encryption levels in the local sensitive keyword library; step (3): receiving to-be-encrypted data, and classifying encryption levels of each field content of the to-be-encrypted data through the trained semantic model to obtain a classification result; and step (4), according to the classification result, encrypting the to-be-encrypted data through the different keys. According to the invention, data can be effectively encrypted, and data privacy leakage is prevented.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a data encryption method and device for different sensitive fields. Background technique [0002] With the continuous development of big data and data analysis technology, large and medium-sized enterprises generally involve important sensitive data. Usually, the confidentiality of these data is relatively poor. Once the data is leaked, it may bring great harm to the company or individual. Negative impact. In the prior art, although the data is encrypted, it is usually a relatively simple encryption method, and the password is easy to be cracked, which cannot fundamentally solve the problem of leakage. [0003] Not only that, many existing encryption methods usually encrypt the data uniformly. This encryption method does not divide the privacy level of the data well, which will cause the data segments that do not need to be encrypted to be over-encrypted, and the data tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F7/58G06F16/906
CPCG06F21/602G06F21/6245G06F7/588G06F16/906
Inventor 不公告发明人
Owner 上海健交科技服务有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products