CN107729456A - Sensitive information search method, server and storage medium - Google Patents
Sensitive information search method, server and storage medium Download PDFInfo
- Publication number
- CN107729456A CN107729456A CN201710934492.5A CN201710934492A CN107729456A CN 107729456 A CN107729456 A CN 107729456A CN 201710934492 A CN201710934492 A CN 201710934492A CN 107729456 A CN107729456 A CN 107729456A
- Authority
- CN
- China
- Prior art keywords
- sensitive information
- metadata
- field
- field contents
- record
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2462—Approximate or statistical queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24564—Applying rules; Deductive queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Probability & Statistics with Applications (AREA)
- Medical Informatics (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of sensitive information search method, server and storage medium.It the described method comprises the following steps:In response to the database information of user configuration, according to the metadata in the database information reading database;Field contents in the metadata are traveled through, sensitive information judgement is carried out to the present field content traversed;To being judged as that the field contents of sensitive information record, and the field contents of record are shown.The present invention can automatically identify sensitive information, solve the problems, such as sensitive data human cost caused by artificial selected in traditional desensitization system by carrying out sensitive information judgement to field information.
Description
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of sensitive information search method, server and storage
Medium.
Background technology
Sensitive information retrieval refers to the deformation that some sensitive informations are carried out with data by the rule that desensitizes, and realizes privacy-sensitive
The reliably protecting of data.In the case where being related to client secure data or some commercial sensitive datas, system is not being violated
Under rule, True Data is transformed and test use is provided, the personal letter of such as identification card number, cell-phone number, card number, customer ID
Breath is required for carrying out sensitive information retrieval.
The desensitization system based on database on the market is mainly desensitized using following flow to data at present:
A) configuration needs the database to desensitize.Typing needs the operation system database to be desensitized i.e. in desensitization system
The information such as type, IP address, port, user name, password.
B) confirm to need the data to desensitize.That is system by the metadata information in operation system database, for example Instance Name,
The sample data of table name, field name and correlation is showed, and being chosen by hand by operation system director needs what is desensitized
Table or field, system preserve these configuration informations, are saved as a batch.
C) rule of selection desensitization;I.e. operation system administrative staff are for table or field selection desensitization different in batch
Rule, system preserve these configuration informations.
D) data are desensitized.I.e. operation system keeper clicks on desensitization button, starts batch desensitization.
But it can be seen from the above, sensitive information is by the way of manual identified at present, that is, the system that desensitizes is by business
Library name, table name, field name and related data in system database are presented in face of operation system director, by operation system
Director carries out manual screening.This retrieval mode can consume substantial amounts of human resources, cause less efficient.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill
Art.
The content of the invention
It is a primary object of the present invention to provide a kind of sensitive information search method, server and storage medium, it is intended to solve
Certainly in the prior art when being desensitized to data, the technical problem of a large amount of human resources can be consumed.
To achieve the above object, the present invention provides a kind of sensitive information search method, the described method comprises the following steps:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, carrying out sensitive information to the present field content traversed sentences
It is disconnected;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
Preferably, the metadata includes:Table name, table constraint, field name, field contents, field type and field length
Degree.
Preferably, the field contents in the metadata travel through, and the present field content traversed is entered
Row sensitive information judges, specifically includes:
Field contents in the metadata are traveled through, carrying out name successively to the present field content traversed sentences
Disconnected, contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined
Program judges.
Preferably, the field contents in the metadata travel through, and the present field content traversed is entered
Before row sensitive information judges, methods described also includes:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out
Stochastical sampling, and the metadata that stochastical sampling is obtained is as new metadata.
Preferably, the preset data amount is 300000.
Preferably, the described pair of field contents for being judged as sensitive information are recorded, and the field contents of record are carried out
After displaying, methods described also includes:
List is generated to the field contents of the record.
Preferably, the field contents to the record generate list, specifically include:
The field contents of the record are counted, list is generated according to statistical result.
In addition, to achieve the above object, the present invention also provides a kind of server, and the server includes:Memory, processing
Device and the sensitive information search program that can be run on the memory and on the processor is stored in, the sensitive information inspection
Suo Chengxu is arranged for carrying out the step of sensitive information search method as described above.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, described computer-readable
Sensitive information search program is stored with storage medium, as above institute is realized when the sensitive information search program is executed by processor
The step of sensitive information search method stated.
The present invention can automatically identify sensitive information, solve biography by carrying out sensitive information judgement to field information
Sensitive data human cost problem caused by artificial selected in system desensitization system.
Brief description of the drawings
Fig. 1 is the server architecture schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is the schematic flow sheet of the sensitive information search method of an embodiment of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Reference picture 1, Fig. 1 are the structural representation of the server for the hardware running environment that scheme of the embodiment of the present invention is related to.
As shown in figure 1, the server can include:Processor 1001, such as CPU, communication bus 1002, user interface
1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is used to realize the connection communication between these components.
User interface 1003 can include display screen (Display), input block such as button or touch-screen.Network interface 1004 is optional
Wireline interface, the wave point (such as WI-FI interfaces) that can include standard.Memory 1005 can be high-speed RAM memory,
Can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally may be used also
To be independently of the storage device of aforementioned processor 1001.
It will be understood by those skilled in the art that the structure shown in Fig. 1 does not form the restriction to server, can include
Than illustrating more or less parts, some parts or different parts arrangement are either combined.
As shown in figure 1, it can lead to as in a kind of memory 1005 of computer-readable storage medium including operating system, network
Believe module, Subscriber Interface Module SIM and sensitive information search program.
In the server shown in Fig. 1, network interface 1004 is mainly used in entering row data communication with outer net;User interface
1003 are mainly used in receiving the operational order of user's input;The server is called in memory 1005 by processor 1001 and deposited
The sensitive information search program of storage, and perform following operate:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, carrying out sensitive information to the present field content traversed sentences
It is disconnected;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform
Operate below:
Field contents in the metadata are traveled through, carrying out name successively to the present field content traversed sentences
Disconnected, contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined
Program judges.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform
Operate below:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out
Stochastical sampling, and the metadata that stochastical sampling is obtained is as new metadata.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform
Operate below:
List is generated to the field contents of the record.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform
Operate below:
The field contents of the record are counted, list is generated according to statistical result.
The present embodiment, by carrying out sensitive information judgement to field information, can be automatically identified quick by such scheme
Feel information, solve the problems, such as sensitive data human cost caused by artificial selected in traditional desensitization system.
Based on above-mentioned hardware configuration, sensitive information search method embodiment of the present invention is proposed.
Reference picture 2, Fig. 2 are the schematic flow sheet of sensitive information search method first embodiment of the present invention.
In the first embodiment, the sensitive information search method comprises the following steps:
S10:In response to the database information of user configuration, according to first number in the database information reading database
According to;
It should be noted that the database information includes:Type of database, IP address, port, user name, password etc.
Information, so, the database that needs are desensitized can determine that according to the database information.
It will be appreciated that the metadata may include:Table name, table constraint, field name, field contents, field type and
The data such as field length.
S20:Field contents in the metadata are traveled through, sensitive letter is carried out to the present field content traversed
Breath judges;
It should be noted that in order to prevent that data volume is excessive, in the present embodiment, before step S20, first number can determine whether
Whether the data volume of the non-NULL field contents in exceedes preset data amount;The number of non-NULL field contents in the metadata
When exceeding preset data amount according to amount, stochastical sampling is carried out to the metadata, and using the metadata that stochastical sampling obtains as new
Metadata.
Certainly, when the data volume of the non-NULL field contents in the metadata is not less than preset data amount, i.e., need not enter
Row stochastical sampling etc. operates, but directly performs step S20.
It will be appreciated that the preset data amount can be configured as needed, can be by the present count in the present embodiment
300000 are arranged to according to amount, certainly, may also be configured to other numerical value.
In the specific implementation, because the information such as name, contact method, address information, certificate information and organization are usual
For sensitive information, of course, it is also possible to have the information of custom rule, and or the information that is identified of self defining programm, be
It is easy to detect these information, in the present embodiment, the field contents in the metadata can be traveled through, to traversing
Present field content carry out successively name judgement (can be realized by the recognizer of name), contact method judge (can lead to
Area code, base number, the recognizer of phone number is crossed to realize), address information judges (can be by state, province, city, area, county etc.
Keyword is realized), certificate information judge that (can be realized by the rule of certificate number), organization judge that (unit can be passed through
The recognizer of title is realized), custom rule judge (can be realized by self-defined regular expression) and self-defined journey
Sequence judges (to write java codes by developer and be configured, program is using field data as input parameter, return
No sensitive data judged result).
S30:To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
It can be well understood the situation of sensitive information for ease of user, can be after step S30, also in the present embodiment
Including:List is generated to the field contents of the record.
Specifically, the field contents of the record can be counted, list, the system is generated according to statistical result
It may include the quantity and accounting of field contents in meter result.
The present embodiment can automatically identify sensitive information, solve by carrying out sensitive information judgement to field information
Sensitive data human cost problem caused by artificial selected in traditional desensitization system.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium, the computer-readable recording medium
On be stored with sensitive information search program, following operation is realized when the sensitive information search program is executed by processor:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, carrying out sensitive information to the present field content traversed sentences
It is disconnected;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
Further, following operation is also realized when the sensitive information search program is executed by processor:
Field contents in the metadata are traveled through, carrying out name successively to the present field content traversed sentences
Disconnected, contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined
Program judges.
Further, following operation is also realized when the sensitive information search program is executed by processor:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out
Stochastical sampling, and the metadata that stochastical sampling is obtained is as new metadata.
Further, following operation is also realized when the sensitive information search program is executed by processor:
List is generated to the field contents of the record.
Further, following operation is also realized when the sensitive information search program is executed by processor:
The field contents of the record are counted, list is generated according to statistical result.
The present embodiment, by carrying out sensitive information judgement to field information, can be automatically identified quick by such scheme
Feel information, solve the problems, such as sensitive data human cost caused by artificial selected in traditional desensitization system.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or system including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone,
Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (9)
1. a kind of sensitive information search method, it is characterised in that the described method comprises the following steps:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, sensitive information judgement is carried out to the present field content traversed;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
2. the method as described in claim 1, it is characterised in that the metadata includes:Table name, table constraint, field name, word
Section content, field type and field length.
3. the method as described in claim 1, it is characterised in that the field contents in the metadata travel through,
Sensitive information judgement is carried out to the present field content traversed, specifically included:
Field contents in the metadata are traveled through, the present field content traversed is carried out successively name judgement,
Contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined journey
Sequence judges.
4. the method as described in claim 1, it is characterised in that the field contents in the metadata travel through,
Before carrying out sensitive information judgement to the present field content traversed, methods described also includes:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out random
Sampling, and the metadata that stochastical sampling is obtained is as new metadata.
5. method as claimed in claim 4, it is characterised in that the preset data amount is 300000.
6. such as method according to any one of claims 1 to 5, it is characterised in that the described pair of field for being judged as sensitive information
Content is recorded, and after being shown to the field contents of record, methods described also includes:
List is generated to the field contents of the record.
7. method as claimed in claim 6, it is characterised in that the field contents to the record generate list,
Specifically include:
The field contents of the record are counted, list is generated according to statistical result.
8. a kind of server, it is characterised in that the server includes:Memory, processor and it is stored on the memory
And the sensitive information search program that can be run on the processor, the sensitive information search program are arranged for carrying out such as right
It is required that the step of sensitive information search method any one of 1 to 7.
9. a kind of computer-readable recording medium, it is characterised in that sensitive letter is stored with the computer-readable recording medium
Search program is ceased, is realized when the sensitive information search program is executed by processor as any one of claim 1 to 7
The step of sensitive information search method.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710934492.5A CN107729456A (en) | 2017-09-30 | 2017-09-30 | Sensitive information search method, server and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710934492.5A CN107729456A (en) | 2017-09-30 | 2017-09-30 | Sensitive information search method, server and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107729456A true CN107729456A (en) | 2018-02-23 |
Family
ID=61210048
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710934492.5A Pending CN107729456A (en) | 2017-09-30 | 2017-09-30 | Sensitive information search method, server and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107729456A (en) |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108536739A (en) * | 2018-03-07 | 2018-09-14 | 中国平安人寿保险股份有限公司 | The recognition methods of metadata sensitive information field, device, equipment and storage medium |
| CN109308258A (en) * | 2018-08-21 | 2019-02-05 | 中国平安人寿保险股份有限公司 | Construction method, device, computer equipment and storage medium of test data |
| CN109597823A (en) * | 2018-11-05 | 2019-04-09 | 中国平安财产保险股份有限公司 | Data source configuration method, device, computer equipment and storage medium |
| CN109829327A (en) * | 2018-12-15 | 2019-05-31 | 中国平安人寿保险股份有限公司 | Sensitive information processing method, device, electronic equipment and storage medium |
| CN110188568A (en) * | 2019-05-27 | 2019-08-30 | 深圳前海微众银行股份有限公司 | Confidential information identification method, device, device and computer-readable storage medium |
| CN110580416A (en) * | 2019-09-11 | 2019-12-17 | 国网浙江省电力有限公司信息通信分公司 | A method for automatic identification of sensitive data based on artificial intelligence |
| CN111079185A (en) * | 2019-12-20 | 2020-04-28 | 南京医康科技有限公司 | Database information processing method and device, storage medium and electronic equipment |
| CN111191282A (en) * | 2019-12-25 | 2020-05-22 | 苏宁云计算有限公司 | Sensitive data management method and system |
| CN111291044A (en) * | 2020-01-14 | 2020-06-16 | 中移(杭州)信息技术有限公司 | Sensitive data identification method, device, electronic device and storage medium |
| CN115221884A (en) * | 2022-09-15 | 2022-10-21 | 北京铀媒科技有限公司 | Specific person detection method, system, storage medium and terminal |
| CN115270167A (en) * | 2021-04-30 | 2022-11-01 | 中国移动通信集团有限公司 | Sensitive information retrieval method and device, electronic equipment and storage medium |
| CN116662377A (en) * | 2022-02-17 | 2023-08-29 | 北京鼎普科技股份有限公司 | Database content inspection method, equipment and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070294539A1 (en) * | 2006-01-27 | 2007-12-20 | Imperva, Inc. | Method and system for transparently encrypting sensitive information |
| CN103186637A (en) * | 2011-12-30 | 2013-07-03 | 中国移动通信集团广东有限公司 | Method and device for analyzing user behavior of BOSS database |
| CN104123370A (en) * | 2014-07-24 | 2014-10-29 | 杭州安恒信息技术有限公司 | Method and system for detecting sensitive information in database |
| CN104462451A (en) * | 2014-12-15 | 2015-03-25 | 中电长城网际系统应用有限公司 | Method and device for detecting database file sensitive content |
-
2017
- 2017-09-30 CN CN201710934492.5A patent/CN107729456A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070294539A1 (en) * | 2006-01-27 | 2007-12-20 | Imperva, Inc. | Method and system for transparently encrypting sensitive information |
| CN103186637A (en) * | 2011-12-30 | 2013-07-03 | 中国移动通信集团广东有限公司 | Method and device for analyzing user behavior of BOSS database |
| CN104123370A (en) * | 2014-07-24 | 2014-10-29 | 杭州安恒信息技术有限公司 | Method and system for detecting sensitive information in database |
| CN104462451A (en) * | 2014-12-15 | 2015-03-25 | 中电长城网际系统应用有限公司 | Method and device for detecting database file sensitive content |
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108536739B (en) * | 2018-03-07 | 2021-10-12 | 中国平安人寿保险股份有限公司 | Metadata sensitive information field identification method, device, equipment and storage medium |
| CN108536739A (en) * | 2018-03-07 | 2018-09-14 | 中国平安人寿保险股份有限公司 | The recognition methods of metadata sensitive information field, device, equipment and storage medium |
| CN109308258A (en) * | 2018-08-21 | 2019-02-05 | 中国平安人寿保险股份有限公司 | Construction method, device, computer equipment and storage medium of test data |
| CN109597823A (en) * | 2018-11-05 | 2019-04-09 | 中国平安财产保险股份有限公司 | Data source configuration method, device, computer equipment and storage medium |
| CN109597823B (en) * | 2018-11-05 | 2023-08-29 | 中国平安财产保险股份有限公司 | Data source configuration method, device, computer equipment and storage medium |
| CN109829327A (en) * | 2018-12-15 | 2019-05-31 | 中国平安人寿保险股份有限公司 | Sensitive information processing method, device, electronic equipment and storage medium |
| CN109829327B (en) * | 2018-12-15 | 2024-11-12 | 中国平安人寿保险股份有限公司 | Sensitive information processing method, device, electronic device and storage medium |
| CN110188568A (en) * | 2019-05-27 | 2019-08-30 | 深圳前海微众银行股份有限公司 | Confidential information identification method, device, device and computer-readable storage medium |
| CN110580416A (en) * | 2019-09-11 | 2019-12-17 | 国网浙江省电力有限公司信息通信分公司 | A method for automatic identification of sensitive data based on artificial intelligence |
| CN111079185A (en) * | 2019-12-20 | 2020-04-28 | 南京医康科技有限公司 | Database information processing method and device, storage medium and electronic equipment |
| CN111191282A (en) * | 2019-12-25 | 2020-05-22 | 苏宁云计算有限公司 | Sensitive data management method and system |
| CN111291044A (en) * | 2020-01-14 | 2020-06-16 | 中移(杭州)信息技术有限公司 | Sensitive data identification method, device, electronic device and storage medium |
| CN115270167A (en) * | 2021-04-30 | 2022-11-01 | 中国移动通信集团有限公司 | Sensitive information retrieval method and device, electronic equipment and storage medium |
| CN116662377A (en) * | 2022-02-17 | 2023-08-29 | 北京鼎普科技股份有限公司 | Database content inspection method, equipment and storage medium |
| CN115221884A (en) * | 2022-09-15 | 2022-10-21 | 北京铀媒科技有限公司 | Specific person detection method, system, storage medium and terminal |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107729456A (en) | Sensitive information search method, server and storage medium | |
| CN112529575B (en) | Risk early warning method, equipment, storage medium and device | |
| US8122371B1 (en) | Criteria-based structured ratings | |
| CN103077344A (en) | Terminal and method for providing risk of application using the same | |
| JP2015060598A (en) | Mobile application daily user engagement scores and user profiles | |
| WO2019084922A1 (en) | Information processing method and system, server, terminal and computer storage medium | |
| CN112541329B (en) | Resume creation method, device, and electronic device | |
| JP2022067087A (en) | Method, computer program product, and computer system for protecting sensitive information in document (masking sensitive information in document) | |
| CN114492360B (en) | Authorization compliance management method and device | |
| CN110389941A (en) | Database method of calibration, device, equipment and storage medium | |
| CN106910135A (en) | User recommends method and device | |
| CN112506981A (en) | Online training service pushing method and device | |
| JP2008243007A (en) | Information processing apparatus, information processing method, and information processing program | |
| CN109727056B (en) | Financial institution recommendation method, device, storage medium and device | |
| CN114066513A (en) | A method and apparatus for classifying users | |
| CN110224851A (en) | Merging method, device, computer equipment and the computer storage medium of account information | |
| CN112506765A (en) | Software testing method, device, equipment and storage medium | |
| CN109636378B (en) | Account identification method and device and electronic equipment | |
| CN114140152B (en) | A cloud platform customer management system and method | |
| CN109819024A (en) | Information-pushing method, device, storage medium and terminal based on data analysis | |
| CN110765118B (en) | Data revision method, revision device and readable storage medium | |
| CN109003117A (en) | Generation method, device and the computer readable storage medium of questionnaire | |
| CN113032494A (en) | Data table classification and model training method, device, equipment and medium | |
| US10248638B2 (en) | Creating forms for hierarchical organizations | |
| CN114417152B (en) | Information recommendation method, device, electronic device and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180223 |
|
| WD01 | Invention patent application deemed withdrawn after publication |