[go: up one dir, main page]

CN107729456A - Sensitive information search method, server and storage medium - Google Patents

Sensitive information search method, server and storage medium Download PDF

Info

Publication number
CN107729456A
CN107729456A CN201710934492.5A CN201710934492A CN107729456A CN 107729456 A CN107729456 A CN 107729456A CN 201710934492 A CN201710934492 A CN 201710934492A CN 107729456 A CN107729456 A CN 107729456A
Authority
CN
China
Prior art keywords
sensitive information
metadata
field
field contents
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710934492.5A
Other languages
Chinese (zh)
Inventor
王黎
李骏宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Hansi Information Technology LLC
Original Assignee
Wuhan Hansi Information Technology LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Hansi Information Technology LLC filed Critical Wuhan Hansi Information Technology LLC
Priority to CN201710934492.5A priority Critical patent/CN107729456A/en
Publication of CN107729456A publication Critical patent/CN107729456A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2462Approximate or statistical queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Probability & Statistics with Applications (AREA)
  • Medical Informatics (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of sensitive information search method, server and storage medium.It the described method comprises the following steps:In response to the database information of user configuration, according to the metadata in the database information reading database;Field contents in the metadata are traveled through, sensitive information judgement is carried out to the present field content traversed;To being judged as that the field contents of sensitive information record, and the field contents of record are shown.The present invention can automatically identify sensitive information, solve the problems, such as sensitive data human cost caused by artificial selected in traditional desensitization system by carrying out sensitive information judgement to field information.

Description

Sensitive information search method, server and storage medium
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of sensitive information search method, server and storage Medium.
Background technology
Sensitive information retrieval refers to the deformation that some sensitive informations are carried out with data by the rule that desensitizes, and realizes privacy-sensitive The reliably protecting of data.In the case where being related to client secure data or some commercial sensitive datas, system is not being violated Under rule, True Data is transformed and test use is provided, the personal letter of such as identification card number, cell-phone number, card number, customer ID Breath is required for carrying out sensitive information retrieval.
The desensitization system based on database on the market is mainly desensitized using following flow to data at present:
A) configuration needs the database to desensitize.Typing needs the operation system database to be desensitized i.e. in desensitization system The information such as type, IP address, port, user name, password.
B) confirm to need the data to desensitize.That is system by the metadata information in operation system database, for example Instance Name, The sample data of table name, field name and correlation is showed, and being chosen by hand by operation system director needs what is desensitized Table or field, system preserve these configuration informations, are saved as a batch.
C) rule of selection desensitization;I.e. operation system administrative staff are for table or field selection desensitization different in batch Rule, system preserve these configuration informations.
D) data are desensitized.I.e. operation system keeper clicks on desensitization button, starts batch desensitization.
But it can be seen from the above, sensitive information is by the way of manual identified at present, that is, the system that desensitizes is by business Library name, table name, field name and related data in system database are presented in face of operation system director, by operation system Director carries out manual screening.This retrieval mode can consume substantial amounts of human resources, cause less efficient.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill Art.
The content of the invention
It is a primary object of the present invention to provide a kind of sensitive information search method, server and storage medium, it is intended to solve Certainly in the prior art when being desensitized to data, the technical problem of a large amount of human resources can be consumed.
To achieve the above object, the present invention provides a kind of sensitive information search method, the described method comprises the following steps:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, carrying out sensitive information to the present field content traversed sentences It is disconnected;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
Preferably, the metadata includes:Table name, table constraint, field name, field contents, field type and field length Degree.
Preferably, the field contents in the metadata travel through, and the present field content traversed is entered Row sensitive information judges, specifically includes:
Field contents in the metadata are traveled through, carrying out name successively to the present field content traversed sentences Disconnected, contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined Program judges.
Preferably, the field contents in the metadata travel through, and the present field content traversed is entered Before row sensitive information judges, methods described also includes:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out Stochastical sampling, and the metadata that stochastical sampling is obtained is as new metadata.
Preferably, the preset data amount is 300000.
Preferably, the described pair of field contents for being judged as sensitive information are recorded, and the field contents of record are carried out After displaying, methods described also includes:
List is generated to the field contents of the record.
Preferably, the field contents to the record generate list, specifically include:
The field contents of the record are counted, list is generated according to statistical result.
In addition, to achieve the above object, the present invention also provides a kind of server, and the server includes:Memory, processing Device and the sensitive information search program that can be run on the memory and on the processor is stored in, the sensitive information inspection Suo Chengxu is arranged for carrying out the step of sensitive information search method as described above.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, described computer-readable Sensitive information search program is stored with storage medium, as above institute is realized when the sensitive information search program is executed by processor The step of sensitive information search method stated.
The present invention can automatically identify sensitive information, solve biography by carrying out sensitive information judgement to field information Sensitive data human cost problem caused by artificial selected in system desensitization system.
Brief description of the drawings
Fig. 1 is the server architecture schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is the schematic flow sheet of the sensitive information search method of an embodiment of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Reference picture 1, Fig. 1 are the structural representation of the server for the hardware running environment that scheme of the embodiment of the present invention is related to.
As shown in figure 1, the server can include:Processor 1001, such as CPU, communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is used to realize the connection communication between these components. User interface 1003 can include display screen (Display), input block such as button or touch-screen.Network interface 1004 is optional Wireline interface, the wave point (such as WI-FI interfaces) that can include standard.Memory 1005 can be high-speed RAM memory, Can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally may be used also To be independently of the storage device of aforementioned processor 1001.
It will be understood by those skilled in the art that the structure shown in Fig. 1 does not form the restriction to server, can include Than illustrating more or less parts, some parts or different parts arrangement are either combined.
As shown in figure 1, it can lead to as in a kind of memory 1005 of computer-readable storage medium including operating system, network Believe module, Subscriber Interface Module SIM and sensitive information search program.
In the server shown in Fig. 1, network interface 1004 is mainly used in entering row data communication with outer net;User interface 1003 are mainly used in receiving the operational order of user's input;The server is called in memory 1005 by processor 1001 and deposited The sensitive information search program of storage, and perform following operate:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, carrying out sensitive information to the present field content traversed sentences It is disconnected;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform Operate below:
Field contents in the metadata are traveled through, carrying out name successively to the present field content traversed sentences Disconnected, contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined Program judges.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform Operate below:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out Stochastical sampling, and the metadata that stochastical sampling is obtained is as new metadata.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform Operate below:
List is generated to the field contents of the record.
Further, processor 1001 can call the sensitive information search program stored in memory 1005, also perform Operate below:
The field contents of the record are counted, list is generated according to statistical result.
The present embodiment, by carrying out sensitive information judgement to field information, can be automatically identified quick by such scheme Feel information, solve the problems, such as sensitive data human cost caused by artificial selected in traditional desensitization system.
Based on above-mentioned hardware configuration, sensitive information search method embodiment of the present invention is proposed.
Reference picture 2, Fig. 2 are the schematic flow sheet of sensitive information search method first embodiment of the present invention.
In the first embodiment, the sensitive information search method comprises the following steps:
S10:In response to the database information of user configuration, according to first number in the database information reading database According to;
It should be noted that the database information includes:Type of database, IP address, port, user name, password etc. Information, so, the database that needs are desensitized can determine that according to the database information.
It will be appreciated that the metadata may include:Table name, table constraint, field name, field contents, field type and The data such as field length.
S20:Field contents in the metadata are traveled through, sensitive letter is carried out to the present field content traversed Breath judges;
It should be noted that in order to prevent that data volume is excessive, in the present embodiment, before step S20, first number can determine whether Whether the data volume of the non-NULL field contents in exceedes preset data amount;The number of non-NULL field contents in the metadata When exceeding preset data amount according to amount, stochastical sampling is carried out to the metadata, and using the metadata that stochastical sampling obtains as new Metadata.
Certainly, when the data volume of the non-NULL field contents in the metadata is not less than preset data amount, i.e., need not enter Row stochastical sampling etc. operates, but directly performs step S20.
It will be appreciated that the preset data amount can be configured as needed, can be by the present count in the present embodiment 300000 are arranged to according to amount, certainly, may also be configured to other numerical value.
In the specific implementation, because the information such as name, contact method, address information, certificate information and organization are usual For sensitive information, of course, it is also possible to have the information of custom rule, and or the information that is identified of self defining programm, be It is easy to detect these information, in the present embodiment, the field contents in the metadata can be traveled through, to traversing Present field content carry out successively name judgement (can be realized by the recognizer of name), contact method judge (can lead to Area code, base number, the recognizer of phone number is crossed to realize), address information judges (can be by state, province, city, area, county etc. Keyword is realized), certificate information judge that (can be realized by the rule of certificate number), organization judge that (unit can be passed through The recognizer of title is realized), custom rule judge (can be realized by self-defined regular expression) and self-defined journey Sequence judges (to write java codes by developer and be configured, program is using field data as input parameter, return No sensitive data judged result).
S30:To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
It can be well understood the situation of sensitive information for ease of user, can be after step S30, also in the present embodiment Including:List is generated to the field contents of the record.
Specifically, the field contents of the record can be counted, list, the system is generated according to statistical result It may include the quantity and accounting of field contents in meter result.
The present embodiment can automatically identify sensitive information, solve by carrying out sensitive information judgement to field information Sensitive data human cost problem caused by artificial selected in traditional desensitization system.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium, the computer-readable recording medium On be stored with sensitive information search program, following operation is realized when the sensitive information search program is executed by processor:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, carrying out sensitive information to the present field content traversed sentences It is disconnected;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
Further, following operation is also realized when the sensitive information search program is executed by processor:
Field contents in the metadata are traveled through, carrying out name successively to the present field content traversed sentences Disconnected, contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined Program judges.
Further, following operation is also realized when the sensitive information search program is executed by processor:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out Stochastical sampling, and the metadata that stochastical sampling is obtained is as new metadata.
Further, following operation is also realized when the sensitive information search program is executed by processor:
List is generated to the field contents of the record.
Further, following operation is also realized when the sensitive information search program is executed by processor:
The field contents of the record are counted, list is generated according to statistical result.
The present embodiment, by carrying out sensitive information judgement to field information, can be automatically identified quick by such scheme Feel information, solve the problems, such as sensitive data human cost caused by artificial selected in traditional desensitization system.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (9)

1. a kind of sensitive information search method, it is characterised in that the described method comprises the following steps:
In response to the database information of user configuration, according to the metadata in the database information reading database;
Field contents in the metadata are traveled through, sensitive information judgement is carried out to the present field content traversed;
To being judged as that the field contents of sensitive information record, and the field contents of record are shown.
2. the method as described in claim 1, it is characterised in that the metadata includes:Table name, table constraint, field name, word Section content, field type and field length.
3. the method as described in claim 1, it is characterised in that the field contents in the metadata travel through, Sensitive information judgement is carried out to the present field content traversed, specifically included:
Field contents in the metadata are traveled through, the present field content traversed is carried out successively name judgement, Contact method judges, address information judges, certificate information judges, organization judges, custom rule judges and self-defined journey Sequence judges.
4. the method as described in claim 1, it is characterised in that the field contents in the metadata travel through, Before carrying out sensitive information judgement to the present field content traversed, methods described also includes:
Judge whether the data volume of the non-NULL field contents in the metadata exceedes preset data amount;
When the data volume of non-NULL field contents in the metadata exceedes preset data amount, the metadata is carried out random Sampling, and the metadata that stochastical sampling is obtained is as new metadata.
5. method as claimed in claim 4, it is characterised in that the preset data amount is 300000.
6. such as method according to any one of claims 1 to 5, it is characterised in that the described pair of field for being judged as sensitive information Content is recorded, and after being shown to the field contents of record, methods described also includes:
List is generated to the field contents of the record.
7. method as claimed in claim 6, it is characterised in that the field contents to the record generate list, Specifically include:
The field contents of the record are counted, list is generated according to statistical result.
8. a kind of server, it is characterised in that the server includes:Memory, processor and it is stored on the memory And the sensitive information search program that can be run on the processor, the sensitive information search program are arranged for carrying out such as right It is required that the step of sensitive information search method any one of 1 to 7.
9. a kind of computer-readable recording medium, it is characterised in that sensitive letter is stored with the computer-readable recording medium Search program is ceased, is realized when the sensitive information search program is executed by processor as any one of claim 1 to 7 The step of sensitive information search method.
CN201710934492.5A 2017-09-30 2017-09-30 Sensitive information search method, server and storage medium Pending CN107729456A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710934492.5A CN107729456A (en) 2017-09-30 2017-09-30 Sensitive information search method, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710934492.5A CN107729456A (en) 2017-09-30 2017-09-30 Sensitive information search method, server and storage medium

Publications (1)

Publication Number Publication Date
CN107729456A true CN107729456A (en) 2018-02-23

Family

ID=61210048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710934492.5A Pending CN107729456A (en) 2017-09-30 2017-09-30 Sensitive information search method, server and storage medium

Country Status (1)

Country Link
CN (1) CN107729456A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536739A (en) * 2018-03-07 2018-09-14 中国平安人寿保险股份有限公司 The recognition methods of metadata sensitive information field, device, equipment and storage medium
CN109308258A (en) * 2018-08-21 2019-02-05 中国平安人寿保险股份有限公司 Construction method, device, computer equipment and storage medium of test data
CN109597823A (en) * 2018-11-05 2019-04-09 中国平安财产保险股份有限公司 Data source configuration method, device, computer equipment and storage medium
CN109829327A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Sensitive information processing method, device, electronic equipment and storage medium
CN110188568A (en) * 2019-05-27 2019-08-30 深圳前海微众银行股份有限公司 Confidential information identification method, device, device and computer-readable storage medium
CN110580416A (en) * 2019-09-11 2019-12-17 国网浙江省电力有限公司信息通信分公司 A method for automatic identification of sensitive data based on artificial intelligence
CN111079185A (en) * 2019-12-20 2020-04-28 南京医康科技有限公司 Database information processing method and device, storage medium and electronic equipment
CN111191282A (en) * 2019-12-25 2020-05-22 苏宁云计算有限公司 Sensitive data management method and system
CN111291044A (en) * 2020-01-14 2020-06-16 中移(杭州)信息技术有限公司 Sensitive data identification method, device, electronic device and storage medium
CN115221884A (en) * 2022-09-15 2022-10-21 北京铀媒科技有限公司 Specific person detection method, system, storage medium and terminal
CN115270167A (en) * 2021-04-30 2022-11-01 中国移动通信集团有限公司 Sensitive information retrieval method and device, electronic equipment and storage medium
CN116662377A (en) * 2022-02-17 2023-08-29 北京鼎普科技股份有限公司 Database content inspection method, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070294539A1 (en) * 2006-01-27 2007-12-20 Imperva, Inc. Method and system for transparently encrypting sensitive information
CN103186637A (en) * 2011-12-30 2013-07-03 中国移动通信集团广东有限公司 Method and device for analyzing user behavior of BOSS database
CN104123370A (en) * 2014-07-24 2014-10-29 杭州安恒信息技术有限公司 Method and system for detecting sensitive information in database
CN104462451A (en) * 2014-12-15 2015-03-25 中电长城网际系统应用有限公司 Method and device for detecting database file sensitive content

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070294539A1 (en) * 2006-01-27 2007-12-20 Imperva, Inc. Method and system for transparently encrypting sensitive information
CN103186637A (en) * 2011-12-30 2013-07-03 中国移动通信集团广东有限公司 Method and device for analyzing user behavior of BOSS database
CN104123370A (en) * 2014-07-24 2014-10-29 杭州安恒信息技术有限公司 Method and system for detecting sensitive information in database
CN104462451A (en) * 2014-12-15 2015-03-25 中电长城网际系统应用有限公司 Method and device for detecting database file sensitive content

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536739B (en) * 2018-03-07 2021-10-12 中国平安人寿保险股份有限公司 Metadata sensitive information field identification method, device, equipment and storage medium
CN108536739A (en) * 2018-03-07 2018-09-14 中国平安人寿保险股份有限公司 The recognition methods of metadata sensitive information field, device, equipment and storage medium
CN109308258A (en) * 2018-08-21 2019-02-05 中国平安人寿保险股份有限公司 Construction method, device, computer equipment and storage medium of test data
CN109597823A (en) * 2018-11-05 2019-04-09 中国平安财产保险股份有限公司 Data source configuration method, device, computer equipment and storage medium
CN109597823B (en) * 2018-11-05 2023-08-29 中国平安财产保险股份有限公司 Data source configuration method, device, computer equipment and storage medium
CN109829327A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Sensitive information processing method, device, electronic equipment and storage medium
CN109829327B (en) * 2018-12-15 2024-11-12 中国平安人寿保险股份有限公司 Sensitive information processing method, device, electronic device and storage medium
CN110188568A (en) * 2019-05-27 2019-08-30 深圳前海微众银行股份有限公司 Confidential information identification method, device, device and computer-readable storage medium
CN110580416A (en) * 2019-09-11 2019-12-17 国网浙江省电力有限公司信息通信分公司 A method for automatic identification of sensitive data based on artificial intelligence
CN111079185A (en) * 2019-12-20 2020-04-28 南京医康科技有限公司 Database information processing method and device, storage medium and electronic equipment
CN111191282A (en) * 2019-12-25 2020-05-22 苏宁云计算有限公司 Sensitive data management method and system
CN111291044A (en) * 2020-01-14 2020-06-16 中移(杭州)信息技术有限公司 Sensitive data identification method, device, electronic device and storage medium
CN115270167A (en) * 2021-04-30 2022-11-01 中国移动通信集团有限公司 Sensitive information retrieval method and device, electronic equipment and storage medium
CN116662377A (en) * 2022-02-17 2023-08-29 北京鼎普科技股份有限公司 Database content inspection method, equipment and storage medium
CN115221884A (en) * 2022-09-15 2022-10-21 北京铀媒科技有限公司 Specific person detection method, system, storage medium and terminal

Similar Documents

Publication Publication Date Title
CN107729456A (en) Sensitive information search method, server and storage medium
CN112529575B (en) Risk early warning method, equipment, storage medium and device
US8122371B1 (en) Criteria-based structured ratings
CN103077344A (en) Terminal and method for providing risk of application using the same
JP2015060598A (en) Mobile application daily user engagement scores and user profiles
WO2019084922A1 (en) Information processing method and system, server, terminal and computer storage medium
CN112541329B (en) Resume creation method, device, and electronic device
JP2022067087A (en) Method, computer program product, and computer system for protecting sensitive information in document (masking sensitive information in document)
CN114492360B (en) Authorization compliance management method and device
CN110389941A (en) Database method of calibration, device, equipment and storage medium
CN106910135A (en) User recommends method and device
CN112506981A (en) Online training service pushing method and device
JP2008243007A (en) Information processing apparatus, information processing method, and information processing program
CN109727056B (en) Financial institution recommendation method, device, storage medium and device
CN114066513A (en) A method and apparatus for classifying users
CN110224851A (en) Merging method, device, computer equipment and the computer storage medium of account information
CN112506765A (en) Software testing method, device, equipment and storage medium
CN109636378B (en) Account identification method and device and electronic equipment
CN114140152B (en) A cloud platform customer management system and method
CN109819024A (en) Information-pushing method, device, storage medium and terminal based on data analysis
CN110765118B (en) Data revision method, revision device and readable storage medium
CN109003117A (en) Generation method, device and the computer readable storage medium of questionnaire
CN113032494A (en) Data table classification and model training method, device, equipment and medium
US10248638B2 (en) Creating forms for hierarchical organizations
CN114417152B (en) Information recommendation method, device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180223

WD01 Invention patent application deemed withdrawn after publication