Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fuzzification device and method of sensitive data

A sensitive data, fuzzing technology, applied in the field of data processing, can solve problems such as leaking enterprises, achieve the effect of preventing leakage and retaining normal operation

Inactive Publication Date: 2016-05-25
亿阳安全技术有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the access result data is sensitive data, such as personnel information, customer information, financial data, etc., the leakage of these data will bring unpredictable risks to the enterprise, so how to control and manage these sensitive data downloaded from the server is in the A Very Important Problem Facing Enterprise Information Management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzification device and method of sensitive data
  • Fuzzification device and method of sensitive data
  • Fuzzification device and method of sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The embodiment of the present invention provides a sensitive data obfuscation device as an auxiliary accessory for the data demand application of the client that can access the server where the sensitive data resides, such as figure 2 The shown device includes a data acquisition module M101, a data analysis module M102, a data processing module M103 and a data response module M104.

[0031] The data acquisition module M101 is used to obtain the return data requested from the server by the data demand application, and pass it to the data analysis module. The returned data requested from the server is directly used by the application program, which may cause sensitive data leakage, which may contain important information related to the company's business secrets. Therefore, the device obtains these data through data collection, capture, etc., and prepares for processing to eliminate data sensitivity, and transmits them to the data analysis module M102.

[0032] The data...

Embodiment 2

[0038] Such as image 3 As shown, the data analysis module M102 can further include a sensitive data feature matching strategy formulation and management unit M1021, which is used to formulate and manage sensitive data feature matching strategies; The data transmitted by the data acquisition module M101 is matched, and the sensitive data matching the characteristics are found, and then transmitted to the data processing module M103.

Embodiment 3

[0040] Such as Figure 4 As shown, the data processing module M103 may further include a sensitive data obfuscation strategy formulation and management unit M1031, which is used to formulate and manage a sensitive data obfuscation strategy suitable for the sensitive data feature matching strategy formulated by the data analysis module M102; The sensitive data obfuscation processing unit M1032 is used to perform fuzzy processing on the sensitive data transmitted from the data analysis module M102 according to the sensitive data obfuscation strategy, obtain fuzzy sensitive data, and transmit it to the data response module M104.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fuzzification device of sensitive data. The device is used as the auxiliary accessory of the data demand application of a client which can access the server in which the sensitive data is located. The device comprises that a data obtaining module is used for obtaining the return data from a data demander or the data demand application; the return data is the data obtained through requesting to the server for accessing by the data obtaining module; a data analyzing module is used for making and managing a sensitive data feature matching strategy, matching the data transmitted from the data obtaining module according to the sensitive data feature matching strategy and finding out the sensitive data fitting with features; a data processing module is used for making and managing a sensitive data fuzzification strategy fitting with the sensitive data feature matching strategy made by the data analyzing module, carrying out fuzzification processing to the sensitive data transmitted from the data analyzing module according to the sensitive data fuzzification strategy, thus obtaining fuzzified non-sensitive data; and a data response module is used for returning the fuzzified non-sensitive data to the data demander or the data demand application. The invention also discloses a fuzzification method of the sensitive data.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a sensitive data obfuscation device and method thereof. Background technique [0002] Enterprises have a lot of data including information about customers' personal privacy or business value, which we call sensitive data. With the advancement of enterprise informatization, this information is stored in various servers of the enterprise, and will be queried and used in a large number in various service systems and information management systems. If it is not controlled and managed, there will be leakage of sensitive data. risks and pitfalls. Therefore, it is an urgent need to try to minimize the risks and hidden dangers caused by the leakage of sensitive data. [0003] General information management system, including server and client. There are various data stored in the server, and the application program connected to the server is installed on the client. We call it a data dem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 付芖钧
Owner 亿阳安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products