Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive information identification method and device, electronic equipment and storage medium

A sensitive information identification and sensitive technology, applied in the field of data processing, can solve problems such as unrecognizable

Pending Publication Date: 2019-09-06
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the identification of sensitive information can only be identified for a certain type of sensitive information, such as the identification of phone numbers, etc., but for fields containing multiple information, such as a certain type of sensitive information and non-sensitive information or composite types Sensitive information cannot be identified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information identification method and device, electronic equipment and storage medium
  • Sensitive information identification method and device, electronic equipment and storage medium
  • Sensitive information identification method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a flow chart of the sensitive information identification method provided by Embodiment 1 of the present invention. The method is applied to an electronic device, and the electronic device may be any electronic product, for example, a personal computer, a tablet computer, a smart phone, a personal digital assistant (Personal Digital Assistant, PDA) and the like. Such as figure 1 As shown, the sensitive information identification method may include the following steps:

[0031] S11: Obtain a field to be recognized from a database table of the database, where the field to be recognized includes at least one piece of information, and the information includes a string of numbers, a string of symbols, and / or a string of Chinese characters.

[0032] The database can be an Oracle database, a SQL Server database, a Mysql database, a Sybase database, or a Hadoop database. At least one database table is stored in the database. The database table includes at leas...

Embodiment 2

[0174] figure 2 It is a functional block diagram of the sensitive information identification device provided by Embodiment 2 of the present invention. In some embodiments, the sensitive information identification device 20 runs in an electronic device. The electronic device may be any electronic product, for example, a personal computer, a tablet computer, a smart phone, a personal digital assistant (Personal Digital Assistant, PDA) and the like. The sensitive information identification device 20 may include a plurality of functional modules composed of program code segments. The program codes of each program segment in the sensitive information identification device 20 can be stored in a memory and executed by at least one processor to automatically confirm customer service quality.

[0175] In this embodiment, the sensitive information identification device 20 can be divided into multiple functional modules according to the functions it performs. The functional modules m...

Embodiment 3

[0319] image 3 It is a schematic diagram of the electronic device provided by Embodiment 3 of the present invention.

[0320] The electronic device 3 includes: a memory 31 , at least one processor 32 , and a computer program 33 stored in the memory 31 and operable on the at least one processor 32 . When the at least one processor 32 executes the computer program 33, the steps in the foregoing method embodiments are implemented. Alternatively, when the at least one processor 32 executes the computer program 33, the functions of the modules in the above device embodiments are realized.

[0321] Exemplarily, the computer program 33 may be divided into one or more modules / units, and the one or more modules / units are stored in the memory 31 and executed by the at least one processor 32, To complete the present invention. The one or more modules / units may be a series of computer program instruction segments capable of accomplishing specific functions, and the instruction segment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of artificial intelligence, and provides a sensitive information identification method, which comprises the following steps of obtaining a to-be-identifiedfield from a database table of a database; if at least one piece of information in the to-be-identified field comprises a Chinese character string and if the Chinese character string comprises a character string meeting a first preset rule, determining whether the character string is matched with at least one character string template in a preset corpus or not; if the character string is not matched with any character string template in a preset corpus, determining a hash value corresponding to the character string; determining a target character string of which the hash value is matched withthe hash value corresponding to the character string in a preset corpus; determining the similarity between the target character string and the character string; and if the similarity between the target character string and the character string exceeds a preset value, determining that the to-be-identified field comprises a sensitive field. The invention further provides a device, electronic equipment and a storage medium. The sensitive field can be automatically identified.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a sensitive information identification method, device, electronic equipment and storage medium. Background technique [0002] With the wide application of big data, more and more enterprises use online processing of sensitive documents. While enjoying the convenience and speed of online processing of sensitive documents, personal information has also been severely tested, such as personal information being intercepted, intercepted and illegally copied, and the resulting personal harassment, personal property loss Security is a concern. Therefore, the identification of sensitive information in personal information is particularly important. After identifying sensitive information, sensitive information can be protected by desensitization or encryption. At present, the identification of sensitive information can only be identified for a certain type of sensitive informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/903G06F17/27G06F21/62G06K9/62
CPCG06F21/6245G06F16/90344G06F40/289G06F18/22
Inventor 程庚张帆杨亮吉
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products