Data desensitization method and device and electronic equipment

A data desensitization and desensitization technology, applied in the field of data processing, can solve the problem that the data before and after desensitization cannot be guaranteed to be mapped one-to-one, and it cannot be ruled out that multiple original encoded data correspond to the same desensitized data, which requires a large amount of calculation. And other issues

Pending Publication Date: 2021-05-14
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In related technologies, the reversible desensitization method for encoded data generally uses the national secret SM4 algorithm for reversible desensitization. Although this method can achieve reversible desensitization, the process of calling SM4 is cumbersome and requires a large amount of calculation. The truncation method cannot guarantee the one-to-one mapping characteristics of the data before and after desensitization, that is, the situation that multiple original coded data after desensitization correspond to the same desensitized data cannot be ruled out in theory; or the method of replacement and replacement can be used to achieve Reversible desensitization, although the algorithm can theoretically guarantee one-to-one mapping of data before and after desensitization, but when the data packet length is large, the efficiency of reversible desensitization is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data desensitization method and device and electronic equipment
  • Data desensitization method and device and electronic equipment
  • Data desensitization method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0053] As an optional implementation of the present invention, the method also includes:

[0054] (1) Input the coding data C to be traced;

[0055] (2) Calculate the greatest common divisor g=(M, N) of the original coded data M and N, which can be obtained quickly by using the Euclidean algorithm.

[0056] (3) Calculate the multiplicative inverse element (M / g) of the original coded data M / g under the modulus N / g -1 , then there is M / g·(M / g) -1 = 1(mod N / g);

[0057] (4) The data traceability party (that is, the data provider) calculates the traceability identification ID' according to the following formula, and completes the traceability operation:

[0058] ID'=C / g·(M / g) -1 (mod N / g) (3)

[0059] In the formula: ID' is the identification obtained from traceability; C is the coded data after desensitization; g is the greatest common divisor of M and N; (M / g) -1 is the multiplicative inverse of M / g under modulo N / g. According to formula (1) C=M·ID, obtain ID'=C / g·(M / g) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data desensitization method and device and electronic equipment, and relates to the technical field of data processing.The method comprises the steps of generating a global confidential integer of a target order of magnitude according to original coded data to be desensitized, and the size of the target order of magnitude is determined according to the data length of the data to be desensitized; obtaining an Arbel group according to the global confidential integer; selecting a desensitization task identifier in the Abeler group; according to the desensitization task identifier and the global secrecy integer, coding the original coded data to obtain desensitized coded data, no deformation is performed on the coded data in the whole desensitization process, and reliable desensitization can be realized only through one-time big data calculation in the whole desensitization process, so that the desensitization efficiency is improved; and meanwhile, in the data desensitization process, the selected desensitization task identifier is added into desensitization calculation, so that a data provider can perform traceability when suspected data leakage occurs according to the desensitization task identifier used in the desensitization process after desensitization.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data desensitization method, device and electronic equipment. Background technique [0002] With the development of big data technology, a large amount of data needs to be mined and analyzed. Too much blocking and shielding of data is undoubtedly a waste of big data resources. How can we reasonably process data on the basis of convenient information transmission and sharing to ensure data privacy? Reaching a reasonable balance between protection and data mining analysis is a problem that needs to be solved at present. [0003] The existing data desensitization technology deforms sensitive data by means of deletion and masking to achieve reliable protection of sensitive data. Although deletion and masking can be used to effectively protect data, the processed data often loses its value. Therefore, the reversible desensitization technology came into being. Through the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6245G06F21/602
Inventor 安宁钰梁潇郑晓崑王晓慧卢卫疆
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products