Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data desensitization and restoration method and device

A data desensitization and desensitization technology, applied in the field of information security, can solve problems such as different desensitization data, inability to diagnose data, and inability to ensure that maintenance personnel can efficiently determine data problems, etc., to achieve the effect of improving efficiency

Pending Publication Date: 2022-05-13
DINGTALK (CHINA) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the desensitized data obtained through traditional encryption is completely different from the original data, and maintenance personnel have no way of diagnosing data problems
Even if the format-preserving encryption method only achieves the same length before and after data encryption, it still cannot guarantee that maintenance personnel can efficiently determine data problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data desensitization and restoration method and device
  • Data desensitization and restoration method and device
  • Data desensitization and restoration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0029] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data desensitization and restoration method and device.The data desensitization method comprises the steps that alternative character sets are matched with characters to be desensitized in data to be desensitized, the successfully matched character sets are determined as target character sets, and each alternative character set corresponds to one or more types of characters; and according to the target character set, performing format preserving encryption FPE processing on the to-be-desensitized characters to obtain desensitized data corresponding to the to-be-desensitized data.

Description

technical field [0001] This specification relates to the field of information security, in particular to a data desensitization and restoration method and device. Background technique [0002] With the rapid development of the Internet and the advent of the era of big data, the information security of every citizen is becoming more and more important. How to carefully design information privacy protection methods to achieve a balance between information freedom and privacy protection has gradually become a problem that all major enterprises need to face together. [0003] In related technologies, before accessing a document containing user sensitive information in order to troubleshoot user data problems, maintenance personnel usually encrypt the document data, so as to achieve the purpose of data desensitization. However, the desensitized data obtained through traditional encryption methods is completely different from the original data, and maintenance personnel have no w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6245G06F21/602
Inventor 刘小新郭瑞刘文博
Owner DINGTALK (CHINA) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products