Movatterモバイル変換


[0]ホーム

URL:


CN108304725A - A kind of method and system to the desensitization of government data resource - Google Patents

A kind of method and system to the desensitization of government data resource
Download PDF

Info

Publication number
CN108304725A
CN108304725ACN201810133449.3ACN201810133449ACN108304725ACN 108304725 ACN108304725 ACN 108304725ACN 201810133449 ACN201810133449 ACN 201810133449ACN 108304725 ACN108304725 ACN 108304725A
Authority
CN
China
Prior art keywords
data
desensitization
sensitive
rule
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810133449.3A
Other languages
Chinese (zh)
Inventor
张峰
王晓斌
闫淑杰
鲍庆峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Hui Trade Electronic Port Co Ltd
Shandong Huimao Electronic Port Co Ltd
Original Assignee
Shandong Hui Trade Electronic Port Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Hui Trade Electronic Port Co LtdfiledCriticalShandong Hui Trade Electronic Port Co Ltd
Priority to CN201810133449.3ApriorityCriticalpatent/CN108304725A/en
Publication of CN108304725ApublicationCriticalpatent/CN108304725A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of method and system to the desensitization of government data resource, realization process is:Initially set up desensitization rule base, storage desensitization information establish rules really then, desensitization rule;Sensitive dictionary is established, is arranged and stores sensitive data information;Government data is obtained, according to information in sensitive dictionary, detection data susceptibility, and the sensitive word data to detecting desensitize according to the rule stored in sensitive pattern library.This to government data resource desensitization method and system compared with prior art, a kind of effective solution and technological means are provided for the desensitization DecryptDecryption of data in government data resources open, compensate for the defect without clearly desensitization rule and technology during government information resources open, practicability of the present invention is stronger, it is applied widely and easy to spread.

Description

A kind of method and system to the desensitization of government data resource
Technical field
The present invention relates to field of computer technology, specifically a kind of highly practical, to the desensitization of government data resourceMethod and system.
Background technology
Big data brings immense value, is causing economic society field new change and innovation.Information technology is goed deep intoIt is permeated using with extensive, so that person to person, people and object, object and object is realized and is interconnected, produce mass data.These data are adoptedCollection, storage and correlation analysis, and valuable information is extracted, decision-making capability and level will be greatlyd improve, manufacture, gold are pushedThe change and innovation in each field of economic societies such as melt.
The Chinese government establishes certainly as the main body for grasping magnanimity high value data resource, almost each functional departmentOneself database has had accumulated the mass data of several years, with quickly pushing away for " internet+", big data technology and applicationInto government data resources open problem is received significant attention and put on agenda.Government itself also has become increasingly aware of political affairsIt is engaged in the importance that data resource opens, constantly puts into effect various policies and measure, expand open to the society wide of government data resourceDegree and depth explore big data application service, attract public and enterprise to put into the excavation to government data resource, reallyDischarge the value of big data.
During government data opens, it is related to state secret although being defined from macro policy, is related to merchantClose and individual privacy data resource can not open, but each department not yet puts into effect clear policy specification, also not set up clearReview mechanism can be open come ensure government data resource.In actual life, whether government data resource can open masterWill be by each department according to oneself practical audit of own service, on the one hand the audit of most departments causes portion without specific standardThe leakage for dividing individual privacy and trade secret resource, as A departments think that on limits data resource can not be opened in B departmentsIt puts;On the other hand many departments still continue old thinking, and the data resource opened without clear stipulaties does not open, and limits outThe breadth and depth put, is runed counter to relevant policies.
Based on this, the present invention provides a kind of method and system to the desensitization of government data resource.
Invention content
The technical assignment of the present invention is to be directed to the above shortcoming, is provided a kind of highly practical, de- to government data resourceQuick method and system.
The present invention provides a kind of method to desensitize to government data resource, and realization process is:
Step 1: initially set up desensitization rule base, storage desensitization information establish rules really then, desensitization rule;
Step 2: establishing sensitive dictionary, it is arranged and stores sensitive data information;
Step 3: obtaining government data, according to information in sensitive dictionary, detection data susceptibility, and the sensitive word to detectingData desensitize according to the rule stored in sensitive pattern library.
In the step 1, the desensitization rule stored in the rule base that desensitizes is specially:
Sensitive data is determined first;
Then will desensitization rule setting at two kinds of general rule and complex rule, and the data after desensitization are divided into can restore andIrrecoverable two class, the generality rule refers to that single curing process is carried out to sensitive data, and complex rule refers to quickSense data are combined the fixed line processing of formula;The recoverable data classification refers to that can revert to original sensitive data, noRecoverable data classification refers to that can not revert to original sensitive data.
In the step of determining desensitization data, can Manual definition complete, the sensitive data of the Manual definition includes:SurnameName, ID card No., address, telephone number, Bank Account Number, email address, affiliated city, postcode, cipher type, institution termTitle, business license number, account No., trade date, transaction amount.
It is described desensitization rule in curing process include data replacement, data rearrangement, data encryption, data truncation,Data mask and date deviate rounding, and wherein data truncation refers to a member-retaining portion data, and remainder data is deleted;Data mask isRefer to and same data message is not shown, is replaced with the letter including " XXX ";Date offset rounding refers to when only retaining integral pointBetween.
The sensitive data information stored in the sensitivity dictionary includes sensitive word information, privacy field information, concerning security matters fieldInformation, red white black list information, wherein Red List refer to sensitive enterprise, individual;White list refers to can wide-open enterprise, individual;Blacklist refers to enterprise of problems, individual.
Detection data susceptibility in the step 3 refers to that detected rule is arranged by the information in sensitive dictionary, rightData privacy and concerning security matters do detection and output data examining report, and the setting of the detected rule includes:Privacy field is setIt sets, the setting of concerning security matters field, sensitive word is arranged, red white blacklist is arranged.
Further include step 4 after the completion of step 3:The step of regular or random risk supervision, that is, pass through self defined timePeriod carries out susceptibility detection to last time desensitization data again, and the sensitive word data to detecting are again according to sensitive patternThe rule stored in library desensitizes.
A kind of system to the desensitization of government data resource, including,
Sensitive pattern library, storage desensitization information establish rules really then, desensitization rule;
Sensitive dictionary, for being arranged and storing sensitive data information;
Desensitize module, for the government data of acquisition, according to information in sensitive dictionary, and detection data susceptibility, and to detectionThe sensitive word data gone out desensitize according to the rule stored in sensitive pattern library.
In the desensitization module, configured with detection unit, desensitization unit, wherein
Detection unit is used to, by the information in sensitive dictionary, detected rule be arranged, detect data privacy and concerning security mattersAnd output data examining report, the setting of the detected rule include:Privacy field setting, the setting of concerning security matters field, sensitive word are setIt sets, red white blacklist setting;
The sensitive data that desensitization unit is used to detect detection unit carries out desensitization process, the processing be single curing process orCombined type curing process, the curing process include that data replacement, data rearrangement, data encryption, data truncation, data are coveredCode and date deviate rounding, and wherein data truncation refers to a member-retaining portion data, and remainder data is deleted;Data mask refers to portionDivided data information is not shown, is replaced with the letter including " XXX ";Date offset rounding refers to only retaining the integral point time.
It is also configured with timing unit in the desensitization module, the timing unit is for periodically starting risk supervision, i.e., logicalThe time cycle of self-defined timely unit is spent, susceptibility detection, and the sensitivity to detecting are carried out to last time desensitization data againWord data desensitize according to the rule stored in sensitive pattern library again.
A kind of method and system to the desensitization of government data resource of the present invention, have the following advantages:
A kind of method and system to the desensitization of government data resource of the present invention, the government information resources to relating to quick concerning security matters carry outDesensitization is carried out sensitive information by the rule that desensitizes the deformation of data, the reliably protecting of privacy-sensitive data is realized, so as to government affairsThe data providing and data user that information resources open eliminate open data and relate to the trouble and worry of quick concerning security matters, and then push political affairsBusiness data resource is open and the breadth and depth that utilizes, to convenient in exploitation, test and other nonproductive environment and outsourcingIt is highly practical safely using the real data set after desensitization in environment, it is applied widely, it is easy to spread.
Description of the drawings
It, below will be to embodiment or existing for the clearer technical solution for illustrating the embodiment of the present invention or the prior artAttached drawing is briefly described needed in technology description, it should be apparent that, the accompanying drawings in the following description is only this hairSome bright embodiments for those of ordinary skill in the art without creative efforts, can be with rootOther attached drawings are obtained according to these attached drawings.
Attached drawing 1 is the implementation flow chart of the method for the present invention.
Attached drawing 2 is the realization schematic diagram of present system.
Specific implementation mode
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed descriptionThe present invention is described in further detail.Obviously, described embodiments are only a part of the embodiments of the present invention, rather thanWhole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premiseLower obtained every other embodiment, shall fall within the protection scope of the present invention.
As mobile Internet, cloud computing, the rapid development of Internet of Things and innovation and application, big data are deeply infiltrated into economyEach field of society, becomes strategic assets.Government, enterprise etc. strengthen big data processing capacity one after another, and China is it is also proposed that will expandGovernment data resource is open to the society, explores big data application service.But meanwhile stealing business secret, leakage personal information etc.Behavior is also accompanied, and government data open surface faces security threat.
Government data resources open is related to national security, trade secret, the data of individual privacy not from the angle of policyCan be open, or be opened after desensitization, but till now each department do not formed still special data desensitization technology withSpecification.
This patent mainly provide it is a kind of to the data resource of individual privacy and trade secret involved in government data resource intoThe technology of row desensitization.
As shown in Fig. 1, the present invention provides a kind of method to desensitize to government data resource, and realization process is:
Step 1: initially set up desensitization rule base, storage desensitization information establish rules really then, desensitization rule;
Step 2: establishing sensitive dictionary, it is arranged and stores sensitive data information;
Step 3: obtaining government data, according to information in sensitive dictionary, detection data susceptibility, and the sensitive word to detectingData desensitize according to the rule stored in sensitive pattern library.
In the step 1, the desensitization rule stored in the rule base that desensitizes is specially:
Sensitive data is determined first;
Then will desensitization rule setting at two kinds of general rule and complex rule, and the data after desensitization are divided into can restore andIrrecoverable two class, the generality rule refers to that single curing process is carried out to sensitive data, and complex rule refers to quickSense data are combined the fixed line processing of formula;The recoverable data classification refers to that can revert to original sensitive data, noRecoverable data classification refers to that can not revert to original sensitive data.
More specifically, establish desensitization rule base be to provide for privacy information rule, relevant law rule management andSetting.
The sensitive data of definition is also known as private data, and common sensitive data has:Name, ID card No., address, electricityTalk about number, Bank Account Number, email address, affiliated city, postcode, cipher type (such as account inquiries password, withdrawal password, loginPassword etc.), organization's title, business license number, account No., trade date, transaction amount etc..User can basisBusiness actual conditions Manual definition's sensitive data.
Desensitization rule base should be divided into general rule and complex rule, and general rule requires to be cured, can be directIt calls and carries out data desensitization, complex rule requires have stronger combined and applicability, flexibly can arrange in pairs or groups and adjust, parameterIt is configurable, model reusable.
Desensitization rule classification is that can restore and irrecoverable two class.It can restore class, the data referred to after desensitization can be by oneFixed mode, reverts to original sensitive data, and such desensitization rule refers mainly to all kinds of enciphering and deciphering algorithm rules;It is irrecoverableClass, referring to the part that the data after desensitization are desensitized makes all recover in any way.It generally can be divided into and replace algorithm and lifeAt algorithm two major classes.Replacing algorithm will need the part desensitized to be replaced using the character or character string defined, generate class and calculateRule is more more complicated, it is desirable that the data fit logic rules after desensitization are " seeming very true false data ".
Data desensitization follows following two principle:It is the application after desensitization as far as possible, retains the significant letter before desensitizationBreath;Prevent hacker from cracking to the full extent.
It is described desensitization rule in curing process include data replacement, data rearrangement, data encryption, data truncation,Data mask and date deviate rounding, and wherein data truncation refers to a member-retaining portion data, and remainder data is deleted;Data mask isRefer to and same data message is not shown, is replaced with the letter including " XXX ";Date offset rounding refers to when only retaining integral pointBetween.
Further, above-mentioned curing process is described as follows:
It replaces:It is such as unified that name in an account book for women is replaced with into A, information integrity can be kept completely to internal staff, but easily crack.
It resets:Serial number 12345 is rearranged to 54321, is upset in a certain order, like " replacement ", can needPrime information is conveniently gone back when wanting, but is equally easily cracked.
Encryption:Number 12345 is encrypted as 23456, and safe coefficient depends on which kind of Encryption Algorithm used, generally according to realityDepending on situation.
It blocks:13811001111 to block be 138, gives up necessary information to ensure the ambiguity of data, is more commonly usedDesensitization method, but it is often not friendly enough to producing.
Mask: 123456 ->1xxxx6 remains partial information, and ensure that the length invariance of information, to letterBreath holder is more easy to distinguish, such as the identity information on train ticket.
Date deviates rounding:20130520 12:30:45 -> 20130520 12:00:00, give up precision to ensure originalThe safety of beginning data, general such method can protect the Annual distribution density of data.
The sensitive data information stored in the sensitivity dictionary includes sensitive word information, privacy field information, concerning security matters fieldInformation, red white black list information, wherein sensitive word include containing political orientation, violent tenet, unhealthy, uncultivated term,Or the term based on self-demand setting;Privacy field refer to enterprise, individual privacy data field or term;Concerning security mattersField is to be related to tissue, personal secret information;Red List refers to sensitive enterprise, individual etc.;White list refer to can open completely enterprise,Individual etc.;Blacklist refers to enterprise of problems, individual etc..
Privacy rule library can be also configured in sensitive dictionary, the pipe for providing privacy information rule, relevant law ruleReason and setting.
Detection data susceptibility in the step 3 refers to that detected rule is arranged by the information in sensitive dictionary, rightData privacy and concerning security matters do detection and output data examining report, and the setting of the detected rule includes:Privacy field is setIt sets, the setting of concerning security matters field, sensitive word is arranged, red white blacklist is arranged.
Further include step 4 after the completion of step 3:The step of regular or random risk supervision, that is, pass through self defined timePeriod carries out susceptibility detection to last time desensitization data again, and the sensitive word data to detecting are again according to sensitive patternThe rule stored in library desensitizes.
After data desensitization process, it is known that sensitive information be hidden and handled, but desensitize after data due toMaintain the information such as part statistical nature and the structure feature of initial data, it would still be possible to which there are certain sensitive informations to leak windDanger.Therefore, there is still a need for taking suitable mode to control knows range, by appropriate safety management means, prevent outside dataIt lets out.Here form periodically or non-periodically, the mode formulated detection scheme, export examining report, further detection data are usedSafety, prevention and control sensitive data leaks.
In addition, Security Auditing Mechanism need to be added in each stage of data desensitization, stringent, detailed recorded data processing procedureIn relevant information, formed partial data processing record, for contingency question investigation with data tracing analyze, once divulge a secretEvent, which can trace back to, to be occurred in which data processing link.
As shown in Fig. 2, a kind of system to the desensitization of government data resource, including,
Sensitive pattern library, storage desensitization information establish rules really then, desensitization rule;
Sensitive dictionary, for being arranged and storing sensitive data information;
Desensitize module, for the government data of acquisition, according to information in sensitive dictionary, and detection data susceptibility, and to detectionThe sensitive word data gone out desensitize according to the rule stored in sensitive pattern library.
In the desensitization module, configured with detection unit, desensitization unit, wherein
Detection unit is used to, by the information in sensitive dictionary, detected rule be arranged, detect data privacy and concerning security mattersAnd output data examining report, the setting of the detected rule include:Privacy field setting, the setting of concerning security matters field, sensitive word are setIt sets, red white blacklist setting;
The sensitive data that desensitization unit is used to detect detection unit carries out desensitization process, the processing be single curing process orCombined type curing process, the curing process include that data replacement, data rearrangement, data encryption, data truncation, data are coveredCode and date deviate rounding, and wherein data truncation refers to a member-retaining portion data, and remainder data is deleted;Data mask refers to portionDivided data information is not shown, is replaced with the letter including " XXX ";Date offset rounding refers to only retaining the integral point time.
It is also configured with timing unit in the desensitization module, the timing unit is for periodically starting risk supervision, i.e., logicalThe time cycle of self-defined timely unit is spent, susceptibility detection, and the sensitivity to detecting are carried out to last time desensitization data againWord data desensitize according to the rule stored in sensitive pattern library again.
The present invention provides a kind of effective solution for the desensitization DecryptDecryption of data in government data resources openAnd technological means, compensate for the defect without clearly desensitization rule and technology during government information resources open.
Practicability of the present invention is stronger, applied widely, and easy to spread, pushes government data resources open to rangeAnd depth development.
Above-mentioned specific implementation mode is only the specific case of the present invention, and scope of patent protection of the invention includes but not limited toAbove-mentioned specific implementation mode, a kind of claim of any method and system to desensitize to government data resource for meeting the present inventionThe appropriate change or replacement that the those of ordinary skill of book and any technical field does it should all fall into the present invention'sScope of patent protection.

Claims (10)

CN201810133449.3A2018-02-092018-02-09A kind of method and system to the desensitization of government data resourcePendingCN108304725A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810133449.3ACN108304725A (en)2018-02-092018-02-09A kind of method and system to the desensitization of government data resource

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810133449.3ACN108304725A (en)2018-02-092018-02-09A kind of method and system to the desensitization of government data resource

Publications (1)

Publication NumberPublication Date
CN108304725Atrue CN108304725A (en)2018-07-20

Family

ID=62865099

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810133449.3APendingCN108304725A (en)2018-02-092018-02-09A kind of method and system to the desensitization of government data resource

Country Status (1)

CountryLink
CN (1)CN108304725A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109614816A (en)*2018-11-192019-04-12平安科技(深圳)有限公司Data desensitization method, device and storage medium
CN110084065A (en)*2019-04-292019-08-02北京口袋时尚科技有限公司Data desensitization method and device
CN110289059A (en)*2019-06-132019-09-27北京百度网讯科技有限公司 Medical data processing method, device, storage medium and electronic equipment
CN110569660A (en)*2019-07-302019-12-13国家计算机网络与信息安全管理中心Data desensitization method based on data expansion
CN110705964A (en)*2019-09-292020-01-17云南永兴元科技有限公司Urban operation data display platform and method based on big data analysis
CN111597578A (en)*2020-04-232020-08-28国网湖北省电力有限公司信息通信公司 Power Marketing System Customer Sensitive Information Desensitization System
CN111611312A (en)*2020-05-192020-09-01四川万网鑫成信息科技有限公司Data desensitization method based on rule engine and block chain technology
CN113742763A (en)*2021-11-082021-12-03中关村科技软件股份有限公司Confusion encryption method and system based on government affair sensitive data
CN113836578A (en)*2021-09-142021-12-24北京市大数据中心 Method and system for maintaining sensitive data security of big data
CN115017119A (en)*2022-07-222022-09-06平安壹钱包电子商务有限公司 A log mask method and system
CN115713249A (en)*2022-10-102023-02-24重庆移通学院Government affair satisfaction evaluation system and method based on data security and privacy protection
CN115982097A (en)*2022-12-202023-04-18河北东软软件有限公司Data filing method and device based on government affair data and related components
CN118520116A (en)*2024-07-232024-08-20湖州智慧城市研究院有限公司Sensitive information identification method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080270370A1 (en)*2007-04-302008-10-30Castellanos Maria GDesensitizing database information
CN106547791A (en)*2015-09-222017-03-29中国移动通信集团公司A kind of data access method and system
CN106611129A (en)*2016-12-272017-05-03东华互联宜家数据服务有限公司Data desensitization method, device and system
CN106951796A (en)*2016-01-072017-07-14阿里巴巴集团控股有限公司A kind of desensitization method and its device of data-privacy protection
CN107247788A (en)*2017-06-152017-10-13山东浪潮云服务信息科技有限公司A kind of method of the comprehensive regulation service based on government data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080270370A1 (en)*2007-04-302008-10-30Castellanos Maria GDesensitizing database information
CN106547791A (en)*2015-09-222017-03-29中国移动通信集团公司A kind of data access method and system
CN106951796A (en)*2016-01-072017-07-14阿里巴巴集团控股有限公司A kind of desensitization method and its device of data-privacy protection
CN106611129A (en)*2016-12-272017-05-03东华互联宜家数据服务有限公司Data desensitization method, device and system
CN107247788A (en)*2017-06-152017-10-13山东浪潮云服务信息科技有限公司A kind of method of the comprehensive regulation service based on government data

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109614816B (en)*2018-11-192024-05-07平安科技(深圳)有限公司Data desensitizing method, device and storage medium
CN109614816A (en)*2018-11-192019-04-12平安科技(深圳)有限公司Data desensitization method, device and storage medium
CN110084065A (en)*2019-04-292019-08-02北京口袋时尚科技有限公司Data desensitization method and device
CN110084065B (en)*2019-04-292021-07-30北京口袋时尚科技有限公司Data desensitization method and device
CN110289059A (en)*2019-06-132019-09-27北京百度网讯科技有限公司 Medical data processing method, device, storage medium and electronic equipment
CN110569660A (en)*2019-07-302019-12-13国家计算机网络与信息安全管理中心Data desensitization method based on data expansion
CN110705964A (en)*2019-09-292020-01-17云南永兴元科技有限公司Urban operation data display platform and method based on big data analysis
CN111597578A (en)*2020-04-232020-08-28国网湖北省电力有限公司信息通信公司 Power Marketing System Customer Sensitive Information Desensitization System
CN111611312A (en)*2020-05-192020-09-01四川万网鑫成信息科技有限公司Data desensitization method based on rule engine and block chain technology
CN113836578A (en)*2021-09-142021-12-24北京市大数据中心 Method and system for maintaining sensitive data security of big data
CN113742763A (en)*2021-11-082021-12-03中关村科技软件股份有限公司Confusion encryption method and system based on government affair sensitive data
CN115017119A (en)*2022-07-222022-09-06平安壹钱包电子商务有限公司 A log mask method and system
CN115713249A (en)*2022-10-102023-02-24重庆移通学院Government affair satisfaction evaluation system and method based on data security and privacy protection
CN115713249B (en)*2022-10-102023-06-13重庆移通学院Government satisfaction evaluation system and method based on data security and privacy protection
CN115982097A (en)*2022-12-202023-04-18河北东软软件有限公司Data filing method and device based on government affair data and related components
CN115982097B (en)*2022-12-202023-10-27河北东软软件有限公司Government data-based data archiving method and device and related components
CN118520116A (en)*2024-07-232024-08-20湖州智慧城市研究院有限公司Sensitive information identification method and device

Similar Documents

PublicationPublication DateTitle
CN108304725A (en)A kind of method and system to the desensitization of government data resource
CN111639179B (en)Batch customer information privacy control method and device for bank front-end query system
CN109960917A (en)A kind of time slot scrambling and device of document
CN116680617A (en)Data confidentiality detection method and system based on use permission level
Malderle et al.Gathering and analyzing identity leaks for a proactive warning of affected users
CN105528558B (en)A kind of detection method and device of private communication channel communication
CN116720194A (en)Method and system for evaluating data security risk
CN112508455A (en)Information seal and using method thereof
CN120338736A (en) A human resource management method and system based on data security
CN119561776A (en) A security risk analysis and early warning method for multi-source data processing
Riaz et al.Analyzing the Impact of Cybercrime and Its Security in Banking Sectors of Pakistan by Using Data Mining
CN109918921A (en) A kind of network communication data secret detection method
Asasfeh et al.Privacy and security concerns in big data
ShilpaAnalyzing the Bank Scam's Financial Fraud and its Technological Repercussions using Data Mining
CN115115351A (en)Method and system for auditing environmental damage identification evaluation report
SalmanIdentity theft on social media for the system of banking sector in Islamabad
Putri et al.The Concept of an Electronic-Based Government System and the Six-Ware Cyber Security Framework in Supporting the Digitization of the Indonesian Government. Def
FafinskiAccess denied: Computer misuse in an era of technological change
CN114866276B (en)Method, device, storage medium and equipment for detecting abnormal transmission file terminal
ZhangSupervision and Investigation of Internet Fraud Crimes.
CN116308434B (en)Insurance fraud identification method and system
CN113343288B (en)Block chain intelligent contract security management system based on TEE
CN120223434B (en) User database information leakage protection system and equipment based on big data
CN119628930B (en)Communication data encryption intelligent processing system
Feng et al.Research on Security Risk Analysis and Sensitive Data Identification in Electricity Data Sharing and Distribution

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20180720


[8]ページ先頭

©2009-2025 Movatter.jp