Desensitize regular configuration method and data desensitization method, system, computer equipmentTechnical field
The present embodiments relate to field of computer data processing more particularly to a kind of regular configuration methods of desensitization, andData desensitization method, system, computer equipment, computer readable storage medium.
Background technique
It is higher and higher to the attention degree of individual privacy and network security with the extensive use of network technology.Enterprise's numberIt is more and more according to the customer data stored in library, be especially stored in electric business platform and banking system a large amount of customer information orTransaction Information etc. and privacy and safety-related sensitive information, such as customer name, certificate information, contact address and contact methodDeng.How client individual privacy is protected, at currently needing one of the problem of paying close attention to.
In addition, staff when safeguarding database, when desensitization rule needs to make rectification, generally requires multipleEach page is rectified and improved respectively, leads to database maintenance low efficiency.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention is that providing a kind of data desensitization method, system, computer equipment and meterCalculation machine readable storage medium storing program for executing can rectify and improve the unified of the field shielding rules of the page each in complication system, avoid to everyOne page is rectified and improved respectively, and workload needed for effectively reducing rectification improves the upgrading efficiency of desensitization rule.
To achieve the above object, the embodiment of the invention provides a kind of regular configuration methods of desensitization, comprising the following steps:
S1. accessing page request is sent;
S2. the corresponding address URL is obtained based on the accessing page request, and the page is arranged according to the address URLPage hierarchical identification;
S3. the business information that server is returned according to the accessing page request is received;
Whether S4. inquired in the page according to the business information includes sensitive information field;
S5. if including the sensitive information field, by the page hierarchical identification, the sensitive information field and correspondingShielding rules establish mapping relations, and the mapping relations are configured in desensitization rule list;
S6. step S1~S6 is repeated for next page, until the desensitization rule list is configured to finish.
Preferably, the step S4 further include:
The business information is matched with each key character of preset keyword symbol concentration or key-strings;And
If being matched to the key character or key-strings concentrated in the business information including the key character, sentenceBreaking includes sensitive information field in the page.
Preferably, the step S5 further include:
The place field type of the sensitive information field is stored in the desensitization rule list.
Preferably, further include the steps that increasing sensitive information field and corresponding field shielding rules:
The corresponding URL of each page and business information are read from the storage region;
Whether inquiry includes sensitive information field to be added, if including described to be added in wherein one or more pagesWhen sensitive information field, by the page hierarchical identification of the one or more page, sensitive information field to be added and corresponding screenIt covers rule and establishes mapping relations, and the mapping relations are added in desensitization rule list.
The embodiment of the invention also provides a kind of data desensitization methods, which comprises
The accessing request information of information for the target page to server transmission is inputted according to user;
Receive the data to be desensitized that the server is returned based on the accessing request information;And
The data to be desensitized are converted into desensitization data, the desensitization rule list according to preconfigured desensitization rule listMapping relations including page hierarchical identification, sensitive information field and field shielding rules, the page hierarchical identification is basisThe address URL of the target pages is pre-set, and the mapping relations include being preconfigured in the desensitization rule listSub- mapping relations between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rules:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pagesSensitive information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
Preferably, in described the step of receiving the data to be desensitized that the server is returned based on the accessing request informationBetween the described the step of data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list, also wrapIt includes:
The data to be desensitized are intercepted, it is described to be stored in buffer zone after the data that desensitize are intercepted;And
The data to be desensitized are obtained from the buffer zone.
Preferably, the step that the data to be desensitized are converted to desensitization data according to preconfigured desensitization rule listAfter rapid, comprising:
The desensitization data are provided to the view layer progress page to show.
The embodiment of the invention also provides data desensitization systems, comprising:
Sending module, for inputting the accessing request information of information for the target page to server transmission according to user;
Receiving module, the data to be desensitized returned for receiving the server based on the accessing request information;And
Desensitize module, for the data to be desensitized to be converted to desensitization data according to preconfigured desensitization rule list,The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the pageHierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include be preconfigured in instituteIt states in desensitization rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rulesSub- mapping relations:
According to the page hierarchical identification of the target pages, inquired from the desensitization rule list corresponding with the target pagesSensitive information field and corresponding field shielding rules;And
According to the sensitive information field and the field shielding rules, desensitization operation is executed to the desensitization data.
To achieve the above object, the embodiment of the invention also provides a kind of computer equipment, the computer equipment storagesDevice, processor and it is stored in the computer program that can be run on the memory and on the processor, the computer journeyThe step of data desensitization method as described above is realized when sequence is executed by processor.
To achieve the above object, the embodiment of the invention also provides a kind of computer readable storage medium, the computersComputer program is stored in readable storage medium storing program for executing, the computer program can be performed by least one processor, so that instituteState the step of at least one processor executes data desensitization method as described above.
Data desensitization method, system, computer equipment and computer readable storage medium provided in an embodiment of the present invention lead toThe mapping relations between the page hierarchical identification in desensitization rule list, the sensitive information field and corresponding shielding rules are crossed,The similar field of different levels is allowed to map the same field shielding rules, when the field shielding rules to certain class field are doneWhen modifying out, which can be implemented in all pages comprising such field, without to pointThe other modification that field shielding rules are carried out to each page.
It can be appreciated that using the technical solution of the present embodiment to the whole of the field shielding rules of the page each in complication systemChange, avoid and each page is rectified and improved respectively, workload needed for effectively reducing rectification improves the upgrading of desensitization ruleEfficiency.
Detailed description of the invention
Fig. 1 is the running environment schematic diagram of the regular configuration method of desensitization of the embodiment of the present invention.
Fig. 2 is the flow chart of the regular configuration method embodiment one of present invention desensitization.
Fig. 3 is the flow chart of data desensitization method embodiment two of the present invention.
Fig. 4 is the flow chart of data desensitization method embodiment three of the present invention.
Fig. 5 is the program module schematic diagram of data of the present invention desensitization system embodiment four.
Fig. 6 is the hardware structural diagram of computer equipment embodiment five of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, rightThe present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, notFor limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative workEvery other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannotIt is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " theOne ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodimentArt scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solutionWill be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claimsProtection scope within.
Fig. 1 is the running environment schematic diagram of the regular configuration method of desensitization of the embodiment of the present invention.Computer equipment 2 is exemplaryConnection server or server cluster, be stored with customer information in the server or server cluster.
Microsoft Windows, Linux, Mac OS, Android, IOS etc. can be run in the computer equipment 2Operating system, and be mounted in aforesaid operations system browser application (e.g., IE browser, Chrome browser etc.) orCustomer end A pp.Data interaction is carried out by the browser application or customer end A pp and server.
Following embodiment will be that executing subject carries out exemplary description with computer equipment 2.
Embodiment one
Referring to Fig.2, the step flow chart of the regular configuration method of the desensitization for showing the embodiment of the present invention one.It is appreciated thatFlow chart in this method embodiment, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S100 sends the accessing page request of accession page.
Illustratively, an automatic test script can be configured in computer equipment 2, for stepping on according to pre-defined rule simulationEach page or menu in land and access client App.
Illustratively, computer equipment 2 can also configure user graphical interface, and staff can be connect by graphical userMouth is transmitted into the accessing page request of each page to computer equipment 2.
Step S102 obtains corresponding URL (Uniform Resource locator system based on the accessing page requestOne Resource Locator) address, and the page hierarchical identification of the page is set according to the address URL.
For example, when entering the specified second level page from first level pages: due to including that triggering enters each two in first level pagesThe button of the grade page, each button are associated with the link or page path of a direction second level page.When some button is by with triggering,Then the link according to associated by the button that is triggered or page path obtain the second level page corresponding with the button that is triggeredURL。
It include the file path that band has levels in the address URL, i.e., the corresponding file path of the described page.Pass through the bandThe file path having levels can correspond to the page setup page hierarchical identification, and the page hierarchical identification includes the address URLIn the corresponding file path of the page, the page hierarchical identification of each page is identified by setting number.For example, can be withFor digital number, 060301,060302 etc. is set by each first level pages, the second level page under first level pages 060301 is setIt is set to 06030101, is 06030201 etc. by the second level page setup under first level pages 060302, and so on.It can be appreciated thatPass through the page hierarchical identification for each page configuration, so that it may obtain the page relation between each page.Certainly, this programmeIt is not limited to indicate the page hierarchical identification of each page using digital number, letter etc. can also be passed through.
Step S104 receives the business information that server is returned according to the accessing page request.
After the server receives the accessing page request, the accessing page request can be parsed, and in response toThe accessing page request obtains the business information from database.
Illustratively, the accessing page request is based on HTTP (hypertext transfer protocol, HyperText TransferProtocol) the HTTP request message of agreement.The HTTP request message can be grasped by existing HTTP resolverMake.Wherein, the HTTP request message includes: the method (GET) of request, URL, protocol version etc..
GET method, it is desirable that the URL resource positioned is placed on the data portion of response message by database, is passed back to computerEquipment 2.Therefore, database can be believed in response to " method " and " URL " in the HTTP request message, the business of returning responseBreath.
In the present embodiment, the business information can be the page of server return (e.g., based on the specific page of HTMLFace) in field information.The field information includes field name etc., which can be made of character or character string.
Whether step S106, being inquired in the page according to the business information includes sensitive information field.If so, intoEnter step S108;If not, entering step S100 to execute the investigation operation of sensitive information field for each and every one the next page.
Specifically, step S106 may include steps of:
S106A carries out each key character or key-strings that the business information and preset keyword symbol are concentratedMatching.The character or character string that the preset keyword symbol is concentrated are for being associated with all kinds of client's individual privacy data and certain passesThe sensitive traffic data of key, such as: customer name, customer name etc.;Address: home address, CompanyAddress etc.;Mailbox: companyMailbox, common mailbox etc.;Phone: mobile phone, fixed-line telephone etc.;Certificate: identity card, passport, officer's identity card etc.;Account number: bank card, visitorFamily number, the tax registration number, organization mechanism code, business license number etc.;Postcode: company's postcode, home zip code etc.;Date:Birthday etc..For example, character string " " is associated with passport NO., character string " " associated client title etc..
S106B, if being matched to the key character or key character concentrated in the business information including the key characterString then judges to include sensitive information field in the page.
When illustratively, such as in the business information being matched to &custName, then judge to include quick in the pageFeel information field, that is, includes being related to the sensitive information field of customer name.
The page hierarchical identification, the sensitive information field and corresponding shielding rules are established and are mapped by step S108Relationship, and the mapping relations are configured in desensitization rule list.
It is exemplary, configuration desensitization rule list, the desensitization rule list include shielding rules table, multiple sensitive information field lists andMultiple page hierarchical identification tables.The shielding rules table is used for storing each shielding rules table, each sensitive information field listMultiple field names of similar field in the page of storage different levels, each page hierarchical identification table have together for storingThe page hierarchical identification of class field.
It is associated between each table by external key, for example, some shielding rules in some shielding rules table are outsideOne sensitive information field list of key relationship maps, i.e. this shielding rules are suitable for the associated sensitive information field listAll sensitivity fields;The associated sensitive information field list passes through the corresponding page hierarchical relationship of another external key relationship mapsTable.
Step S110, judges the desensitization rule list is configured whether to finish, and if it is terminates process, is otherwise directed to downOne page repeats step S100~S110.
Since the field name of the similar field in the page of different levels is different, such as respectively id, name,Classname corresponds to the similar field such as customer name, customer name.Pass through the page level in above-mentioned desensitization rule listMapping relations between mark, the sensitive information field and corresponding shielding rules, so that the similar field of different levels canTo map the same field shielding rules, when the field shielding rules to certain class field make modification, the field shielding rulesIt can be implemented in all pages comprising such field, without to respectively to the progress field shielding of each pageThe modification of rule.
That is, the similar field to each level does unitized processing.For example, word in first level pages (such as 060301)The field of the entitled name of field and the three-level page be (such as in the field of Duan Mingwei id, the second level page (such as 06030101)0603010101) field of the entitled classname of field maps a field shielding rules in, when the field shielding rules are modifiedWhen, it is equivalent to the field shielding rule of the corresponding several pages of the several hierarchical identifications such as 060301,06030101 and 0603010101Then modified.It can be appreciated that using the technical solution of the present embodiment to the field shielding rules of the page each in complication systemRectification, avoid and each page rectified and improved respectively, effectively reduce rectification needed for workload, improve desensitization ruleUpgrade efficiency.
Optionally, step S108 further include: the place field type of the sensitive information field is stored in the desensitizationIn rule list.
The field type, such as list list type, map array type.The field type is for guiding work peopleMember's rapid increasing new sensitive information page.
Optionally, step S108 further include: the corresponding user right of the sensitive information field is configured to the desensitizationIn rule list.
The user right may include common employee's permission, department's assistant's permission, first-line management's permission, middle rank pipeReason personnel permission and senior executive's permission etc..The user right may also comprise: webpage logon rights, ca authentication webpage are stepped onRecord permission, system client logon rights etc..It is of course also possible to based on other user rights for considering setting.Different usersPermission, for example, lack of competence obtains the sensitive information field of corresponding higher others' member's permission of level-one for common employee.
After configuring desensitization rule list by S1~S6 step, the acquired corresponding URL of each page and business letterBreath is saved in specified storage region.Optionally, further include step S110, be used for: in the desensitization rule list delete andAdd sensitive information field and corresponding field shielding rules.
For example, the step of increasing sensitive information field and corresponding field shielding rules is as follows:
S110A is read in the corresponding URL of each page and business information from the storage region;
Whether S110B, inquiry include sensitive information field to be added, if in certain page including the sensitive letter to be addedWhen ceasing field, the page hierarchical identification, sensitive information field to be added and corresponding shielding rules are established into mapping relations, and willThe mapping relations are added in desensitization rule list.
Embodiment two
Referring to Fig. 3, show the embodiment of the present invention and data desensitization method step flow chart.It is appreciated that thisFlow chart in embodiment of the method, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S200 inputs the accessing request information of information for the target page to server transmission according to user.
The computer collocations have the user graphical interface for accessing the target pages, the user graphical interface packetInclude input frame, button, combobox and list etc..The input frame includes Text Entry, numeric input boxes, for inputting identityAuthentication information, such as user name, password.After the button is clicked by user, accessing request information can be generated and be sent to dataIn system, the accessing request information carries all kinds of supplemental characteristics, and the supplemental characteristic may include authentication information etc..
Step S202 receives the data to be desensitized that the server is returned based on the accessing request information.
After the server receives the accessing page request, the accessing page request can be parsed, and in response toThe accessing page request obtains the data to be desensitized from database.
The data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list by step S204.
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules,The page hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include preparatoryIt is configured at the corresponding page hierarchical identification of each page in the desensitization rule list, sensitive information field and field shielding ruleSub- mapping relations between then.
Step S204 may comprise steps of:
Step S204A obtains the page hierarchical identification of the target pages.Specifically, the target pages can be passed throughThe address URL obtain the page hierarchical identification of the page.
Step S204B is inquired corresponding with the target pages according to the page hierarchical identification from the desensitization rule listSensitive information field and corresponding field shielding rules.
The field shielding rules: it is character some or all of in sensitive information field replacing with designated character.For example, be directed to customer name, can by customer name surname and name select one and replace with designated character, or replace with fingerDetermine character;For passport NO., a part of number in passport NO. can be replaced with into preset characters, or will be in passport NO.Whole numbers replace with designated character.It should be noted that designated character can be " * " or other characters.
Step S204C executes the desensitization data de- according to the sensitive information field and the field shielding rulesQuick operation.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be withIt is used to provide for checking to user.
Optionally, further include step S206: the desensitization data being provided to the view layer progress page and are shown.
By data desensitization method described in embodiment two, by the page hierarchical relationship of target webpage, from desensitization ruleCorresponding sensitive information field and field shielding rules are obtained in table, can be rapidly carried out sensitive information masking operation, it is ensured thatThe sensitive traffic data of all kinds of client's individual privacy data and certain keys are not leaked.
Embodiment three
Referring to Fig. 4, show the embodiment of the present invention and data desensitization method step flow chart.It is appreciated that thisFlow chart in embodiment of the method, which is not used in, is defined the sequence for executing step.It is specific as follows.
Step S300 inputs the accessing request information of information for the target page to server transmission according to user.
Step S302 receives the data to be desensitized that the server is returned based on the accessing request information.
Step S304 intercepts the data to be desensitized, described to be stored in buffer zone after the data that desensitize are intercepted.
Specifically, blocker is called to carry out interception operation to the data to be desensitized.
Step S306 obtains the data to be desensitized from the buffer zone.
The data structure information for obtaining the data to be desensitized, may include partly shielding effect according to the data structure informationField.
The data to be desensitized are converted to desensitization data according to preconfigured desensitization rule list by step S308.
The desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules,The page hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include preparatoryIt is configured at the corresponding page hierarchical identification of each page in the desensitization rule list, sensitive information field and field shielding ruleSub- mapping relations between then.
Step S308 may comprise steps of:
Step S308A obtains the page hierarchical identification of the target pages.Specifically, the target pages can be passed throughThe address URL obtain the page hierarchical identification of the page.
Step S308B is inquired corresponding with the target pages according to the page hierarchical identification from the desensitization rule listSensitive information field and corresponding field shielding rules.
Step S308C executes the desensitization data de- according to the sensitive information field and the field shielding rulesQuick operation.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be withIt is used to provide for checking to user.
Example IV
Please continue to refer to Fig. 5, the program module schematic diagram of data desensitization system embodiment four of the present invention is shown.In this realityIt applies in example, data desensitization system 20 may include or be divided into one or more program modules, one or more program mouldBlock is stored in storage medium, and as performed by one or more processors, to complete the present invention, and can realize above-mentioned dataDesensitization method.The so-called program module of the embodiment of the present invention is the series of computation machine program instruction for referring to complete specific functionSection, the implementation procedure than program itself more suitable for description data desensitization system 20 in storage medium.Being described below will be specificIntroduce the function of each program module of the present embodiment:
Sending module 200 is believed for inputting information according to user to the access request that server is sent for the target pageBreath.
Computer collocations have the user graphical interface for accessing the target pages, and the user graphical interface includes defeatedEnter frame, button, combobox and list etc..The input frame includes Text Entry, numeric input boxes, for inputting authenticationInformation, such as user name, password.After the button is clicked by user, accessing request information can be generated and be sent to data systemIn, the accessing request information carries all kinds of supplemental characteristics, and the supplemental characteristic may include authentication information etc..
Receiving module 202, the data to be desensitized returned for receiving the server based on the accessing request information.
After the server receives the accessing page request, the accessing page request can be parsed, and in response toThe accessing page request obtains the data to be desensitized from database.
Desensitize module 204, for the data to be desensitized to be converted to desensitization number according to preconfigured desensitization rule listAccording to the desensitization rule list includes the mapping relations of page hierarchical identification, sensitive information field and field shielding rules, the pageFace hierarchical identification be it is pre-set according to the address URL of the target pages, the mapping relations include be preconfigured inIn the desensitization rule list between the corresponding page hierarchical identification of each page, sensitive information field and field shielding rulesSub- mapping relations: according to the page hierarchical identification of the target pages, inquiry and the page object from the desensitization rule listThe corresponding sensitive information field in face and corresponding field shielding rules;And it is shielded according to the sensitive information field and the fieldRule executes desensitization operation to the desensitization data.
The field shielding rules: it is character some or all of in sensitive information field replacing with designated character.For example, be directed to customer name, can by customer name surname and name select one and replace with designated character, or replace with fingerDetermine character;For passport NO., a part of number in passport NO. can be replaced with into preset characters, or will be in passport NO.Whole numbers replace with designated character.It should be noted that designated character can be " * " or other characters.
The data to be desensitized are performed after desensitization operation, and the desensitization data after being desensitized, which can be withIt is used to provide for checking to user.
In one embodiment, further include the blocking module 206, be used for: intercepting the data to be desensitized, it is described wait desensitizeBuffer zone is stored in after data are intercepted.
Specifically, blocker is called to carry out interception operation to the data to be desensitized.The desensitization module 204 is delayed from describedIt deposits region and obtains the data to be desensitized, and carry out desensitization operation according to the data to be desensitized.
In one embodiment, further include the display module 208, be used for: by the desensitization data be provided to view layer intoThe row page is shown.
By the page hierarchical relationship of target webpage, corresponding sensitive information field and field are obtained from desensitization rule listShielding rules can be rapidly carried out sensitive information masking operation, it is ensured that all kinds of client's individual privacy data and certain keysSensitive traffic data be not leaked.
Embodiment five
It is the hardware structure schematic diagram of the computer equipment of the embodiment of the present invention five refering to Fig. 6.It is described in the present embodimentComputer equipment 2 is that one kind can be automatic to carry out numerical value calculating and/or information processing according to the instruction for being previously set or storingEquipment.The computer equipment 2 can be computer, tablet computer etc..As shown, the computer equipment 2 is at least wrappedIt includes, but is not limited to, it is de- that connection memory 21, processor 22, network interface 23 and data can be in communication with each other by system busQuick system 20.Wherein:
In the present embodiment, memory 21 includes at least a type of computer readable storage medium, the readable storageMedium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device(RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory(EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..In some embodiments, memory21 can be the internal storage unit of computer equipment 2, such as the hard disk or memory of the computer equipment 2.In other implementationsIn example, memory 21 is also possible to the grafting being equipped on the External memory equipment of computer equipment 2, such as the computer equipment 20Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card(Flash Card) etc..Certainly, memory 21 can also both including computer equipment 2 internal storage unit and also including outside itStore equipment.In the present embodiment, memory 21 is installed on the operating system and types of applications of computer equipment 2 commonly used in storageSoftware, for example, example IV data desensitization system 20 program code etc..In addition, memory 21 can be also used for temporarily depositingStore up the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU),Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control computer equipment 2Overall operation.In the present embodiment, program code or processing data of the processor 22 for being stored in run memory 21, exampleAs operation data desensitize system 20, to realize the data desensitization method of embodiment two or three.
The network interface 23 may include radio network interface or wired network interface, which is commonly used inCommunication connection is established between the computer equipment 2 and other electronic devices.For example, the network interface 23 is for passing through networkThe computer equipment 2 is connected with exterior terminal, establishes data transmission between the computer equipment 2 and exterior terminalChannel and communication connection etc..The network can be intranet (Intranet), internet (Internet), whole world movementCommunication system (Global System of Mobile communication, GSM), wideband code division multiple access (WidebandCode Division Multiple Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the nothings such as Wi-FiLine or cable network.
It should be pointed out that Fig. 6 illustrates only the computer equipment 2 with component 20-23, it should be understood that simultaneouslyAll components shown realistic are not applied, the implementation that can be substituted is more or less component.
In the present embodiment, be stored in memory 21 the data desensitization system 20 can also be divided into one orThe multiple program modules of person, one or more of program modules are stored in memory 21, and are handled by one or moreDevice (the present embodiment is processor 22) is performed, to complete the present invention.
For example, Fig. 5 shows the program module schematic diagram of realization data desensitization 20 example IV of system, the embodimentIn, it is described that sending module 200 can be divided into based on data desensitization system 20, receiving module 202, desensitization module 204, interceptedModule 206 and display module 208.Wherein, the so-called program module of the present invention is a series of meters for referring to complete specific functionCalculation machine program instruction section, than program more suitable for describing execution of the data desensitization system 20 in the computer equipment 2Process.The concrete function of described program module 200-208 has had a detailed description in example IV, and details are not described herein.
Embodiment six
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magneticDisk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc.Answer function.The computer readable storage medium of the present embodiment desensitizes system 20 for storing data, realization when being executed by processorThe data desensitization method of embodiment two or three.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment sideMethod can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many casesThe former is more preferably embodiment.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hairEquivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skillsArt field, is included within the scope of the present invention.