Got it

[ Technical Dry Goods ] Introduction to DLS Sensitive Data Protection Method

116 0 0 0 0


Hello, everyone!

Today I'm going to introduce you DAYU


Background of sensitive data protection

Privacy protection management is a function provided by data security for the protection of sensitive data. Every enterprise has sensitive data: trade secrets, intellectual property rights, key business information, business partner information, or customer information. You can automatically discover sensitive data in the system by configuring sensitive data identification rules. In the privacy protection management module, you can prevent sensitive data from being misused, leaked or stolen intentionally or unintentionally through data desensitization, data watermark embedding, etc., so as to help companies take reasonable measures to protect the confidentiality and confidentiality of their sensitive data. Completeness.


Ways to protect sensitive data

Privacy protection management provides the following sensitive data protection methods:

   Static desensitization

Data security has built-in efficient and rich desensitization algorithms. You can mask, truncate and hash sensitive data in the original data by configuring the source data table and associate desensitization strategies , and support desensitized data to be written to the target End data table. You can use the target table data to provide external data services to provide basic guarantee for the safe use of data. Data watermark is embedded.

   Data watermark embedding

Data security supports embedding watermarks into original data to ensure data availability. The watermarked data is transparent, usable, and concealed, and it is not easy to be discovered and cracked by the outside. The watermark can be traced to the source after the data is leaked, so that the security incident can be accurately located and held accountable.

   Data watermark traceability

Once the sensitive data embedded through the data watermark is leaked, data traceability can extract the watermark by importing the leaked file and running the traceability task to accurately locate the leaking unit and responsible person.

Data static desensitization

In actual production, there will be data analysis departments that need to perform data analysis on the data, and there are sensitive information in the data, but they have to open up permissions. At this time, sensitive data can be desensitized, and the authenticity of the data is not leaked while meeting business needs. The privacy protection management desensitization algorithm module provides 15 built-in desensitization algorithms for your choice. Before you choose an algorithm, you can use our pre-provided built-in algorithm test function to ensure that you have selected a suitable algorithm.


Data watermark embedding

Data watermark embedding can well regulate the data outsourcing process, and realize effective process management of the data outsourcing of internal personnel in the enterprise. Unauthorized users need to approve before data outsourcing. After approval, data watermarking technology can be used to generate data that can be sent File. Data watermark embedding can realize data copyright protection. By embedding watermark information representing ownership in a relational database, the database can be linked to its owner, thereby realizing data copyright protection. Data watermark embedding can quickly trace the source of leaked data. By unblocking the leaked data file, detect the existence of the watermark based on the integrity of the data file and the traces of the watermark information, and quickly identify the watermark information (data source address, distribution unit, person in charge) , Distribution time, etc.), so as to accurately locate and hold accountable security incidents.

scenes to be used:


   Proprietary Statement

For example, " owned by XX Co., Ltd."

   integrity protection

Whether the content of the database has been tampered with and where has it been tampered with

   User tracking (tracing the source)

Find out the source of the leak based on the embedded user watermark


Data watermark traceability

Data traceability is mainly used to quickly trace the source of leaked data. The integrity of the leaked data files and the traces of the watermark information are used to detect the existence of the watermark, and quickly identify the watermark information, so as to accurately locate and hold accountable security incidents.



Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.