TWI539323B - Personal data inventory system and method - Google Patents
Personal data inventory system and method Download PDFInfo
- Publication number
- TWI539323B TWI539323B TW103134691A TW103134691A TWI539323B TW I539323 B TWI539323 B TW I539323B TW 103134691 A TW103134691 A TW 103134691A TW 103134691 A TW103134691 A TW 103134691A TW I539323 B TWI539323 B TW I539323B
- Authority
- TW
- Taiwan
- Prior art keywords
- unit
- inventory
- personal data
- file
- information
- Prior art date
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Description
本發明為一種個人資料盤點系統與方法,針對個人資料的搜尋具有高效率以及高精確度,可強化組織內部對個人資料的掌握程度,可應用至資訊安全產業上,如資料防護系統、個人資料盤點系統等。 The invention relates to a personal data inventory system and method, which has high efficiency and high precision for searching personal data, and can strengthen the internal knowledge of personal data in the organization, and can be applied to the information security industry, such as data protection system and personal data. Inventory system, etc.
現代企業經營與個人資料之使用非常密切,無論人事、客服、銷售、行銷、企劃…等部門在其日常活動中皆有可能使用到個人資料,除了企業本身的員工個人資料外,對於服務業、買賣流通業或是零售業來說,更會有數量龐大的客戶資料,其他例如電信服務業或醫療產業等,其所持有客戶資料當然更而甚之,因此,一個效率高且精準度高的盤點系統,對於企業在個人資料管理的工作上是非常重要的。 Modern business operations and the use of personal data are very close, regardless of personnel, customer service, sales, marketing, planning, etc., in their daily activities, it is possible to use personal data, in addition to the company's own employee personal information, for the service industry, In the case of trading in the circulation industry or the retail industry, there will be a large number of customer data. Others, such as the telecommunications service industry or the medical industry, will certainly have more customer data, so one is more efficient and more accurate. The inventory system is very important for enterprises in the work of personal data management.
一種個人資料盤點系統的技術領域主要包含檔案文件之內容分析、個人資料盤點系統架構暨其延伸出的資料保密性及資料去識別化技術。 The technical field of a personal data inventory system mainly includes content analysis of archive files, personal data inventory system architecture and its extended data confidentiality and data de-identification technology.
在檔案文件之內容分析方面,習用技術多以副檔名決定該檔案類型,當一內含身分識別資料的待分析文件,其副檔名被竄改後,文件內容將無法分析,同時其內含之身分識別資料也無法被分析,該檔案將成為漏網之魚,發生誤判的情形,在中文姓名識別方面,習用技術缺少易混 淆之日常用詞識別以及稱謂與頭銜之過濾機制,容易導致誤判。 In the aspect of content analysis of archive files, the conventional technology mostly determines the file type by the name of the auxiliary file. When the file to be analyzed containing the identity identification data is falsified, the file content cannot be analyzed, and the content of the file is not included. The identification data of the identity can not be analyzed. The file will become a fish of the net, and the misjudgment will occur. In terms of Chinese name recognition, the conventional technology lacks easy mixing. Confusing daily word recognition and the filtering mechanism of title and title can easily lead to misjudgment.
關於系統架構,習用技術多以標準主從式架構進行,即用戶端搜集資料後上傳至伺服器,嗣後在伺服器端進行集中運算分析,此方法於少量的用戶數量時,確為一可用的方案,惟用戶數量提昇時,過度集中的運算將大幅提高伺服器的負載程度。 Regarding the system architecture, the conventional technology is mostly based on the standard master-slave architecture, that is, the user collects the data and uploads it to the server, and then performs centralized operation analysis on the server side. This method is indeed available when the number of users is small. Solution, but when the number of users increases, the over-concentrated operation will greatly increase the load on the server.
對於資料保密性而言,由個人電腦傳送至中央伺服器時,習用技術均採用「資料先集中後處理」方式,在個人電腦上搜集含有個人資料的檔案後,透過實體線路或無線通訊方式傳輸至中央伺服器;此過程一旦遭到封包監聽側錄,安全性與保密性將蕩然無存。再者,上傳至伺服器的資料如以原始檔案形式保存,等待分析模組進行統計,此時中央伺服器內含大量身分識別資料,將成為一高風險個資外洩標的。 For the confidentiality of data, when the personal computer is transmitted to the central server, the conventional technology adopts the method of "concentrating and processing the data first". After collecting the file containing the personal data on the personal computer, it is transmitted through the physical line or wireless communication. To the central server; once this process is blocked by the packet monitoring, security and confidentiality will disappear. Furthermore, the data uploaded to the server is saved in the original file format, waiting for the analysis module to perform statistics. At this time, the central server contains a large amount of identity identification data, which will become a high-risk asset.
由此可見,上述習用技術仍有諸多缺失,實非一良善之設計者,而亟待加以改良。 It can be seen that there are still many shortcomings in the above-mentioned conventional technology, which is not a good designer, but needs to be improved.
本案發明人鑑於上述習用方式所衍生的各項缺點,乃亟思加以改良創新,並經苦心孤詣潛心研究後,終於成功研發完成一種個人資料盤點系統與方法。 In view of the shortcomings derived from the above-mentioned conventional methods, the inventor of the present invention succeeded in researching and developing a personal data inventory system and method after painstaking research and development.
本發明提供一種個人資料盤點系統與方法。此系統提供身分識別資料之識別技術,可自動化的找出作業系統中含有身分識別資料之檔案,搭配資料去識別化技術,將身分識別資料加上遮罩處理,符合現行之法規規範。盤點出的資訊將集中至中央伺服器進行分類統計,提供條件化 查詢方式產製報表,協助企業或組織等掌握內部電腦中,含有個人資料的檔案之散佈與運用情形是否符合標準。 The invention provides a personal data inventory system and method. The system provides identification technology for identity identification data, which can automatically find the file containing the identification data of the operation system, match the data to identify the technology, and add the identification data to the mask to comply with the current regulations. The information that is counted out will be centralized to the central server for classification and statistics, providing conditionalization. Query method Production report, assist enterprises or organizations to master the internal computer, whether the distribution and application of files containing personal data conform to the standard.
達成上述發明目的之一種個人資料盤點系統與方法,設計一種讀取電子計算機或同等載體上之所有電子化文件檔案之方法,分析其文件內容,透過預先定義之身分識別資料類別進行搜索,可包含身分證字號、中文姓名、台灣地址、電話、生日,以及其他個人隱私資料如信用卡號等,輔以台灣個人資料保護法之調整降低搜索之誤判機率;搜索到的資料結果依照不同的身分識別資料類別,分別統計數量並記錄佐證資料,同時以一更具備保密性之作法,在不影響結果之可利用性的前提下,以兩階段方式防止資料被竊取盜用:一階段為降低佐證資料的可識別性,以遮罩方式去除佐證資料內部分關鍵字,遮罩動作為使用固定特殊字元符號(例如○●*但不限於)取代原先字串中的部分文字(例如「王小明」取代為「王○明」),達成資料去識別化之目的,不致洩漏個人資料。二階段為利用加密演算法將盤點結果進行加密處理,,確保傳輸過程如遭第三者側錄封包,其資料也無法被使用,其中加密演算法不限特定之方法,例如:MD5、DES、RSA、字元混淆等演算法,其實施方式係為所屬領域人員所熟知,故不再贅述。盤點結果內容包括個人基本資訊與盤點結果資訊,該檔案上傳至中央伺服器後,進行解密並儲存,管理者可透過自定義的條件查詢結果,檢視受統計之個人電腦上的個人資料保存之類型與數量,並可供產製報表,以檔案或紙本列印方式留存此查詢結果。此一更具效率的系統架構,將資料搜索、分類與遮罩等動作,於資料在用戶端被蒐集當下即運算處理完畢,伺服器僅需將此分類完整的資料集中保存即可,大幅減少運算量,減輕伺服器負 載。 A personal data inventory system and method for achieving the above object, a method for reading all electronic file files on an electronic computer or the equivalent carrier, analyzing the contents of the file, and searching through a predefined identification data category, which may include Identity card number, Chinese name, Taiwan address, telephone number, birthday, and other personal privacy information such as credit card number, supplemented by the Taiwan Personal Data Protection Act to reduce the chance of misjudgment of search; the searched data results are identified according to different identity Category, separately count the quantity and record the supporting information, and at the same time, in a more confidential manner, prevent the theft of data in a two-stage manner without affecting the availability of the results: one stage is to reduce the supporting information. Identifyively, remove some of the keywords in the supporting data in a masked manner. The masking action replaces some of the text in the original string with a fixed special character symbol (for example, ○●* but not limited to) (for example, "Wang Xiaoming" is replaced by " Wang ○ ming"), to achieve the purpose of identification of information, not to leak Personal data. The second stage is to encrypt the inventory result by using the encryption algorithm, to ensure that the transmission process is not recorded by the third party, and the data cannot be used. The encryption algorithm is not limited to specific methods, such as MD5, DES, Algorithms such as RSA, character confusion, and the like are well known to those skilled in the art, and therefore will not be described again. The results of the inventory include personal basic information and inventory result information. After the file is uploaded to the central server, it is decrypted and stored. The administrator can view the type of personal data stored on the statistical personal computer through the customized condition query result. With the quantity, and available for production reports, the results of this query are retained by way of file or paper printing. This more efficient system architecture, the data search, classification and masking actions, when the data is collected at the user end, the operation is completed, the server only needs to save the classified data in a centralized manner, which greatly reduces The amount of calculation, reduce the server negative Loaded.
本發明提供一種個人資料盤點系統,包括:一客戶端以及一伺服器端,其中該客戶端更包括:一內容分析單元,係針對任一待分析文件進行身分識別資料分析,產生一盤點結果;一記錄單元,接受該盤點結果及紀錄,並加密該盤點結果;一傳輸單元,係傳送該記錄單元之加密後的該盤點結果至該伺服器端;其中該伺服器端更包括:一設定單元,係設定一單位資訊與個人資料等級;一接收單元,係接收並解密該客戶端之加密後的該盤點結果;一儲存單元,係儲存該單位資訊與個人資料等級,以及解密後的該盤點結果;一查詢單元,係針對該單位資訊與個人資料等級以及該盤點結果進行查詢;以及一統計單元,係針對該單位資訊與個人資料等級以及該盤點結果進行統計。 The present invention provides a personal data inventory system, comprising: a client and a server, wherein the client further comprises: a content analysis unit, which performs identity identification data analysis on any file to be analyzed to generate an inventory result; a recording unit that accepts the result and record of the inventory and encrypts the result of the inventory; a transmission unit transmits the encrypted result of the inventory of the recording unit to the server; wherein the server further includes: a setting unit Set a unit of information and personal data level; a receiving unit receives and decrypts the encrypted result of the counting of the client; a storage unit stores the unit information and personal data level, and the decrypted inventory Resulting; a query unit queries the unit information and personal data level and the inventory result; and a statistical unit performs statistics on the unit information and personal data level and the inventory result.
其中該待分析文件一或複數個。其中進行身分識別資料分析,係包含針對該待分析文件內之身分證字號、中文姓名、生日、電話、台灣地址,及信用卡號進行分析。其中身分證字號與信用卡號,皆輔以驗證碼之概念進行判斷,以避免誤判之情形;中文姓名驗證全台之常見姓氏,並過濾易混淆之日常用詞,同時識別稱謂以及頭銜,以降低中文姓名之誤判情形;以及台灣地址部分則可識別夾雜中文數字之地址,以降低台灣地址之誤判情形。其中該盤點結果,包括複數個員工基本資訊與複數個員工 盤點資訊。其中各該員工基本資訊係包括單位名稱、電腦名稱、盤點次數、員工帳號、員工姓名、系統名稱。其中各該員工盤點資訊係包括檔案名稱、總筆數、身分證字號筆數、姓名筆數、電話筆數、地址筆數、生日筆數、信用卡號筆數、個人資料等級、佐證資料。其中該傳輸單元係利用網路通訊協定進行傳送。其中該單位資訊與個人資料等級,係包含單位編號、單位名稱及個人資料之高、中、低等級。 One or more of the files to be analyzed. The identification of the identity identification data includes analyzing the identity card number, Chinese name, birthday, telephone number, Taiwan address, and credit card number in the document to be analyzed. The identity card number and credit card number are judged by the concept of verification code to avoid misjudgment; the Chinese name verifies the common surname of the whole Taiwan, and filters the confusing daily words, and identifies the title and title to reduce The misjudgment of Chinese names; and the address part of Taiwan can identify the address of Chinese characters inclusive to reduce the misjudgment of Taiwan addresses. The result of the inventory includes a plurality of basic information of employees and a plurality of employees. Inventory information. The basic information of each employee includes the name of the unit, the name of the computer, the number of counts, the employee's account number, the employee's name, and the system name. The employee inventory information includes the file name, the total number of pens, the number of the number of the identity card, the number of the number of the number of the number of the phone, the number of the number of the phone, the number of the number of the number of the birthday, the number of the number of the credit card, the number of the credit card, the level of the personal data, and the supporting information. The transmission unit is transmitted using a network communication protocol. The unit information and personal data level include the unit number, unit name and personal information of the high, medium and low levels.
本發明提供一種個人資料盤點方法,包含下列步驟:一客戶端之一待分析文件進入一內容分析單元,依序為判定該待分析文件之檔案類型、取得該待分析文件之文字內容、分析該待分析文件之身分識別資料,判定該待分析文件是否為機敏文件,以及產生一盤點結果;將該盤點結果及相關資料含出現次數與佐證資料送至一記錄單元,該記錄單元將該盤點結果及相關資料含出現次數與佐證資料進行加密;一傳輸單元將加密後之該盤點結果上傳至一伺服器端;該伺服器端透過一設定單元提供設定一單位資訊與個人資料等級;一接收單元利用網路通訊協定接收並解密來自該客戶端之加密後的該盤點結果;一儲存單元儲存該單位資訊與個人資料等級及解密後的該盤點結果;一查詢單元利用該儲存單元內之該單位資訊與個人資料等級及該盤點結果,提供電腦名稱、員工帳號、員工姓名、個人資料筆數、系統名稱篩選條件之查詢;以及一統計單元利用該儲存單元內之該單位資訊與個人資料等級及該盤點結果,提供一單位盤點資訊統計。 The invention provides a personal data inventory method, comprising the following steps: one of the clients to be analyzed to enter a content analysis unit, in order to determine the file type of the file to be analyzed, obtain the text content of the file to be analyzed, analyze the Determining the identity of the file to be analyzed, determining whether the file to be analyzed is an alert file, and generating an inventory result; sending the inventory result and related data including the number of occurrences and the supporting information to a recording unit, the recording unit And the related data includes the number of occurrences and the supporting data for encryption; a transmission unit uploads the encrypted result of the counting to a server; the server provides a unit information and a personal data level through a setting unit; Receiving and decrypting the encrypted inventory result from the client by using a network communication protocol; a storage unit stores the unit information and the personal data level and the decrypted result of the inventory; and an inquiry unit uses the unit in the storage unit Information and personal data levels and results of the inventory, providing computer name , Employee accounts, employee name, profile items, the system name of the query filtering criteria; and a statistical unit by using the unit level information and personal data and the results of the inventory within the storage unit, the unit provides a statistical inventory information.
上列詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the preferred embodiments of the present invention is intended to be limited to the scope of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.
綜上所述,本案不但在空間型態上確屬創新,並能較習用物品增進上述多項功效,應已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 In summary, this case is not only innovative in terms of space type, but also can enhance the above-mentioned multiple functions compared with the customary items. It should fully meet the statutory invention patent requirements of novelty and progressiveness, and apply for it according to law. This invention patent application, in order to invent invention, to the sense of virtue.
100‧‧‧客戶端 100‧‧‧Client
101‧‧‧待分析文件 101‧‧‧ Documents to be analysed
110‧‧‧內容分析單元 110‧‧‧Content Analysis Unit
120‧‧‧記錄單元 120‧‧‧recording unit
121‧‧‧盤點結果檔 121‧‧‧ inventory results file
130‧‧‧傳輸單元 130‧‧‧Transportation unit
140‧‧‧服器端 140‧‧‧ server end
210‧‧‧設定單元 210‧‧‧Setting unit
220‧‧‧接收單元 220‧‧‧ receiving unit
230‧‧‧統計單元 230‧‧‧Statistics unit
240‧‧‧查詢單元 240‧‧‧Query unit
250‧‧‧儲存單元 250‧‧‧ storage unit
260‧‧‧管理者 260‧‧‧Manager
270‧‧‧單位資訊與個人資料等級設定 270‧‧‧ Unit information and personal data level setting
第1圖為本發明個人資料盤點系統之客戶端示意圖。 Figure 1 is a schematic diagram of a client of the personal data inventory system of the present invention.
第2圖為本發明個人資料盤點系統之伺服器端示意圖。 Figure 2 is a schematic diagram of the server end of the personal data inventory system of the present invention.
第3圖為本發明個人資料盤點系統之伺服器端示意圖。 Figure 3 is a schematic diagram of the server end of the personal data inventory system of the present invention.
第4圖為本發明個人資料盤點系統之伺服器端示意圖。 Figure 4 is a schematic diagram of the server end of the personal data inventory system of the present invention.
第5圖為本發明個人資料盤點系統之伺服器端示意圖。 Figure 5 is a schematic diagram of the server end of the personal data inventory system of the present invention.
第6圖為本發明個人資料盤點系統之伺服器端示意圖。 Figure 6 is a schematic diagram of the server end of the personal data inventory system of the present invention.
第7圖為本發明個人資料盤點系統之伺服器端示意圖。 Figure 7 is a schematic diagram of the server end of the personal data inventory system of the present invention.
為利 貴審查委員了解本發明之技術特徵、內容與優點及其所能達到之功效,茲將本發明配合附圖,並以實施例之表達形式詳細說明如下,而其中所使用之圖式,其主旨僅為示意及輔助說明書之用,未必為本發明實施後之真實比例與精準配置,故不應就所附之圖式的比例與配置關係解讀、侷限本發明於實際實施上的權利範圍,合先敘明。 The technical features, contents, and advantages of the present invention, as well as the advantages thereof, can be understood by the reviewing committee, and the present invention will be described in detail with reference to the accompanying drawings. The subject matter is only for the purpose of illustration and description. It is not intended to be a true proportion and precise configuration after the implementation of the present invention. Therefore, the scope and configuration relationship of the attached drawings should not be interpreted or limited. First described.
請參考第1圖所示,為本發明個人資料盤點系統之客戶端流程圖,客戶端100將一待分析文件101進入內容分析單元110後,內容分析單元110針對待分析文件101進行檔案類型之判定,其判定流程包含分析檔案之檔頭與檔尾,針對檔頭與檔尾進行格式比對後確認該檔案之類型。於確認該檔案之類型後,即針對不同檔案類型至檔案中對應區塊取得檔案之文字內容。待取得文字內容後,即進行身分識別資料之內容分析。先前技術對於待分析文件並未偵測真實檔案類型,例如一個內含身分識別 資料的待分析文件,若其副檔名被更改後,文件內容便無法分析,同時身分識別資料也無法被分析出來,發生誤判的情形。然而,本發明係偵測真實檔案類型,即使隨意更改副檔名,檔案的內容與其中之身分識別資料仍然會被分析出來,不會發生誤判。 Please refer to FIG. 1 , which is a client flowchart of the personal data inventory system of the present invention. After the client 100 enters the to-be-analyzed file 101 into the content analysis unit 110 , the content analysis unit 110 performs file type determination on the file 101 to be analyzed. Judging, the decision process includes analyzing the file header and the file end, and confirming the file type after comparing the format of the file header and the file end. After confirming the type of the file, the text content of the file is obtained for the different file types to the corresponding blocks in the file. After the text content is obtained, the content analysis of the identity identification data is performed. The prior art does not detect the true file type for the file to be analyzed, such as an embedded identity identification. If the file name is to be analyzed, if the file name is changed, the file content cannot be analyzed, and the identity identification data cannot be analyzed, and a misjudgment occurs. However, the present invention detects the real file type, and even if the ad file name is arbitrarily changed, the content of the file and the identity identification data therein will still be analyzed, and no misjudgment will occur.
身分識別資料之內容分析部分包括針對各式身分識別資料之分析功能,含身分證字號、中文姓名、生日、電話、台灣地址,及信用卡號:其中身分證字號與信用卡號皆輔以驗證碼之概念進行判斷,避免此二者之誤判情形;中文姓名與台灣地址的部分修正習用技術多以正規表示式分析之情形,針對台灣之個人資料保護法進行調整:中文姓名部分驗證全台之常見姓氏,並過濾易混淆之日常用詞,同時識別稱謂以及頭銜(例如「王小明董事」或「王董事小明」),以降低中文姓名之誤判情形;台灣地址部分則可識別夾雜中文數字之地址(例如「民族路五段12號」或「民族路5段十二號」),以降低台灣地址之誤判情形。 The content analysis part of the identity identification data includes analysis functions for various identification data, including identity card number, Chinese name, birthday, telephone number, Taiwan address, and credit card number: where the identity card number and credit card number are supplemented by the verification code. The concept is judged to avoid the misjudgment of the two; the partial revision of the Chinese name and the Taiwan address is mostly based on the formal expression analysis, and the Taiwan Personal Data Protection Law is adjusted: the Chinese name part verifies the common surname of the whole Taiwan And filter the confusing daily words, and identify the title and title (such as "Wang Xiaoming Director" or "Wang Director Xiao Ming") to reduce the misjudgment of Chinese names; Taiwan address part can identify the address with Chinese characters (for example) "No. 12 of Section 5 of National Road" or "No. 12 of Section 5 of National Road" to reduce the misjudgment of Taiwan's address.
待分析文件101於內容分析單元110中完成身分識別資料之內容分析後,取得該文件中各式身分識別資料之出現次數,若該文件有出現身分證字號或是一定數量之中文姓名,且有其他式樣之身分識別資料出現,則將該文件視為含身分識別資料之機敏文件。蒐集其各式身分識別資料之出現次數,並蒐集各式身分識別資料之佐證資料後,送至記錄單元120。 After the analysis file 101 completes the content analysis of the identity identification data in the content analysis unit 110, the number of occurrences of each type of identity identification data in the file is obtained, and if the document has an identity card number or a certain number of Chinese names, and If other types of identity identification data appear, the file is considered to be a sensitive file containing identity identification data. The number of occurrences of each type of identity identification data is collected, and the supporting information of each type of identity identification data is collected and sent to the recording unit 120.
待相關資料含出現次數與佐證資料送至記錄單元120之後,為在不影響結果可利用性之前提下,保障嗣後傳輸的資料安全,遂以兩階段方式防止資料被竊取盜用:一階段為進行佐證資料去識別化之行為,將佐證資料的部分區段進行遮罩的動作,此遮罩之動作為使用固定特 殊字元符號(例如○●*等)取代原先字串中的部分文字(例如「王小明」取代為「王○明」),達成資料去識別化之目的,避免屆時伺服器端進行資料蒐集時可能導致之個人資料外洩風險。二階段為將盤點結果檔121加密,此一加密動作為避免屆時相關資料傳輸至伺服器端時,於傳輸中途遭到攔截所導致之資料外洩問題,其中加密演算法不限特定之方法,例如:MD5、DES、RSA、字元混淆等演算法,其實施方式係為所屬領域人員所熟知,故不再贅述。所有待分析文件101皆完成內容分析,並加密記錄於同一檔案後,此一內容已加密之檔案即為盤點結果檔121。 After the relevant data is included in the number of occurrences and the supporting information is sent to the recording unit 120, it is provided to ensure the security of the data transmitted after the result is not affected, and the data is stolen and stolen in a two-stage manner: To support the identification of the data, the part of the supporting data is masked, and the action of the mask is fixed. The special character symbol (for example, ○●*, etc.) replaces some of the text in the original string (for example, "Wang Xiaoming" is replaced by "Wang ○ Ming"), and the purpose of identifying the data is achieved, so as to avoid the data collection at the server end. Risk of leakage of personal data that may result. The second stage is to encrypt the inventory result file 121. This encryption operation is to avoid the leakage of data caused by interception in the middle of transmission when the relevant data is transmitted to the server at that time, wherein the encryption algorithm is not limited to a specific method. For example, MD5, DES, RSA, character confusion and other algorithms, the implementation manners of which are well known to those skilled in the art, and therefore will not be described again. After all the files to be analyzed 101 complete the content analysis and are encrypted and recorded in the same file, the file whose content is encrypted is the inventory result file 121.
取得盤點結果檔121後,透過客戶端100的傳輸單元130,與伺服器端140建立連線,並將已完成加密之盤點結果檔121上傳至伺服器端140,至此完成客戶端100之流程。同時資料搜索、分類與遮罩等動作已於用戶端運算處理完畢,大幅減少伺服器端運算量,減輕伺服器負載。 After the inventory result file 121 is obtained, the connection unit 121 is established through the transmission unit 130 of the client 100, and the encrypted result file 121 of the encrypted interface is uploaded to the server end 140, and the process of the client 100 is completed. At the same time, data search, classification and masking operations have been processed at the user end, which greatly reduces the amount of computation on the server side and reduces the load on the server.
另請參考第2~7圖,係為本發明個人資料盤點系統之伺服器端示意圖,由圖中可知,其主要步驟包括:使用者260利用服器端140之設定單元210將進行單位資訊與個人資料等級設定270,並儲存於儲存單元250,單位資訊與個人資料等級設定270中單位資訊內容包括:單位編號與單位名稱(如第3圖所示),做為單位統計使用,個人資料等級內容包括:高、中與低等資訊(如第4圖所示)作為個資等級判斷之依據。 Please refer to the second to seventh embodiments, which are schematic diagrams of the server end of the personal data inventory system of the present invention. As shown in the figure, the main steps include: the user 260 uses the setting unit 210 of the server terminal 140 to perform unit information and The personal data level setting 270 is stored in the storage unit 250, and the unit information content in the unit information and personal data level setting 270 includes: a unit number and a unit name (as shown in FIG. 3), used as a unit statistical, personal data level. The content includes: high, medium and low information (as shown in Figure 4) as the basis for the judgment of individual assets.
其次接收單元220負責接收盤點結果檔121並將其解密後儲存於儲存單元250,盤點結果檔121內容為員工基本資訊與員工盤點資訊,作為個人資料數量統計之用,如第5圖所示,員工基本資訊內容包括:單 位名稱、電腦名稱、盤點次數、員工帳號、員工姓名、系統名稱等資訊,如第6圖所示,員工盤點資訊內容包括:檔案名稱、總筆數、身分證字號筆數、姓名筆數、電話筆數、地址筆數、生日筆數、信用卡號筆數、個人資料等級、佐證資料等資訊。 The receiving unit 220 is responsible for receiving the inventory result file 121 and decrypting it and storing it in the storage unit 250. The content of the inventory result file 121 is the employee basic information and the employee inventory information, as the personal data quantity statistics, as shown in FIG. 5, Basic employee information includes: Information such as the name of the bit, the name of the computer, the number of counts, the employee's account number, the name of the employee, and the name of the system. As shown in Figure 6, the employee's inventory information includes: file name, total number of pens, number of identity cards, number of names, Information such as the number of telephones, the number of addresses, the number of birthdays, the number of credit card numbers, the level of personal data, and supporting information.
其後統計單元230將儲存在儲存單元250的員工基本資訊與員工盤點資訊依據單位進行統計作業,如第7圖所示,統計結果為單位之盤點統計,內容包括:盤點電腦數、含個人資料檔案電腦數、個人資料檔案總數、個人資料總筆數、高度關注檔案數、中度關注檔案數、低度關注檔案數、身分證字號筆數、姓名筆數、生日筆數、電話筆數、地址筆數、信用卡號筆數等資訊。 Thereafter, the statistical unit 230 performs statistical operations on the employee basic information stored in the storage unit 250 and the employee inventory information according to the unit. As shown in FIG. 7, the statistical result is the inventory count of the unit, and the content includes: counting the number of computers, including personal data. The number of files, the total number of personal data files, the total number of personal data, the number of files of high concern, the number of files of moderate concern, the number of files of low concern, the number of identity cards, the number of names, the number of birthdays, the number of calls, Information such as the number of addresses and the number of credit card numbers.
而查詢單元240根據電腦名稱、員工帳號、員工姓名、個人資料筆數、系統名稱等查詢條件進行查詢,查詢結果內容為員工之盤點資訊。 The query unit 240 performs the query according to the computer name, the employee account number, the employee name, the number of personal data, the system name, and the like, and the query result content is the employee's inventory information.
至此,以上述流程,最終可找出企業內部所有個人資料,以盡到良善保管人之責任。企業可依據自身需求,排定各部門針對個人電腦或伺服器進行個人資料盤點,找出可能儲存個人資料之文件、清冊等,嗣後產製報表,讓各部門逐一清查。另可搭配資料遺失防護端點系統,提供用戶端完整資料外洩防護監控,進而防止個人資料對外洩漏,避免客戶個人資料外流衍生之法律事件,保護企業商業利益及形象。 At this point, with the above process, it is finally possible to find out all the personal data inside the company in order to fulfill the responsibility of the good custodian. Enterprises can arrange for each department to conduct personal data inventory for personal computers or servers according to their own needs, find out the documents, inventory, etc. that may store personal data, and then produce production reports, so that each department can check them one by one. In addition, it can be combined with the data loss protection endpoint system to provide complete data leakage prevention monitoring of the user terminal, thereby preventing personal data leakage, avoiding legal events arising from the outflow of customer personal data, and protecting the business interests and image of the enterprise.
本發明所提供之個人資料盤點系統與方法,其他習用技術相互比較時,更具有下列之優點: The personal data inventory system and method provided by the present invention have the following advantages when compared with other conventional technologies:
1.本發明之個人資料盤點系統與方法提供了一更具效率的系統架構,將 資料搜索、分類與遮罩等動作於用戶端處理完畢,大幅減少伺服器端運算量,減輕伺服器負載。 1. The personal data inventory system and method of the present invention provides a more efficient system architecture, Data search, classification, and masking are processed at the user end, which greatly reduces the amount of computation on the server side and reduces the load on the server.
2.本發明之個人資料盤點系統與方法透過了分析檔頭與檔尾的方式,可確切判定該檔案之真實類型,並不受副檔名之影響。 2. The personal data inventory system and method of the present invention can determine the true type of the file by analyzing the manner of the file header and the file end, and is not affected by the file name.
3.本發明之個人資料盤點系統與方法針對中文姓名提供過濾易混淆之日常用詞,同時識別稱謂以及頭銜,以降低中文姓名之誤判情形。 3. The personal data inventory system and method of the present invention provides a daily confusing and confusing term for Chinese names, and identifies titles and titles to reduce the misjudgment of Chinese names.
4.本發明之個人資料盤點系統與方法配合了遮罩與加密之動作,使盤點結果不僅具備去識別化之效果,並得以低風險的方式傳送至伺服器端,避免了資料外洩的問題。 4. The personal data inventory system and method of the present invention cooperate with the action of masking and encrypting, so that the counting result not only has the effect of de-identifying, but also can be transmitted to the server end in a low-risk manner, thereby avoiding the problem of data leakage. .
5.本發明可依據個人資料筆數來設定不同之個人資料等級,提供管理者對個人資料等級之彈性設定。 5. The present invention can set different personal data levels according to the number of personal data, and provide managers with flexible settings for personal data levels.
6.本發明可針對盤點結果進行統計之功能,依據單位資訊與個人資料等級設定,提供管理者快速獲得單位或員工之個人資料檔案的個人資料等級分佈。 6. The invention can perform the function of counting for the counting result, and according to the unit information and the personal data level setting, the manager can quickly obtain the personal data level distribution of the personal data file of the unit or the employee.
7.本發明可利用特殊查詢條件對盤點資訊進行查詢,提供管理者於檢索查詢盤點資訊時之便利性,特殊查詢條件包括:電腦名稱、員工帳號、員工姓名、個人資料筆數、系統名稱等。 7. The invention can query the inventory information by using special query conditions, and provides convenience for the administrator to search and query the inventory information. The special query conditions include: computer name, employee account number, employee name, number of personal data, system name, etc. .
8.本發明可提供員工盤點資訊之詳細資訊,內容包括:檔案名稱、總筆數、身分證字號筆數、姓名筆數、生日筆數、電話筆數、地址筆數、信用卡號筆數、個人資料等級、佐證資料等資訊。 8. The invention can provide detailed information of employee inventory information, including: file name, total number of pens, number of identity card numbers, number of names, number of birthdays, number of telephones, number of addresses, number of credit card numbers, Personal information level, supporting information and other information.
9.本發明之佐證盤點資訊可提供檔案內含身分識別資料之佐證資料,提供管理者判斷參考。 9. The supporting inventory information of the present invention can provide supporting information for the identity identification data in the file, and provide a manager's judgment reference.
綜上所述,本案不僅於技術思想上確屬創新,並具備習用之傳統方法所不及之上述多項功效,已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of technical thinking, but also has many of the above-mentioned functions that are not in the traditional methods of the past. It has fully complied with the statutory invention patent requirements of novelty and progressiveness, and applied for it according to law. Approved this invention patent application, in order to invent invention, to the sense of virtue.
100‧‧‧客戶端 100‧‧‧Client
101‧‧‧待分析文件 101‧‧‧ Documents to be analysed
110‧‧‧內容分析單元 110‧‧‧Content Analysis Unit
120‧‧‧記錄單元 120‧‧‧recording unit
121‧‧‧盤點結果檔 121‧‧‧ inventory results file
130‧‧‧傳輸單元 130‧‧‧Transportation unit
140‧‧‧服器端 140‧‧‧ server end
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103134691A TWI539323B (en) | 2014-10-06 | 2014-10-06 | Personal data inventory system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103134691A TWI539323B (en) | 2014-10-06 | 2014-10-06 | Personal data inventory system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201614542A TW201614542A (en) | 2016-04-16 |
TWI539323B true TWI539323B (en) | 2016-06-21 |
Family
ID=56361234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW103134691A TWI539323B (en) | 2014-10-06 | 2014-10-06 | Personal data inventory system and method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI539323B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107846393B (en) * | 2017-09-11 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Real person authentication method and device |
-
2014
- 2014-10-06 TW TW103134691A patent/TWI539323B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
TW201614542A (en) | 2016-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11361104B1 (en) | Method and system for securing data stored in a cloud-based software system | |
US11188657B2 (en) | Method and system for managing electronic documents based on sensitivity of information | |
CN107577939B (en) | Data leakage prevention method based on keyword technology | |
AU2014237406B2 (en) | Method and apparatus for substitution scheme for anonymizing personally identifiable information | |
US7266846B2 (en) | System and method of facilitating compliance with information sharing regulations | |
US11256825B2 (en) | Systems and methods for securing data in electronic communications | |
US20120005720A1 (en) | Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches | |
US20130262418A1 (en) | Information management policy based on relative importance of a file | |
CN115238286A (en) | Data protection method and device, computer equipment and storage medium | |
US9471665B2 (en) | Unified system for real-time coordination of content-object action items across devices | |
CN111639179B (en) | Batch customer information privacy control method and device for bank front-end query system | |
US20240062232A1 (en) | System And Method For Allocating Digital Data According To Valu of Digital Content | |
CN104517068A (en) | Audio file processing method and equipment | |
CN117421753A (en) | Dynamic data desensitizing method, device, electronic equipment and computer storage medium | |
Prasanthi et al. | Cyber forensic science to diagnose digital crimes-a study | |
JP3705439B1 (en) | Personal information search program, personal information management system, and information processing apparatus with personal information management function | |
EP3765987B1 (en) | Systems and methods of querying a federated database in conformance with jurisdictional privacy restrictions | |
TWI539323B (en) | Personal data inventory system and method | |
JP2007034651A (en) | File management system, information processor and file management program | |
Diesburg et al. | Is your data gone? Measuring user perceptions of deletion | |
CN115470256A (en) | System and method for managing, tracing and checking trace data | |
CN114780935A (en) | Information technology consultation terminal based on big data analysis | |
Li et al. | Data security and risk assessment in cloud computing | |
CN112200655B (en) | Application review method, device, electronic device and storage medium | |
CN105099993A (en) | Data interaction method based on proxy platform and device and system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |