Tag:desensitization
-
Time:2021-2-15
Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]
-
Time:2021-1-12
Introduction Recently, there has been a hot issue calledCan the front end limit user screenshots? When I see this question, I feel that the questioner should be cute, or have been tormented by the product manager or sb leader. Because there is a very straight answer below: No matter how good the technical means limit […]
-
Time:2021-1-7
Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]
-
Time:2021-1-6
Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]
-
Time:2020-9-28
Abstract:In some cases, certain columns of some tables contain sensitive data. How can specific people see the specific data? 1 demand In some cases, certain columns of some tables contain sensitive data (e.g. user‘s mobile phone number in the user information table). Naturally, we only want “Administrator” users to see these sensitive data, while other […]
-
Time:2019-12-26
For information security requirements, in the process of data distribution and synchronization, it is necessary to desensitize sensitive fields containing user identity information, including user name, ID number, address and so on. Here is the code of user-defined function CREATE OR REPLACE FUNCTION F_GET_SENSITIVE(IN_STR VARCHAR, IN_TYPE NUMBER) RETURN VARCHAR2 IS V_STR_LENGTH NUMBER; V_NAME VARCHAR2(1000); V_N […]