Skip to content

Custom Creation

Scan Scope

  1. Data Types: The data types that need to be scanned.

  2. Data Filtering: The data range that needs to be scanned.

Define Matching Rules

  1. Rule Name: The name of the current data rule.

  2. Regular Expression: Used to match the data strings that need to be encrypted.

  3. Data Test: Input a string of data, click test, and verify if it matches the regular expression.

Note

Test data will not be saved.

Sensitive Data Processing

  1. Desensitization Fields: Supports three options: all fields, specified fields, and excluded fields; by default, [Specified Fields] is selected;

  2. Desensitization Methods:

    • General Encryption: Replace all matched sensitive data with *;

    • Partial Encryption: Replace part of the sensitive data string with , retaining some sensitive information, for example: phone number ****1005;

    • Replacement Encryption: Replace all matched sensitive data with a specified string, the replacement is irreversible;

    • MD5 Encryption: Encrypt any data into a fixed-length string, the replacement is irreversible.

  3. Add Tags: You can add custom tags to the desensitized data; multiple tags are separated by [,].

Characteristics of MD5 Encryption
  • Fixed Length: No matter how long the string is, the encrypted length is the same, i.e., 32 bits;
  • Highly Dispersed: Any changes to the original data, even minor ones, will result in significant differences in the computation results;
  • Irreversible Operation: Given the computation result, it is impossible to obtain the original string through inverse operations, but it can still be filtered and located.