DATA MASKING
First Claim
1. A method for data masking in database operations, the method comprising:
- intercepting a database query;
identifying at least one field in the query that includes masked data;
unmasking the query, the unmasking on a processor and comprising substituting the masked data with equivalent real values;
sending the unmasked query to a database engine;
intercepting a result provided by the database engine in response to the unmasked query;
identifying values in the result corresponding to sensitive information;
masking the result, the masking on a processor and comprising substituting the values in the result corresponding to sensitive information with masked data equivalents; and
returning the masked result to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects include data masking in database operations including intercepting a database query and identifying masked data in the query. The masked data in the query is unmasked by substituting the masked data with equivalent real values. The unmasked query is sent to the database engine, and a result provided by the database engine in response to the unmasked query is intercepted. The values in the result that correspond to sensitive information are identified. The result is masked by substituting the values in the result corresponding to sensitive information with masked equivalents. The masked result is returned to a user.
-
Citations
20 Claims
-
1. A method for data masking in database operations, the method comprising:
-
intercepting a database query; identifying at least one field in the query that includes masked data; unmasking the query, the unmasking on a processor and comprising substituting the masked data with equivalent real values; sending the unmasked query to a database engine; intercepting a result provided by the database engine in response to the unmasked query; identifying values in the result corresponding to sensitive information; masking the result, the masking on a processor and comprising substituting the values in the result corresponding to sensitive information with masked data equivalents; and returning the masked result to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system configured to perform data masking in database operations, the system comprising:
-
a memory having computer readable computer instructions; and a processor for executing the computer readable instructions, the instructions including; intercepting a database query; identifying at least one field in the query that includes masked data; unmasking the query, the unmasking comprising substituting the masked data with equivalent real values; sending the unmasked query to a database engine; intercepting a result provided by the database engine in response to the unmasked query; identifying values in the result corresponding to sensitive information; masking the result, the masking comprising substituting the values in the result corresponding to sensitive information with masked data equivalents; and returning the masked result to a user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for data masking in database operations, the computer program product comprising:
-
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code executable by a processor to; intercept a database query; identify at least one field in the query that includes masked data; unmask the query, the unmasking comprising substituting the masked data with equivalent real values; send the unmasked query to a database engine; intercept a result provided by the database engine in response to the unmasked query; identify values in the result corresponding to sensitive information; mask the result, the masking comprising substituting the values in the result corresponding to sensitive information with masked data equivalents; and return the masked result to a user. - View Dependent Claims (20)
-
Specification