1. Data desensitization explanationIn daily development needs, data desensitization is often encountered. For example, ID card numbers and mobile phone numbers need to be partially replaced with *. This can protect sensitive privacy information to a certain extent. So what is data desensitization? In cases involving customer security data or some commercially sensitive data, real data will be modified and provided for testing without violating system rules. For example, personal information such as ID number, mobile phone number, card number, customer number, etc. need to be desensitized. 2. Data Desensitization ImplementationData desensitization can be implemented by processing when searching for data in the database, or by processing after the data is found. The MySQL database query processing is documented here, which is implemented using mysql string functions. 3. SQL data desensitization implementation CONCAT(), LEFT() and RIGHT() string functions are used in combination. Please see the specific implementation below. CONCAT(str1,str2,…): Returns the string generated by the concatenation parameters Phone number desensitization sql: SELECT mobilePhone AS phone number before desensitization,CONCAT(LEFT(mobilePhone,3), '********' ) AS phone number after desensitization FROM t_s_user ID card number desensitization sql: Reference: https://blog.csdn.net/eagle89/article/details/80309608 This is the end of this article about the implementation of MYSQL (telephone number, ID card) data desensitization. For more relevant MYSQL data desensitization content, please search for previous articles on 123WORDPRESS.COM or continue to browse the following related articles. I hope everyone will support 123WORDPRESS.COM in the future! You may also be interested in:
|
<<: Docker-compose image release process analysis of springboot project
>>: Detailed explanation of the new background properties in CSS3
Download the rpm installation package MySQL offic...
Add an input file HTML control to the web page: &...
Let's first understand a wave of concepts, wh...
Preface: The most commonly used MySQL logical bac...
Table of contents 1. Introduction 2. Advantages 3...
Table of contents 1. Auxiliary functions 2. Examp...
Table of contents Preface 1. MySQL main storage e...
1. Environmental Preparation The IP address of ea...
When using vue to develop projects, the front end...
Uninstall MariaDB CentOS7 installs MariaDB instea...
If you think the system is slow and want to chang...
var numA = 0.1; var numB = 0.2; alert( numA + num...
1. Enter the virtualization vcenter, log in with ...
Introduction: Nginx (pronounced the same as engin...
This article example shares the specific code for...