Implementation of MYSQL (telephone number, ID card) data desensitization

Implementation of MYSQL (telephone number, ID card) data desensitization

1. Data desensitization explanation

In daily development needs, data desensitization is often encountered. For example, ID card numbers and mobile phone numbers need to be partially replaced with *. This can protect sensitive privacy information to a certain extent. So what is data desensitization?

In cases involving customer security data or some commercially sensitive data, real data will be modified and provided for testing without violating system rules. For example, personal information such as ID number, mobile phone number, card number, customer number, etc. need to be desensitized.

2. Data Desensitization Implementation

Data desensitization can be implemented by processing when searching for data in the database, or by processing after the data is found. The MySQL database query processing is documented here, which is implemented using mysql string functions.

3. SQL data desensitization implementation

CONCAT(), LEFT() and RIGHT() string functions are used in combination. Please see the specific implementation below.

CONCAT(str1,str2,…): Returns the string generated by the concatenation parameters
LEFT(str,len): Returns the len leftmost characters starting from the string str
RIGHT(str,len): Starting from the string str, return the rightmost len ​​characters

Phone number desensitization sql:

SELECT mobilePhone AS phone number before desensitization,CONCAT(LEFT(mobilePhone,3), '********' ) AS phone number after desensitization FROM t_s_user


ID card number desensitization sql:
SELECT idcard AS Unencrypted ID card, CONCAT(LEFT(idcard,3), '****' ,RIGHT(idcard,4)) AS Deencrypted ID card number FROM t_s_user


Reference: https://blog.csdn.net/eagle89/article/details/80309608

This is the end of this article about the implementation of MYSQL (telephone number, ID card) data desensitization. For more relevant MYSQL data desensitization content, please search for previous articles on 123WORDPRESS.COM or continue to browse the following related articles. I hope everyone will support 123WORDPRESS.COM in the future!

You may also be interested in:
  • A brief introduction to Java log desensitization framework sensitive
  • Detailed explanation of the code of Oracle custom desensitization function
  • Implementation method of data desensitization of java logs

<<:  Docker-compose image release process analysis of springboot project

>>:  Detailed explanation of the new background properties in CSS3

Recommend

Detailed tutorial on installing MySQL 5.7.20 on RedHat 6.5/CentOS 6.5

Download the rpm installation package MySQL offic...

HTML input file control limits the type of uploaded files

Add an input file HTML control to the web page: &...

Nginx reverse proxy forwards port 80 requests to 8080

Let's first understand a wave of concepts, wh...

How to restore a single database or table in MySQL and possible pitfalls

Preface: The most commonly used MySQL logical bac...

Detailed explanation of Vuex overall case

Table of contents 1. Introduction 2. Advantages 3...

About Vue's 4 auxiliary functions of Vuex

Table of contents 1. Auxiliary functions 2. Examp...

Let's learn about the MySQL storage engine

Table of contents Preface 1. MySQL main storage e...

Implementation of LNMP for separate deployment of Docker containers

1. Environmental Preparation The IP address of ea...

How to use Dayjs to calculate common dates in Vue

When using vue to develop projects, the front end...

Alibaba Cloud Centos7.3 installation mysql5.7.18 rpm installation tutorial

Uninstall MariaDB CentOS7 installs MariaDB instea...

Centos 7 64-bit desktop version installation graphic tutorial

If you think the system is slow and want to chang...

js precise calculation

var numA = 0.1; var numB = 0.2; alert( numA + num...

Graphical steps of zabbix monitoring vmware exsi host

1. Enter the virtualization vcenter, log in with ...

Analysis of the process of implementing Nginx+Tomcat cluster under Windwos

Introduction: Nginx (pronounced the same as engin...

JavaScript implements the generation of 4-digit random verification code

This article example shares the specific code for...