Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- Change History
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Identification Templates Supported by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Data Watermarking
- Data Usage Audit
Show all
PRESNM
Retain the first n and last m characters and mask the content in the middle part of the specified character string.
Request Parameters
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
algorithm |
Yes |
String |
Algorithm type, for example, PRESNM |
parameters |
Yes |
For details, see Table 2. |
Parameters for configuring a data masking algorithm |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
type |
Yes |
String |
Character masking methods are described as follows:
|
method |
Yes |
String |
Masking method If type is set to RAND, this parameter can be set as follows:
|
n |
Yes |
Int |
Retain the first n characters. |
m |
Yes |
Int |
Retain the last m characters. |
Example Request
{ "mask_strategies": [ { "name": "col1", "algorithm": "PRESNM", "parameters": { "type": "CHAR", "n": 1, "m": 1, "method": "*" } } ], "data": [ { "col1": "test" } ] } Or { "mask_strategies": [ { "name": "col1", "algorithm": "PRESNM", "parameters": { "type": "RAND", "n": 1, "m": 1, "method": "BOTH" } } ], "data": [ { "col1": "test" } ] }
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.