Tag

data masking

2 views collected around this technical thread.

IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Javadata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
Architecture Digest
Architecture Digest
Apr 24, 2025 · Backend Development

Configurable Data Desensitization in Spring Boot Using Custom Annotations and Serializer

This article demonstrates how to create a configurable data‑masking solution for Spring Boot APIs by defining a custom @DataMasking annotation, implementing masking strategies, building a custom Jackson serializer, integrating it via an AnnotationIntrospector, and testing the functionality with a sample controller.

Custom AnnotationJavaSerializer
0 likes · 8 min read
Configurable Data Desensitization in Spring Boot Using Custom Annotations and Serializer
IT Architects Alliance
IT Architects Alliance
Mar 29, 2025 · Information Security

Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison

The article explains why data masking is essential for protecting sensitive information, then details three implementation methods—SQL, Java (with open‑source plugins), and the MyBatis‑Mate‑Sensitive‑Jackson ORM extension—comparing their principles, code examples, advantages, limitations, performance, suitable scenarios, and cost considerations.

DatabaseJavaMyBatis
0 likes · 17 min read
Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison
Code Ape Tech Column
Code Ape Tech Column
Mar 8, 2025 · Information Security

Enterprise Data Desensitization Solutions Using MyBatis and Fastjson

The article explains why data desensitization is essential for enterprises, classifies common masking techniques, and provides concrete implementation guides for database, log, and output level masking in Java applications using MyBatis plugins and Fastjson filters, complete with sample code and configuration.

JavaMyBatisbackend security
0 likes · 12 min read
Enterprise Data Desensitization Solutions Using MyBatis and Fastjson
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Nov 5, 2024 · Backend Development

Solve Long Precision Loss in Spring Boot 3 with Jackson and Custom Annotations

This article demonstrates how to handle Java Long precision loss in Spring Boot 3 front‑end displays, configures Jackson to serialize Long as String, uses @JsonValue for single‑property serialization, and creates custom annotations with a SensitiveSerializer for data masking, complete with code examples and screenshots.

Custom AnnotationJSON serializationJackson
0 likes · 9 min read
Solve Long Precision Loss in Spring Boot 3 with Jackson and Custom Annotations
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Sep 27, 2024 · Backend Development

How to Mask Sensitive Data in Spring Boot Logs with Logback

Learn how to protect personal data in Spring Boot 3.2.5 applications by customizing Logback's PatternLayout and appender to mask fields such as name, phone, password, and email, with step‑by‑step code examples, configuration snippets, and handling of object logging.

Java LoggingLogbackSensitive Data
0 likes · 7 min read
How to Mask Sensitive Data in Spring Boot Logs with Logback
macrozheng
macrozheng
Sep 5, 2024 · Information Security

How to Automatically Mask Sensitive Data in Spring Boot with Jackson Annotations

This article explains how to implement unified data desensitization in Java Spring Boot applications by creating custom annotations, enums, serializers, and utility methods that automatically mask personal information during JSON serialization, complete with code examples and test results.

Backend DevelopmentJacksonJava
0 likes · 13 min read
How to Automatically Mask Sensitive Data in Spring Boot with Jackson Annotations
Selected Java Interview Questions
Selected Java Interview Questions
Jul 20, 2024 · Backend Development

Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus

This article introduces MyBatis-Mate, an official MyBatis‑Plus extension offering enterprise‑level capabilities such as dictionary binding, field encryption, data masking, dynamic DDL maintenance, sharding, multi‑datasource switching, performance logging, and data permission control, with detailed Spring Boot integration examples.

JavaMyBatisSharding
0 likes · 15 min read
Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus
macrozheng
macrozheng
May 7, 2024 · Information Security

10 Proven Strategies to Secure Your API Data

Ensuring API data security involves encrypting transmission, using signatures, token authentication, timestamps, nonces, rate limiting, black/white lists, data masking, and parameter validation, with detailed explanations of symmetric/asymmetric encryption, HTTPS, RSA, MD5, and practical implementation steps for robust protection.

API securityRate Limitingdata masking
0 likes · 13 min read
10 Proven Strategies to Secure Your API Data
Top Architect
Top Architect
Apr 15, 2024 · Backend Development

Implementing Data Masking in SQL, Java, and MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and personal information using SQL string functions, a Java library (sensitive‑plus), and the MyBatis‑Mate Sensitive Jackson plugin, providing complete code examples, configuration files, and test results for backend developers.

Backend DevelopmentJavaMyBatis
0 likes · 11 min read
Implementing Data Masking in SQL, Java, and MyBatis‑Mate Sensitive Jackson
Yum! Tech Team
Yum! Tech Team
Feb 6, 2024 · Information Security

Log Data Masking Solution for Java Spring Applications

This article analyzes the growing risk of personal data leakage, defines data masking, compares common log‑masking techniques, and presents a comprehensive Java‑Spring solution that combines annotation‑based marking, custom Jackson serializers, and extended SLF4J methods to achieve precise, low‑overhead log masking.

JavaLog MaskingSlf4j
0 likes · 8 min read
Log Data Masking Solution for Java Spring Applications
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 8, 2024 · Databases

AIKOS Open Source Community Weekly Newsletter – SQLE Release, Community Updates, and Selected Database Articles

This newsletter announces the SQLE 3.2401.0-pre1 release with automatic data masking, shares recent community development work, outlines upcoming plans, and curates several technical articles covering MySQL EXPLAIN enhancements, transaction fundamentals, hardware considerations for database stability, consistent backup techniques, and efficient JDBC connection testing.

CommunityDatabaseMySQL
0 likes · 6 min read
AIKOS Open Source Community Weekly Newsletter – SQLE Release, Community Updates, and Selected Database Articles
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 7, 2023 · Information Security

Secure API Responses with Data Masking, Encryption, and Jackson Annotations

This article explains practical methods to protect sensitive API data in Spring Boot applications, covering encryption, masking, access control, logging, HTTPS, and database security, and demonstrates three implementation approaches: SQL‑level masking, field‑level encryption, and custom Jackson serialization using annotations and a contextual serializer.

API securityJacksonJava
0 likes · 8 min read
Secure API Responses with Data Masking, Encryption, and Jackson Annotations
Weimob Technology Center
Weimob Technology Center
Jul 25, 2023 · Information Security

How to Secure Data: Practical Guide to Masking and Encryption Strategies

This comprehensive guide explains why modern enterprises must shift from network‑centric protection to data‑centric security, detailing practical approaches for data masking and storage encryption, evaluating regulatory requirements, outlining solution selection, and providing step‑by‑step implementation practices to safeguard sensitive information.

Data Securitycompliancedata masking
0 likes · 29 min read
How to Secure Data: Practical Guide to Masking and Encryption Strategies
HomeTech
HomeTech
Jun 21, 2023 · Information Security

Transparent Data Masking with AutoProxy Middleware at AutoHome

This article describes AutoHome's data security challenges in the big‑data era and explains how the self‑developed AutoProxy encryption middleware provides transparent, compliant data masking across legacy and new sensitive data, reducing cost, improving performance, and enabling automated masking workflows.

Transparent Encryptionauto-proxycompliance
0 likes · 8 min read
Transparent Data Masking with AutoProxy Middleware at AutoHome
Sohu Tech Products
Sohu Tech Products
Jan 4, 2023 · Information Security

Implementing Data Masking in Java Using Custom Annotations and Jackson Serializer

This article explains how to protect user privacy in a Java backend by creating a custom @PrivacyEncrypt annotation and a Jackson serializer that automatically mask sensitive fields such as phone numbers, emails, and ID cards during JSON serialization.

AnnotationsJacksonJava
0 likes · 10 min read
Implementing Data Masking in Java Using Custom Annotations and Jackson Serializer
Top Architect
Top Architect
Jan 4, 2023 · Backend Development

Implementing Data Masking in Java Backend Using Custom Annotations and Jackson

This article explains how to protect user privacy by applying data desensitization in a Java backend, using a custom annotation and Jackson serializer to mask sensitive fields such as phone numbers, emails, IDs, and names during JSON serialization.

Backend DevelopmentCustom AnnotationJackson
0 likes · 11 min read
Implementing Data Masking in Java Backend Using Custom Annotations and Jackson
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Dec 9, 2022 · Backend Development

Masking Sensitive Fields in SpringBoot APIs: A Step-by-Step Guide

Learn three practical methods to protect sensitive API response data in SpringBoot 2.4.12—complete with SQL examples, custom Jackson annotations, and a reusable serializer to automatically mask fields like ID numbers during JSON output.

API securityJacksonJava
0 likes · 5 min read
Masking Sensitive Fields in SpringBoot APIs: A Step-by-Step Guide
Top Architect
Top Architect
Sep 13, 2022 · Information Security

Implementing Data Masking in MySQL and Java with MyBatis-Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers and ID cards using SQL functions, introduces Java masking libraries, and provides a complete MyBatis-Mate Sensitive Jackson example with configuration, custom strategies, entity annotations, controller endpoints, and sample responses.

JavaMyBatisSQL
0 likes · 11 min read
Implementing Data Masking in MySQL and Java with MyBatis-Mate Sensitive Jackson
Architect
Architect
Jul 28, 2022 · Information Security

Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson

This article demonstrates how to mask sensitive data such as phone numbers, ID cards, and emails in MySQL and Java applications by combining SQL string functions with the MyBatis‑Mate Sensitive Jackson plugin, providing complete configuration, custom strategies, and runnable Spring Boot examples.

JavaMyBatisSQL
0 likes · 9 min read
Implementing Data Masking in MySQL and Java Using MyBatis‑Mate Sensitive Jackson