CN106027503A - Cloud storage data encryption method based on TPM - Google Patents
Cloud storage data encryption method based on TPM Download PDFInfo
- Publication number
- CN106027503A CN106027503A CN201610300097.7A CN201610300097A CN106027503A CN 106027503 A CN106027503 A CN 106027503A CN 201610300097 A CN201610300097 A CN 201610300097A CN 106027503 A CN106027503 A CN 106027503A
- Authority
- CN
- China
- Prior art keywords
- tpm
- data
- key
- cloud storage
- platform module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention discloses a cloud storage data encryption method based on a TPM. An implementation process of the cloud storage data encryption method is as follows: when a data file of a user is necessary to store, a secret key for encrypting data to be stored is generated in the TPM; then, the secret key is encrypted and stored in external storage equipment; and, when data is necessary to decrypt, the TPM extracts and decrypts the encrypted secret key from the external equipment at first, and then, decrypts data of the user by using the decrypted secret key. Compared with the prior art, the cloud storage data encryption method based on the TPM has the advantages that: the TPM is introduced into an encryption model; a security data encryption model based on the TPM is constructed; therefore, the data security is effectively ensured; the data encryption and secret key management problems in cloud storage can be effectively solved; and the cloud storage data encryption method based on the TPM is high in practicability, wide in application range and easy to popularize.
Description
Technical field
The present invention relates to field of cloud computer technology, a kind of cloud storage data ciphering method practical, based on TPM.
Background technology
A kind of application that cloud storage is actually in cloud computing, is developing progressively an industry.It passes through Intel Virtualization Technology and distributed file system, will be distributed over the hardware storage device of different geographical by Intel Virtualization Technology by its United Dispatching, forms one cloud storage server, provides data storage and management to service for client.Under cloud storage pattern, Data Hosting is stored in third party and stores in platform, and user need not be concerned about how cloud storage service area realizes these functions, worries about without for the work such as upgrading computer, virus killing.But providing the user easily simultaneously, there is also potential safety hazard.Data Hosting is mass computing center on network, and just departing from the span of control of data owner, its safety is highly dependent on cloud service provider.Such that make data preserve with the form of ciphertext, still can there are some potential safety hazards in cloud service provider.
Actually one entity computer having software and hardware of credible calculating platform, it can be provided the user by the credible calculating platform of self and ensure that the safety of computer software, hardware and all data is with credible.Its basic thought is: utilize the credibility of credible platform, provides the user a safe and reliable calculating service.Set up the most basic function that inter-trust domain is credible calculating platform, and under the management of this inter-trust domain by authentic authentication one-level one-level to whole network delivery, be finally reached and make the most believable purpose of network really.And creditable calculation modules TPM is credible calculating platform " root of trust ", it protects the hardware layer of calculating equipment by bottom hardware.
In consideration of it, now provide a kind of based on above-mentioned cloud storage and the data ciphering method of credible calculating platform TPM.
Summary of the invention
The technical assignment of the present invention is for above weak point, it is provided that a kind of cloud storage data ciphering method practical, based on TPM.
A kind of cloud storage data ciphering method based on TPM, it realizes process: when subscriber data file needs storage, in credible platform module TPM, generate the key that encryption needs the data of storage, then this key is encrypted, then preserves to External memory equipment;When data need deciphering, first credible platform module TPM extracts from external equipment and deciphers encryption key, the most again by the key decrypted user data after deciphering.
Above-mentioned subscriber data file encryption storing process is: subscriber data file encryption uses symmetric key, first the symmetric key that this encryption file is used is submitted to credible platform module TPM, store in the fdisk specified after the public key encryption of the unsymmetrical key then generated by credible platform module TPM, and ensure that the user that encryption key can be authorized to accesses.
The detailed process of subscriber data file encryption storage is:
User is to cloud storage server application memory space, and after application, cloud storage server is that it sets up corresponding memory space;
Meanwhile, credible platform module TPM is a pair symmetric key of its stochastic generation, a pair unsymmetrical key and for verifying the digital certificate of identity, and wherein digital certificate is sent to client, for later authentication;Symmetric key is stored on hard disk by after the public key encryption of unsymmetrical key;
During storage data, after cloud storage server notice credible platform module TPM checking identity, user sends data;
Credible platform module TPM extracts from hidden partition and uses private key decrypted symmetric key, for encryption data, then the data after encryption is stored in cloud storage server.
The detailed process of credible platform module TPM checking user identity is: first user sends request to cloud storage server, cloud storage server notice credible platform module TPM verifies its identity, i.e. credible platform module TPM asks for digital certificate to user, user is sent to credible platform module TPM by after digital certificate public key encryption, after credible platform module TPM deciphers with private key, verify the legitimacy of its identity, after identity validation, setting up vpn tunneling, user sends data.
Data decrypting process in External memory equipment is: when user asks for data, and credible platform module TPM, from the secrete key multi-subarea extracting symmetric key of External memory equipment, sends to user after solving ciphertext data.
When user needs to use storage data file, the symmetric key that cryptograph files is used is read from corresponding External memory equipment, the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
A kind of based on TPM cloud storage data ciphering method of the present invention, has the advantage that
A kind of based on TPM cloud storage data ciphering method that the present invention provides, by TPM trusted module is incorporated in Encryption Model, build the data encryption model of the safety of safety based on TPM, the safety of data is effectively ensured, the effective data encryption solved in cloud storage and cipher key management considerations, practical, applied widely, it is easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 realizes schematic diagram for the present invention.
Detailed description of the invention
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
In order to solve the potential safety hazard during cloud storage, ensure the data that user is hosted in third party cloud storage platform.As shown in Figure 1, a kind of based on TPM cloud storage data ciphering method of the present invention, credible platform module TPM trusted module is incorporated in Encryption Model, builds the data encryption model of the safety of safety based on credible platform module TPM.
It realizes process:
When subscriber data file needs storage, credible platform module TPM generates the key that encryption needs the data of storage, then this key is encrypted, then preserves to External memory equipment;When data need deciphering, first credible platform module TPM extracts from external equipment and deciphers encryption key, the most again by the key decrypted user data after deciphering.
Owing to TPM is hardware device, disabled user cannot break through in theory, therefore can ensure that the key of user and the safety of data.
Above-mentioned subscriber data file encryption storing process is: subscriber data file encryption uses symmetric key, first the symmetric key that this encryption file is used is submitted to credible platform module TPM, store in the fdisk specified after the public key encryption of the unsymmetrical key then generated by credible platform module TPM, and ensure that the user that encryption key can be authorized to accesses.
The detailed process of subscriber data file encryption storage is:
User is to cloud storage server application memory space, and after application, cloud storage server is that it sets up corresponding memory space;
Meanwhile, credible platform module TPM is a pair symmetric key of its stochastic generation, a pair unsymmetrical key and for verifying the digital certificate of identity, and wherein digital certificate is sent to client, for later authentication;Symmetric key is stored on hard disk by after the public key encryption of unsymmetrical key;
During storage data, after cloud storage server notice credible platform module TPM checking identity, user sends data;
Credible platform module TPM extracts from hidden partition and uses private key decrypted symmetric key, for encryption data, then the data after encryption is stored in cloud storage server.
The detailed process of credible platform module TPM checking user identity is: first user sends request to cloud storage server, cloud storage server notice credible platform module TPM verifies its identity, i.e. credible platform module TPM asks for digital certificate to user, user is sent to credible platform module TPM by after digital certificate public key encryption, after credible platform module TPM deciphers with private key, verify the legitimacy of its identity, after identity validation, setting up vpn tunneling, user sends data.
Data decrypting process in External memory equipment is: when user asks for data, and credible platform module TPM, from the secrete key multi-subarea extracting symmetric key of External memory equipment, sends to user after solving ciphertext data.
When user needs to use storage data file, the symmetric key that cryptograph files is used is read from corresponding External memory equipment, the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
In the present invention, the symmetric key that encryption file is used is submitted to credible platform module TPM, the PKI of the unsymmetrical key then generated by credible platform module TPM is encrypted, and is stored in the fdisk specified afterwards, and ensures that data encryption key can access with authorized user.Here specifying SRK is appointment father's key that unsymmetrical key generates, because SRK can the most any user access.SRK, as one-level key (also referred to as master key), is stored in safety zone, with it, the encryption of secondary key information is generated secondary key.The like, father node encipherment protection child node, constitute whole hierarchical encryption tree construction.In key hierarchical tree, leaf node is all various data encryption key and realizes data signing key.These actions should be all coherent close case operation.By contrast, the encryption system of pure software is difficult to the operation of close case.If but the critical data such as master key, AES, program Solidification in hardware device TPM, a difficult problem for close case operation just can be solved.
When needs use key, read the symmetric key that used of encryption data from relevant position, and the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
Above-mentioned detailed description of the invention is only the concrete case of the present invention; the scope of patent protection of the present invention includes but not limited to above-mentioned detailed description of the invention; suitably change that it is done by claims of a kind of based on TPM cloud storage data ciphering method of any present invention of meeting and any described technical field those of ordinary skill or replace, all should fall into the scope of patent protection of the present invention.
Claims (6)
1. a cloud storage data ciphering method based on TPM, it is characterized in that, it realizes process and is: when subscriber data file needs storage, generates the key that encryption needs the data of storage in credible platform module TPM, then this key is encrypted, then preserves to External memory equipment;When data need deciphering, first credible platform module TPM extracts from external equipment and deciphers encryption key, the most again by the key decrypted user data after deciphering.
A kind of cloud storage data ciphering method based on TPM the most according to claim 1, it is characterized in that, above-mentioned subscriber data file encryption storing process is: subscriber data file encryption uses symmetric key, first the symmetric key that this encryption file is used is submitted to credible platform module TPM, store in the fdisk specified after the public key encryption of the unsymmetrical key then generated by credible platform module TPM, and ensure that the user that encryption key can be authorized to accesses.
A kind of cloud storage data ciphering method based on TPM the most according to claim 2, it is characterised in that the detailed process of subscriber data file encryption storage is:
User is to cloud storage server application memory space, and after application, cloud storage server is that it sets up corresponding memory space;
Meanwhile, credible platform module TPM is a pair symmetric key of its stochastic generation, a pair unsymmetrical key and for verifying the digital certificate of identity, and wherein digital certificate is sent to client, for later authentication;Symmetric key is stored on hard disk by after the public key encryption of unsymmetrical key;
During storage data, after cloud storage server notice credible platform module TPM checking identity, user sends data;
Credible platform module TPM extracts from hidden partition and uses private key decrypted symmetric key, for encryption data, then the data after encryption is stored in cloud storage server.
A kind of cloud storage data ciphering method based on TPM the most according to claim 3, it is characterized in that, the detailed process of credible platform module TPM checking user identity is: first user sends request to cloud storage server, cloud storage server notice credible platform module TPM verifies its identity, i.e. credible platform module TPM asks for digital certificate to user, user is sent to credible platform module TPM by after digital certificate public key encryption, after credible platform module TPM deciphers with private key, verify the legitimacy of its identity, after identity validation, set up vpn tunneling, user sends data.
A kind of cloud storage data ciphering method based on TPM the most according to claim 2, it is characterized in that, data decrypting process in External memory equipment is: when user asks for data, credible platform module TPM, from the secrete key multi-subarea extracting symmetric key of External memory equipment, sends to user after solving ciphertext data.
A kind of cloud storage data ciphering method based on TPM the most according to claim 5, it is characterized in that, when user needs to use storage data file, the symmetric key that cryptograph files is used is read from corresponding External memory equipment, the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610300097.7A CN106027503A (en) | 2016-05-09 | 2016-05-09 | Cloud storage data encryption method based on TPM |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610300097.7A CN106027503A (en) | 2016-05-09 | 2016-05-09 | Cloud storage data encryption method based on TPM |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106027503A true CN106027503A (en) | 2016-10-12 |
Family
ID=57099082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610300097.7A Pending CN106027503A (en) | 2016-05-09 | 2016-05-09 | Cloud storage data encryption method based on TPM |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027503A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778326A (en) * | 2016-11-28 | 2017-05-31 | 福建升腾资讯有限公司 | A kind of method and system for realizing movable storage device protection |
CN106878293A (en) * | 2017-01-23 | 2017-06-20 | 深圳市中博科创信息技术有限公司 | Date storage method and device based on cloud storage platform |
CN107733766A (en) * | 2017-11-02 | 2018-02-23 | 平安科技(深圳)有限公司 | Safe interconnected method, device, equipment and storage medium between cloud platform proprietary network |
CN108449753A (en) * | 2018-03-22 | 2018-08-24 | 北京可信华泰科技有限公司 | A kind of method that cell phone apparatus reads the data in trusted computation environment |
CN108768978A (en) * | 2018-05-16 | 2018-11-06 | 浙江大学 | A kind of remote storage method of servicing and system based on SGX |
CN108989015A (en) * | 2017-05-31 | 2018-12-11 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus of encryption |
CN109462474A (en) * | 2018-11-14 | 2019-03-12 | 郑州云海信息技术有限公司 | The generation method and relevant apparatus of Fernet key in a kind of Keystone |
CN109564615A (en) * | 2018-10-31 | 2019-04-02 | 算丰科技(北京)有限公司 | Loading method, device, equipment and the storage medium of model data |
CN109802832A (en) * | 2017-11-17 | 2019-05-24 | 中国移动通信集团公司 | A kind of processing method of data file, system, big data processing server and computer storage medium |
CN110138556A (en) * | 2019-05-28 | 2019-08-16 | 上海兆芯集成电路有限公司 | Data processing equipment and data processing method |
CN110855429A (en) * | 2019-11-20 | 2020-02-28 | 上海思赞博微信息科技有限公司 | Software key protection method based on TPM |
CN110968743A (en) * | 2019-12-13 | 2020-04-07 | 支付宝(杭州)信息技术有限公司 | Data storage and data reading method and device for private data |
CN111079158A (en) * | 2019-11-21 | 2020-04-28 | 支付宝(杭州)信息技术有限公司 | Data storage and reading method and device |
CN111756754A (en) * | 2017-07-28 | 2020-10-09 | 创新先进技术有限公司 | Method and device for training model |
US11398899B2 (en) | 2019-05-28 | 2022-07-26 | Shanghai Zhaoxin Semiconductor Co., Ltd. | Data processing device and data processing method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984146A (en) * | 2012-11-23 | 2013-03-20 | 江苏乐买到网络科技有限公司 | Data management method for cloud computing |
CN103534976A (en) * | 2013-06-05 | 2014-01-22 | 华为技术有限公司 | Data security protection method, server, host, and system |
-
2016
- 2016-05-09 CN CN201610300097.7A patent/CN106027503A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984146A (en) * | 2012-11-23 | 2013-03-20 | 江苏乐买到网络科技有限公司 | Data management method for cloud computing |
CN103534976A (en) * | 2013-06-05 | 2014-01-22 | 华为技术有限公司 | Data security protection method, server, host, and system |
Non-Patent Citations (1)
Title |
---|
贾然: ""基于TPM的云存储数据加密机制"", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778326A (en) * | 2016-11-28 | 2017-05-31 | 福建升腾资讯有限公司 | A kind of method and system for realizing movable storage device protection |
CN106878293A (en) * | 2017-01-23 | 2017-06-20 | 深圳市中博科创信息技术有限公司 | Date storage method and device based on cloud storage platform |
CN108989015A (en) * | 2017-05-31 | 2018-12-11 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus of encryption |
CN111756754A (en) * | 2017-07-28 | 2020-10-09 | 创新先进技术有限公司 | Method and device for training model |
CN111756754B (en) * | 2017-07-28 | 2023-04-07 | 创新先进技术有限公司 | Method and device for training model |
CN107733766A (en) * | 2017-11-02 | 2018-02-23 | 平安科技(深圳)有限公司 | Safe interconnected method, device, equipment and storage medium between cloud platform proprietary network |
CN109802832B (en) * | 2017-11-17 | 2020-12-01 | 中移动信息技术有限公司 | Data file processing method and system, big data processing server and computer storage medium |
CN109802832A (en) * | 2017-11-17 | 2019-05-24 | 中国移动通信集团公司 | A kind of processing method of data file, system, big data processing server and computer storage medium |
CN108449753A (en) * | 2018-03-22 | 2018-08-24 | 北京可信华泰科技有限公司 | A kind of method that cell phone apparatus reads the data in trusted computation environment |
CN108768978B (en) * | 2018-05-16 | 2020-12-11 | 浙江大学 | SGX-based remote storage service method and system |
CN108768978A (en) * | 2018-05-16 | 2018-11-06 | 浙江大学 | A kind of remote storage method of servicing and system based on SGX |
CN109564615A (en) * | 2018-10-31 | 2019-04-02 | 算丰科技(北京)有限公司 | Loading method, device, equipment and the storage medium of model data |
CN109462474A (en) * | 2018-11-14 | 2019-03-12 | 郑州云海信息技术有限公司 | The generation method and relevant apparatus of Fernet key in a kind of Keystone |
CN110138556A (en) * | 2019-05-28 | 2019-08-16 | 上海兆芯集成电路有限公司 | Data processing equipment and data processing method |
US11398899B2 (en) | 2019-05-28 | 2022-07-26 | Shanghai Zhaoxin Semiconductor Co., Ltd. | Data processing device and data processing method |
CN110855429A (en) * | 2019-11-20 | 2020-02-28 | 上海思赞博微信息科技有限公司 | Software key protection method based on TPM |
CN111079158A (en) * | 2019-11-21 | 2020-04-28 | 支付宝(杭州)信息技术有限公司 | Data storage and reading method and device |
CN111079158B (en) * | 2019-11-21 | 2022-04-12 | 支付宝(杭州)信息技术有限公司 | Data storage and reading method and device |
CN110968743A (en) * | 2019-12-13 | 2020-04-07 | 支付宝(杭州)信息技术有限公司 | Data storage and data reading method and device for private data |
CN110968743B (en) * | 2019-12-13 | 2021-07-06 | 支付宝(杭州)信息技术有限公司 | Data storage and data reading method and device for private data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
CN110855671B (en) | Trusted computing method and system | |
TWI709314B (en) | Data processing method and device | |
US9424400B1 (en) | Digital rights management system transfer of content and distribution | |
TWI601405B (en) | Method and apparatus for cloud-assisted cryptography | |
US9342701B1 (en) | Digital rights management system and methods for provisioning content to an intelligent storage | |
CN102271037B (en) | Based on the key protectors of online key | |
US20140112470A1 (en) | Method and system for key generation, backup, and migration based on trusted computing | |
CA3123268C (en) | A method of data transfer, a method of controlling use of data and a cryptographic device | |
CN103138939B (en) | Based on the key access times management method of credible platform module under cloud memory module | |
JP2017139811A5 (en) | ||
CN104378386A (en) | Method for cloud data confidentiality protection and access control | |
US11831753B2 (en) | Secure distributed key management system | |
CN104980477A (en) | Data access control method and system in cloud storage environment | |
CN105122265A (en) | Data security service system | |
CN109478214A (en) | Device and method for certificate registration | |
CN103560887A (en) | Intelligent terminal remote attestation method and system | |
US11783091B2 (en) | Executing entity-specific cryptographic code in a cryptographic coprocessor | |
Shen et al. | SecDM: Securing data migration between cloud storage systems | |
CN106992978B (en) | Network security management method and server | |
KR101639714B1 (en) | A method for authenticating a device of smart grid | |
CN102999710A (en) | Method, equipment and system for safely sharing digital content | |
KR102055888B1 (en) | Encryption and decryption method for protecting information | |
Jang-Jaccard et al. | Portable key management service for cloud storage | |
KR101508439B1 (en) | Method for ensuring data confidentiality, method and system for sharing data for using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161012 |