CN107864157A - Protecting data encryption and ownership mandate decryption application process and system based on ownership - Google Patents

Protecting data encryption and ownership mandate decryption application process and system based on ownership Download PDF

Info

Publication number
CN107864157A
CN107864157A CN201711375936.2A CN201711375936A CN107864157A CN 107864157 A CN107864157 A CN 107864157A CN 201711375936 A CN201711375936 A CN 201711375936A CN 107864157 A CN107864157 A CN 107864157A
Authority
CN
China
Prior art keywords
data
ownership
encryption
module
mandate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711375936.2A
Other languages
Chinese (zh)
Inventor
苗放
解岩
杨文晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711375936.2A priority Critical patent/CN107864157A/en
Publication of CN107864157A publication Critical patent/CN107864157A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The invention discloses a kind of protecting data encryption based on ownership and ownership mandate decryption application process and system, this method includes innately encrypting body of data using the public key of the owner when data owner end produces data;Between data and data owner ownership binding is carried out by innately encrypting;Unique mark is carried out to the data of encryption, registration management is carried out to data characteristic information;Data consumer end obtains data message and request data by inquiring about data register table, and data owner end/third-party agent end carries out ownership mandate to data;The reception of data consumer end, ciphertext data are simultaneously applied.Above step simultaneously combines the data record based on ownership, abnormal monitoring etc., realizes that the tracking of data is traced to the source.Moment caused by data, data were once encrypt, and just unrelated with environment, either in any stage, data all keep encrypted state, Information Security height to body of data implementation born encryption.Realize the data safety sharing application based on data ownership.

Description

Protecting data encryption and ownership mandate decryption application process and system based on ownership
Technical field
The present invention relates to information technology and field of information security technology, and in particular to a kind of data encryption based on ownership is protected Shield and ownership mandate decryption application process and system.
Background technology
At present, network security has become will of the state, how to realize that data i.e. safety can be shared again and has become full society Can question of common concern.Available data is in application:1st, secure context, it is now to use traditional safeguard protection means more, generally Include and carry out means of defence and the mechanism such as security boundary, system safety, transmission safety for thinking and the method for defending the territory of one's country, emphasis;Hacker's profit Data are stolen with leak, wooden horse, back door;Social engineering method betrays data for ghost in human weakness development;Traditional visit Ask using by modes such as password passwords, carry out permission grant using platform, sensitive data is traced to the source, difficulty of calling to account once revealing, shadow Ring individual interest, company interest, social stability, national security.Certainly, have in certain applications and protected using hard disc data storage mode Protect data safety, security greatly improves, but data be encrypted after using being restricted, in-convenience in use, data ownership is indefinite, It is shared, using also becoming more difficult;2nd, aspect is shared, data are safely shared significant.Existing shared means, such as political affairs It is engaged in information resources, more using system of catalogs, or using switching plane, or a combination of both, more areas application is still using data For copy to realize the physically centrally stored to share of data, the renewal timing belt to data is difficult, shares not thoroughly, letter Isolated island is ceased still to exist.
The content of the invention
In order to solve the above-mentioned technical problem the present invention provides a kind of protecting data encryption based on ownership and ownership mandate should Use method and system.
The present invention is achieved through the following technical solutions:
Protecting data encryption and ownership mandate decryption application process, data owner, data consumer etc. based on ownership Network activity person, should all have CA (Certificate Authority) digital certificate for determining identity in advance, and keep properly The private key of oneself, following steps are performed under this precondition:
A, when data owner end produces data, body of data is innately encrypted using the public key of the owner;
B, ownership binding is carried out by encrypting between data and data owner;
C, unique mark is carried out to the data of encryption, including data ownership etc. to data characteristic information carries out registration management;
D, data consumer end obtains data message and request data by inquiring about data register table, and data owner end/ Third-party agent end carries out ownership mandate to data;
E, data consumer end receives, ciphertext data and applied.
In existing method, data storage is in naked state, and personal secrets are on the hazard, and this programme is caused by data Moment is innately encrypted to body of data, and once data are just unrelated with environment encryption, either in storage, or transmission When, no matter in client, still beyond the clouds etc., data all keep encrypted state, and this patent is referred to as " data state ".This encryption State especially emphasizes data ability quilt only in ownership mandate, application always with being decrypted to data in terminal applies Decryption, at this moment the data of decrypted state are referred to as " applying state ".Entirely from the process for being encrypted into decryption, answered using safety is shared Management philosophy, i.e., unique mark, characteristic information registration management, ownership binding, ownership mandate application, data are carried out to data Destroy etc., it is easy to process record, abnormal monitoring, traces to the source in violation of rules and regulations, management is controlled to the security of data, realization is based on data Safe, shared, the application of ownership.
Preferably, when data produce, data owner end utilizes public key encryption data;Data are in use, including following Step:
By the data consumer end data input that private key is decrypted to data safety mapped system;
Using the private key combination mapping method at data consumer end, the data of encryption safe, the mapping method bag are exported Include but binary system XOR method;
It is counter to solve data using private key and mapping method when reading simultaneously application data.
Using private key combination mapping method, data are still within encrypted state, and any access without permission can not all be read Go out decrypted data, improve the security of data.
Preferably, the step A is specially:
Data owner end utilizes public key encryption data;
Safe class is set to encryption data;
Select encryption method that data are encrypted according to data volume size;
Corresponding length data key is selected to be encrypted according to safe class;
Encryption data is stored, destroys initial data.
Preferably, the unique mark includes that mark can be parsed and/or can not parse mark.Mark name rule can be parsed Model can refer to international standard, national standard, professional standard, the naming method of enterprises standard combination large character set;Simultaneously should Standard specifically names level, the administrative relationships of correspondingly " data route ".The mark that can not be parsed, using hash algorithm, specifically may be used Think MD5, parameter is multiple DRC (Data Register Center) such as data, space-time ownership stamp characteristic information.It can parse It has been identified as parsing, rapidly locating.
Preferably, step C is specially:
Platform calls uniform data Fabric Interface to complete data exchange with data owner end;
Unique mark is carried out to data;
Data characteristic information supplement is improved and write in summary table, as needed by the structural data of standardizing standard Write-in divides in table;
In step D during the inquiry request data of data consumer end, data are submitted to look into distributed data route any node Access request is looked for, data parse according to request for platform and feedback information;
When data consumer end receives data, platform calls uniform data Fabric Interface to complete data exchange.
The data characteristic information includes unique mark, in addition to the description of data name, data, size of data, data class Type, time, space, ownership, data frequency of use, reference number etc.;And api interface is provided as needed, user can be according to row The characteristics of industry/enterprise etc. and demand self-defining data item.Using DRC tables data can still be passed through in the state of encryption The lookup of information reaches certain applications purpose.
Protecting data encryption and ownership mandate application system based on ownership, including:
Data encryption module:Data are born to data when producing to encrypt and destroys initial data;
Registration management module:To including the data characteristic informations such as unique mark, data ownership carry out registration management, using point Cloth data route-pattern;
Data really weigh module:Ownership information extraction is carried out by data register management module or number is determined by encryption information According to ownership;
Data ownership authorization module:Mandate based on ownership is carried out to data consumer;
Decrypt application module:Ciphertext data is simultaneously applied.
The data encryption module uses public key encryption data, the data solution that decryption application module is decrypted using private key Close module, the data safety mapped system for realizing using private key combination mapping method data mapping, utilize private key and mapping method The data of anti-solution data are counter to solve module.
Also include the logging modle that the operating process to data ownership authorization module, decryption application module is recorded;It is right The abnormal monitoring module that the violation operation of each module is monitored;Responsibility tracing is realized by logging modle, abnormal monitoring module Module of tracing to the source.
The present invention compared with prior art, has the following advantages and advantages:
1st, moment caused by data of the invention is innately encrypted to body of data, data once encrypt, with regard to and environment Unrelated, either in any stage, data all keep encrypted state, Information Security height.
2nd, entirely from the process for being encrypted into decryption, using the management philosophy of safe sharing application so that even if data are adding Certain applications can also be done under privacy protection state, realize data safety sharing application.
Brief description of the drawings
Fig. 1 is the flow chart of this method.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, with reference to embodiment and accompanying drawing, to this Invention is described in further detail, and exemplary embodiment of the invention and its explanation are only used for explaining the present invention, do not make For limitation of the invention.
Embodiment 1
As shown in Figure 1 protecting data encryption and ownership mandate application process, data owner, data based on ownership make The network activity persons such as user, should all have CA (Certificate Authority) digital certificate for determining identity in advance, and it is appropriate The kind keeping private key of oneself, following steps are performed under this precondition:
A, when data owner end produces data, body of data is innately encrypted;
B, ownership binding is carried out by encrypting between data and data owner;
C, unique mark is carried out to the data of encryption, registration management is carried out to data characteristic information;
D, data consumer end obtains data message and request data by inquiring about data register table, and data owner end/ Third-party agent end carries out ownership mandate to data;
E, data consumer end receives, ciphertext data and applied.
Embodiment 2
The present embodiment is on above-described embodiment basis, open step A detailed embodiment.
Data owner end utilizes public key encryption data when data produce, and default value is " 2 ", represents the number of encrypted state According to, i.e., data produce when be defaulted as " data state ".
Judge encrypted state, and safe class is set to encryption data;Safe class can base according to the privacy level of data Originally it is divided into share level and protected level.Further share level, which can be divided into, can disclose 2 grades of level, can 3 grades of share level;Protected level can be divided into one As 4 grades of protected level, lay special stress on protecting 5 grades of level.It can be increased step by step according to actual conditions safe class.
Select encryption method that data are encrypted according to data volume size, specific data volume hour, use is asymmetric Key algorithm encryption data;When data volume is big, combined using symmetric key algorithm+asymmetric key algorithm encryption data, such as AES RSA Algorithm.
Corresponding length data key is selected to be encrypted according to safe class, for example:If safe class is " 2 ", key Length is 1024;If safe class is " 3 ", key length is 2048, incremented by successively.
Data storage state, destroy initial data.
Embodiment 3
The present embodiment discloses a detailed embodiment on above-described embodiment basis.
A, data owner end produces data, and body of data is encrypted using public key when producing for data, is destroyed original Data;
B, data ownership is bound, and the ownership relation between data and data owner is directly tied up by encrypted public key Determine, and inquired about, applied according to DRC tables;
C, unique mark is carried out to data message, registration management, unique mark bag herein is carried out to data characteristic information Include to parse and identify and/or can not parse mark;Data characteristic information includes data ownership information etc.;
D, data consumer end obtains data message and request data by inquiring about data register table, and in data consumer End/third-party agent end carries out ownership mandate to data;
E, data consumer end receives data, and the data input that the private key at data consumer end is decrypted is reflected to data safety Penetrate system;Using the private key combination mapping method at data consumer end, the mapping method can be binary system XOR method, output The data of encryption safe;It is counter to solve data using private key and mapping method when reading simultaneously application data.
Embodiment 4
Data owner end in embodiment 1 can be various mobile terminals or system or platform, if system Or platform, third-party agent form can also be used, if need to obtain data owner's in advance with agency third-party agent Authorize.
On the basis of above-described embodiment, this method is described in detail with data register center DRC for the present embodiment.
Data owner end produces data, and data are innately encrypted when producing to body of data, destroy initial data;
Data register center DRC provides uniform data Fabric Interface and completes data exchange with data owner end, makes data Standardization, standardization;
Data ownership is bound, and the relation between data and data owner is bound by public key encryption mode, registered using DRC Inquired about and using etc.;
To data unique mark;It is perfect according to data characteristic information is supplemented, and be respectively written into DRC summary tables, according to need Structural data standardizing standardization can be write into DRC to divide in table;Unique mark herein include can parse mark and/or not Mark can be parsed;Data characteristic information includes unique mark, in addition to the description of data name, data, size of data, data class Type, time, space, ownership, data frequency of use, reference number etc., can provide interface according to user's request and be made by oneself by user Adopted standard.Unique mark can use the parameter computings such as MD5 combinations data ownership, time, space;" logical set is carried out to data In, physical dispersion " strange land, different master, isomery management.
During the request data of data consumer end, data search is submitted to access to distributed DRC " data route " any node Request, data parse according to request for data register center and feedback information;Carry out data ownership mandate;
When data consumer end receives data, data register center DRC provides uniform data Fabric Interface and completes data friendship Change.
In this programme, 1) which data is decrypted actually, it is to be determined by the information in DRC;Which 2) solved with key Ciphertext data, determined by the ownership of data;3) decrypted data are in interim memory space, in hard disk or internal memory, warp The data of encryption mapped system can not all read decrypted number still in a kind of encrypted state, any access without permission According to;4) in the application, when CPU or GPU reads data, data are only in decrypted state, but at this moment should have monitoring journey Ordered pair read-write process carries out Real-time security monitoring.
Based on this method, the information such as the application donor of data, the donor of data, contract, time can be recorded, By monitoring programme to data change in itself, the change of data manipulation, and the change of the attribute information such as ownership associated with the data Change is monitored in real time, and record change, implementation process record, exception monitoring, tracking are traced to the source.
Embodiment 5
The present embodiment discloses a kind of system for realizing the above method.
Protecting data encryption and ownership mandate decryption application system based on ownership, including:
Data encryption module:Data are born to data when producing to encrypt and destroys initial data;
Registration management module:To including the data characteristic informations such as unique mark, data ownership carry out registration management, using point Cloth data route-pattern;
Data really weigh module:Ownership information extraction is carried out by data register management module or number is determined by encryption information According to ownership;
Data ownership authorization module:Mandate based on ownership is carried out to data consumer;
Decrypt application module:Ciphertext data is simultaneously applied.
The data encryption module uses public key encryption data, the data solution that decryption application module is decrypted using private key Close module, the data safety mapped system for realizing using private key combination mapping method data mapping, utilize private key and mapping method The data of anti-solution data are counter to solve module.
In order to which implementation process record, exception monitoring, tracking are traced to the source, in addition to data ownership authorization module, decryption are applied The logging modle that the operating process of module is recorded;The abnormal monitoring module that violation operation to each module is monitored;It is logical Overwriting module, abnormal monitoring module realize the module of tracing to the source of responsibility tracing.
Above-described embodiment, the purpose of the present invention, technical scheme and beneficial effect are carried out further Describe in detail, should be understood that the embodiment that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, within the spirit and principles of the invention, any modification, equivalent substitution and improvements done etc., all should include Within protection scope of the present invention.

Claims (9)

1. a kind of protecting data encryption and ownership mandate decryption application process based on ownership, it is characterised in that including following step Suddenly:
A, data owner end produces data, and data are innately encrypted when producing to body of data;
B, ownership binding is carried out by encrypting between data and data owner;
C, unique mark is carried out to the data of encryption, registration management is carried out to data characteristic information;
D, data consumer end obtains data message and request data, data owner end/3rd by inquiring about data register table Square agent side carries out ownership mandate to data;
E, data consumer end receives, ciphertext data and applied.
2. the protecting data encryption and ownership mandate decryption application process according to claim 1 based on ownership, its feature It is, when data produce, data owner end utilizes owner's public key encryption data;Data are before use, comprise the following steps:
By the data consumer end data input that private key is decrypted to data safety mapped system;
Using the private key combination mapping method at data consumer end, the data of encryption safe are exported, the mapping method includes two System XOR method;
It is counter to solve data using private key and mapping method when reading simultaneously application data.
3. the protecting data encryption and ownership mandate decryption application process according to claim 1 based on ownership, its feature It is, the step A is specially:
Data owner end utilizes public key encryption data;
Safe class is set to encryption data;
Select encryption method that data are encrypted according to data volume size;
Corresponding length data key is selected to be encrypted according to safe class;
Encryption data is stored, destroys initial data.
4. the protecting data encryption and ownership mandate decryption application process according to claim 1 based on ownership, its feature It is, the unique mark includes that mark can be parsed and/or can not parse mark.
5. the protecting data encryption and ownership mandate decryption application process according to claim 1 based on ownership, its feature It is, step C is specially:
Platform calls uniform data Fabric Interface to complete data exchange with data owner end;
Unique mark is carried out to data;
Data characteristic information supplement is improved and write in summary table, as needed divides structural data write-in in table;
In step D during the inquiry request data of data consumer end, data search is submitted to visit to distributed data route any node Request is asked, data parse according to request for platform and feedback information;
When data consumer end receives data, platform calls uniform data Fabric Interface to complete data exchange.
6. the protecting data encryption and ownership mandate decryption application process according to claim 1 based on ownership, its feature Be, the data characteristic information includes unique mark, in addition to the description of data name, data, size of data, data type, Time, space, ownership, data frequency of use, reference number;And api interface is provided as needed, user can be according to industry/enterprise The characteristics of industry etc. and demand self-defining data item.
7. protecting data encryption and ownership mandate decryption application system based on ownership, it is characterised in that including:
Data encryption module:Data are born to data when producing to encrypt and destroys initial data;
Registration management module:Using distributed data route-pattern to carrying out registration pipe including unique mark, data characteristic information Reason;
Data really weigh module:Ownership information extraction is carried out by data register management module or determines that data are weighed by encryption information Category;
Data ownership authorization module:Mandate based on ownership is carried out to data consumer;
Decrypt application module:Ciphertext data is simultaneously applied.
8. the protecting data encryption and ownership mandate decryption application system according to claim 7 based on ownership, its feature It is, the data encryption module uses public key encryption data, the data deciphering that decryption application module is decrypted using private key It is module, the data safety mapped system for realizing using private key combination mapping method data mapping, anti-using private key and mapping method The data of solution data are counter to solve module.
9. the protecting data encryption and ownership mandate decryption application system according to claim 7 based on ownership, its feature It is, in addition to the logging modle that the operating process to data ownership authorization module, decryption application module is recorded;To each mould The abnormal monitoring module that the violation operation of block is monitored;Tracing back for responsibility tracing is realized by logging modle, abnormal monitoring module Source module.
CN201711375936.2A 2017-12-19 2017-12-19 Protecting data encryption and ownership mandate decryption application process and system based on ownership Pending CN107864157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711375936.2A CN107864157A (en) 2017-12-19 2017-12-19 Protecting data encryption and ownership mandate decryption application process and system based on ownership

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711375936.2A CN107864157A (en) 2017-12-19 2017-12-19 Protecting data encryption and ownership mandate decryption application process and system based on ownership

Publications (1)

Publication Number Publication Date
CN107864157A true CN107864157A (en) 2018-03-30

Family

ID=61706995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711375936.2A Pending CN107864157A (en) 2017-12-19 2017-12-19 Protecting data encryption and ownership mandate decryption application process and system based on ownership

Country Status (1)

Country Link
CN (1) CN107864157A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846293A (en) * 2018-06-12 2018-11-20 北京阿尔山金融科技有限公司 Resume information generation method and device
WO2019047888A1 (en) * 2017-09-07 2019-03-14 苗放 Ownership-based data authorization method and system
CN109583215A (en) * 2018-09-28 2019-04-05 阿里巴巴集团控股有限公司 It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN111221903A (en) * 2019-12-18 2020-06-02 中思博安科技(北京)有限公司 Data tracing method, system and computer storage medium
CN112070459A (en) * 2020-08-10 2020-12-11 国网甘肃省电力公司信息通信公司 Power grid data responsibility confirmation and source tracing method
CN112804050A (en) * 2021-04-14 2021-05-14 湖南大学 Multi-source data query system and method
CN114513370A (en) * 2022-04-19 2022-05-17 中国信息通信研究院 Universal identification data conversion method and device, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159718A (en) * 2007-08-03 2008-04-09 重庆邮电大学 Embedded type industry ethernet safety gateway
CN101631080A (en) * 2009-08-14 2010-01-20 重庆邮电大学 Industrial Ethernet switch based on EPA protocol and message forwarding method
CN102355351A (en) * 2011-07-21 2012-02-15 华为技术有限公司 Key generation, backup and migration method and system based on trusted computing
CN102833271A (en) * 2012-09-20 2012-12-19 桂林电子科技大学 Solution for potential safety hazards in VPN (virtual private network)
CN104076906A (en) * 2014-07-17 2014-10-01 成都理工大学 Information technology system oriented to data
CN105450669A (en) * 2015-12-30 2016-03-30 成都大学 Safety system method and system for data
CN107395649A (en) * 2017-09-07 2017-11-24 成都密脉数据科技有限公司 A kind of data grant method and system based on ownership

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159718A (en) * 2007-08-03 2008-04-09 重庆邮电大学 Embedded type industry ethernet safety gateway
CN101631080A (en) * 2009-08-14 2010-01-20 重庆邮电大学 Industrial Ethernet switch based on EPA protocol and message forwarding method
CN102355351A (en) * 2011-07-21 2012-02-15 华为技术有限公司 Key generation, backup and migration method and system based on trusted computing
CN102833271A (en) * 2012-09-20 2012-12-19 桂林电子科技大学 Solution for potential safety hazards in VPN (virtual private network)
CN104076906A (en) * 2014-07-17 2014-10-01 成都理工大学 Information technology system oriented to data
CN105450669A (en) * 2015-12-30 2016-03-30 成都大学 Safety system method and system for data
CN107395649A (en) * 2017-09-07 2017-11-24 成都密脉数据科技有限公司 A kind of data grant method and system based on ownership

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019047888A1 (en) * 2017-09-07 2019-03-14 苗放 Ownership-based data authorization method and system
CN108846293A (en) * 2018-06-12 2018-11-20 北京阿尔山金融科技有限公司 Resume information generation method and device
CN109583215A (en) * 2018-09-28 2019-04-05 阿里巴巴集团控股有限公司 It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN109583215B (en) * 2018-09-28 2022-11-15 创新先进技术有限公司 Method and device for processing credit investigation data and block chain data sharing system
CN111221903A (en) * 2019-12-18 2020-06-02 中思博安科技(北京)有限公司 Data tracing method, system and computer storage medium
CN111221903B (en) * 2019-12-18 2023-11-28 中思博安科技(北京)有限公司 Data responsibility-following method, system and computer storage medium
CN112070459A (en) * 2020-08-10 2020-12-11 国网甘肃省电力公司信息通信公司 Power grid data responsibility confirmation and source tracing method
CN112804050A (en) * 2021-04-14 2021-05-14 湖南大学 Multi-source data query system and method
CN112804050B (en) * 2021-04-14 2021-07-02 湖南大学 Multi-source data query system and method
CN114513370A (en) * 2022-04-19 2022-05-17 中国信息通信研究院 Universal identification data conversion method and device, storage medium and electronic equipment
CN114513370B (en) * 2022-04-19 2022-07-15 中国信息通信研究院 Universal identification data conversion method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN107864157A (en) Protecting data encryption and ownership mandate decryption application process and system based on ownership
US5214700A (en) Method for obtaining a securitized cleartext attestation in a distributed data processing system environment
CN102402664B (en) Data access control device and data access control method
JPH10508438A (en) System and method for key escrow and data escrow encryption
CN109525570B (en) Group client-oriented data layered security access control method
CN107959567A (en) Date storage method, data capture method, apparatus and system
US20080310619A1 (en) Process of Encryption and Operational Control of Tagged Data Elements
CN106650482A (en) Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN107370604B (en) A kind of more granularity access control methods under big data environment
JP2013513889A (en) Confirmable trust for data through the wrapper complex
CN104468562B (en) A kind of data security protecting portable terminal transparent towards Mobile solution
RU2003111043A (en) METHODS AND SYSTEMS FOR AUTHENTICATION OF COMPONENTS IN THE GRAPHIC SYSTEM
WO2005066824A1 (en) Method and apparatus for limiting number of times contents can be accessed using hashing chain
CN109829333B (en) OpenID-based key information protection method and system
CN104579689A (en) Soft secret key system and implementation method
WO2022206453A1 (en) Method and apparatus for providing cross-chain private data
CN111274599A (en) Data sharing method based on block chain and related device
US11438157B2 (en) Method and system for data ownership confirmation based on encryption
CN112685790B (en) Block chain data security and privacy protection method
CN100547598C (en) Preserve and retrieve data based on symmetric key encryption
CN106203168A (en) Database security accesses system
CN111460420A (en) Method, device and medium for using electronic seal based on block chain
CN103973698B (en) User access right revoking method in cloud storage environment
CN106295403A (en) A kind of data safety processing method based on hbase and system
Chandar et al. A PROFICIENT MODEL FOR HIGH END SECURITY IN CLOUD COMPUTING.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330

RJ01 Rejection of invention patent application after publication