CN110232283A - The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography - Google Patents

The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography Download PDF

Info

Publication number
CN110232283A
CN110232283A CN201910421986.2A CN201910421986A CN110232283A CN 110232283 A CN110232283 A CN 110232283A CN 201910421986 A CN201910421986 A CN 201910421986A CN 110232283 A CN110232283 A CN 110232283A
Authority
CN
China
Prior art keywords
blacklist
server
encryption
verification result
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910421986.2A
Other languages
Chinese (zh)
Inventor
郭鸿程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910421986.2A priority Critical patent/CN110232283A/en
Publication of CN110232283A publication Critical patent/CN110232283A/en
Priority to PCT/CN2019/120154 priority patent/WO2020233038A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves cloud storage, the method for the blacklist cloud shared authentication based on homomorphic cryptography is disclosed, comprising: receive the blacklist checking request for carrying blacklist verifying mark and the encryption user information of job hunter that first server is sent;It is searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;Obtain public key;Homomorphic cryptography result is obtained to encryption user information and the first encryption blacklist homomorphic cryptography using public key;The blacklist matching request for carrying homomorphic cryptography result is sent to second server, blacklist matching request is used to indicate second server and obtains blacklist verification result to homomorphic cryptography result progress homomorphic decryption using private key;The blacklist for receiving the carrying blacklist verification result that second server is sent matches response;The blacklist auth response for carrying blacklist verification result is sent to first server.Implement the embodiment of the present invention, realizes the safety and privacy for ensuring information in the case where blacklist is shared.

Description

The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography
Technical field
The present invention relates to field of computer technology, more particularly to the method for the blacklist cloud shared authentication based on homomorphic cryptography And relevant apparatus.
Background technique
Currently, each enterprise can safeguard respective blacklist library, to resist some malicious attacks.Although each enterprise it Between blacklist library in there may be some duplicate blacklists, but because the field that is related to of each enterprise is different, often There are many different blacklists in blacklist library between a enterprise again.With the development of the times, when enterprise interviews job hunter, one As according to the simple exchange of the resume content of job hunter and interview process determine whether to recruit the job hunter.However, this Mode cannot consider the conduct of job hunter.It therefore, is the reasonable utilization for realizing resource, many enterprises can place blacklist now In third-party platform, so as to which the user information for needing to verify is matched with blacklist all in third-party platform, To determine whether job hunter corresponding with user information has bad reference behavior, fraud etc., to help whether enterprise records With the job hunter.
However, either blacklist verification process or blacklist are uploaded to third-party platform in this sharing mode Process, to there are problems that information is intercepted, does not only result in user information loss, also leads due to not using cryptographic means Blackening list information leakage.In addition, leading to all black names since third-party platform possesses all black list informations of enterprise's upload Single information is all exposed to third-party platform, experiences for each enterprise customer bad.Likewise, the user of job hunter believes Breath is also exposed to third-party platform.Therefore, the safety of this mode information and privacy are all insufficient.
Summary of the invention
The embodiment of the invention provides the methods and relevant apparatus of the blacklist cloud shared authentication based on homomorphic cryptography, implement The embodiment of the present invention realizes the safety and privacy for ensuring information in the case where blacklist is shared.
First aspect of the embodiment of the present invention provides the method for the blacklist cloud shared authentication based on homomorphic cryptography, comprising:
Receive the blacklist checking request that first server is sent, wherein the blacklist checking request carries blacklist The encryption user information of verifying mark and job hunter;
It is searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;
Obtain the public key with the first encryption blacklist associated storage;
Homomorphic cryptography is carried out to the encryption user information and the first encryption blacklist using the public key, is obtained same State encrypted result;
Blacklist matching request is sent to second server, wherein the blacklist matching request carries the homomorphism and adds It is close to use private key to carry out the homomorphic cryptography result as a result, the blacklist matching request is used to indicate the second server Homomorphic decryption obtains blacklist verification result;
Receive the blacklist matching response that the second server is sent, wherein the blacklist matching response carries institute State blacklist verification result;
Blacklist auth response is sent to the first server, wherein the blacklist auth response carries described black List verification result, the blacklist auth response are used to indicate the first server and carry out to the blacklist verification result Risk assessment obtains risk assessment value, to determine whether to employ the job hunter based on the risk assessment value.
Second aspect of the embodiment of the present invention provides a kind of blacklist cloud shared authentication device based on homomorphic cryptography, packet It includes:
First receiving module, for receiving the blacklist checking request of first server transmission, wherein the blacklist is tested Card request carries the encryption user information of blacklist verifying mark and job hunter;
Searching module, for being searched from blacklist library and the black name of matched first encryption of blacklist verifying mark It is single;
Module is obtained, for obtaining the public key with the first encryption blacklist associated storage;
Encrypting module, it is same for being carried out using the public key to the encryption user information and the first encryption blacklist State encryption, obtains homomorphic cryptography result;
First sending module, for sending blacklist matching request to second server, wherein the blacklist matching is asked It asks and carries the homomorphic cryptography as a result, the blacklist matching request is used to indicate the second server using private key to described Homomorphic cryptography result carries out homomorphic decryption and obtains blacklist verification result;
Second receiving module, the blacklist matching response sent for receiving the second server, wherein the black name Single matching response carries the blacklist verification result;
Second sending module, for sending blacklist auth response to the first server, wherein the blacklist is tested Card response carries the blacklist verification result, and the blacklist auth response is used to indicate the first server to described black List verification result carries out risk assessment, obtains risk assessment value, described to determine whether to employ based on the risk assessment value Job hunter.
As can be seen that cloud authentication center receives the carrying blacklist verifying that first server is sent in above-mentioned technical proposal The encryption user information of mark and job hunter realizes the safety for ensuring user information in transmission process, avoids user information quilt Interception, also avoids user information and is known by cloud authentication center, while being verified based on blacklist and being identified with and to verify conducive to determination Blacklist;It is searched from blacklist library and encrypts blacklist with blacklist verifying mark matched first, realized purposive The blacklist to be verified of determination saves the verification time;The public key with the first encryption blacklist associated storage is obtained, is realized first Encryption blacklist and public key obtain the public key for encrypting blacklist to be encrypted when being associated storage, be subsequent homomorphic cryptography and Homomorphic decryption is prepared;Homomorphic cryptography is carried out to encryption user information and the first encryption blacklist using public key, homomorphism is obtained and adds It is close as a result, by using same public key encryption, prepare for subsequent homomorphic decryption;Blacklist matching is sent to second server Request, wherein blacklist matching request carries homomorphic cryptography as a result, blacklist matching request is used to indicate second server use Private key carries out homomorphic decryption to homomorphic cryptography result and obtains blacklist verification result, realizes in data transmission procedure, avoids Homomorphic cryptography result is intercepted, meanwhile, it is realized using homomorphic decryption and is obtained in the case where second server unknown subscriber's information Blacklist verification result is arrived, to realize the separation of data rights and data ownership, it is ensured that the peace of all information Full property and privacy;The blacklist for receiving the carrying blacklist verification result that second server is sent matches response, in the second clothes It is engaged in blacklist verification result being obtained, in order to which blacklist verification result is sent to first service after the matching of device blacklist Device;Blacklist auth response is sent to first server, wherein blacklist auth response carries blacklist verification result, black name Single auth response is used to indicate first server and carries out risk assessment to blacklist verification result, risk assessment value is obtained, with base Determine whether to take a job applicant on the staff in the risk assessment value, blacklist verification result is sent to first server, in order to One server carries out risk assessment to blacklist verification result, to determine whether to employ the job hunting based on the risk assessment value Person avoids enterprise from employing the job hunting for having bad reference behavior, fraud to realize the reasonable utilization of blacklist resource Person maintains company interest in all directions.To sum up, implement the embodiment of the present invention, realize the peace for ensuring information in the case where blacklist is shared Full property and privacy, and realize the reasonable utilization of blacklist resource, it avoids enterprise from employing and has bad reference behavior, fraud Job hunter, maintain company interest in all directions.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Wherein:
Fig. 1 is a kind of process of the method for the blacklist cloud shared authentication based on homomorphic cryptography provided in an embodiment of the present invention Schematic diagram;
Fig. 2 is the stream of the method for another blacklist cloud shared authentication based on homomorphic cryptography provided in an embodiment of the present invention Journey schematic diagram;
Fig. 3 is a kind of signal of the blacklist cloud shared authentication device based on homomorphic cryptography provided in an embodiment of the present invention Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
It is described in detail separately below.
Description and claims of this specification and the term " first " in above-mentioned attached drawing, " second " are for distinguishing not Same object, is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that Non-exclusive include in covering.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising For the intrinsic other step or units of these process, methods, product or equipment.
Firstly, Fig. 1 is a kind of blacklist cloud based on homomorphic cryptography that one embodiment of the present of invention provides referring to Fig. 1 The flow diagram of the method for shared authentication.Wherein, as shown in Figure 1, one kind that one embodiment of the present of invention provides is based on together The method of blacklist cloud shared authentication of state encryption may include:
101, cloud authentication center receives the blacklist checking request that first server is sent.
Wherein, the blacklist checking request carries the encryption user information of blacklist verifying mark and job hunter.
Wherein, cloud authentication center for example may include server.
102, cloud authentication center is searched and the black name of matched first encryption of blacklist verifying mark from blacklist library It is single.
103, cloud authentication center obtains the public key with the first encryption blacklist associated storage.
104, cloud authentication center carries out the encryption user information and the first encryption blacklist using the public key Homomorphic cryptography obtains homomorphic cryptography result.
Optionally, homomorphic cryptography can be for example additive homomorphism, multiplicative homomorphic, mixing multiplicative homomorphic, subtraction homomorphism, division Homomorphism, algebra homomorphism, any one in arithmetic homomorphism.
Wherein, homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Add to by homomorphism Close data are handled to obtain an output, this output is decrypted, and result handles unencryption with Same Way The obtained output deadline information of initial data be the same.
105, cloud authentication center sends blacklist matching request to second server.
Wherein, the blacklist matching request carries the homomorphic cryptography as a result, the blacklist matching request is for referring to Show that the second server carries out homomorphic decryption to the homomorphic cryptography result using private key and obtains blacklist verification result.
106, cloud authentication center receives the blacklist matching response that the second server is sent.
Wherein, the blacklist matching response carries the blacklist verification result.
107, cloud authentication center sends blacklist auth response to the first server.
Wherein, the blacklist auth response carries the blacklist verification result, and the blacklist auth response is used for It indicates that the first server carries out risk assessment to the blacklist verification result, obtains risk assessment value, based on described Risk assessment value determines whether to employ the job hunter.
Referring to fig. 2, Fig. 2 is that another blacklist cloud based on homomorphic cryptography that one embodiment of the present of invention provides is shared The flow diagram of the method for verifying.Wherein, as shown in Fig. 2, one kind that one embodiment of the present of invention provides is added based on homomorphism The method of close blacklist cloud shared authentication may include:
201, cloud authentication center receives the public key request that the first server is sent.
Wherein, the public key request carries public key mark, and the public key mark is based on described black by the first server List verifying mark, which generates, to be obtained.
202, cloud authentication center is searched from the blacklist library identifies the matched public key with the public key.
203, cloud authentication center sends public key response to the first server.
Wherein, the public key response carries the public key, and the public key response is used to indicate the first server and uses The public key encrypts user information to be encrypted, obtains the encryption user information.
Optionally, user information to be encrypted for example may include: name, gender, the age, ID card No., contact method, Pass through college school etc..
204, cloud authentication center receives the blacklist checking request that first server is sent.
Wherein, the blacklist checking request carries the encryption user information of blacklist verifying mark and job hunter.
Wherein, cloud authentication center for example may include server.
205, cloud authentication center is searched and the black name of matched first encryption of blacklist verifying mark from blacklist library It is single.
Optionally, in a first aspect, in a kind of possible embodiment of the invention, it is described from blacklist library search with Before the matched first encryption blacklist of blacklist verifying mark, the method also includes:
Receive the addition cloud authentication center request that the second server is sent, wherein the addition cloud authentication center is asked Seek the authentication information and authentication public key for carrying the second server;
It determines that the Internet protocol address in the authentication information meets and presets legal Internet protocol address;
Authentication is carried out to the signing messages in the authentication information using the authentication public key;
When authentication passes through, Xiang Suoshu second server sends blacklist request, wherein the blacklist request is used The first blacklist to be encrypted is encrypted using the public key in the instruction second server, it is black to obtain first encryption List;
Receive the blacklist response that the second server is sent, wherein the blacklist response carries described first and adds Close blacklist and the public key;
By the public key and the first encryption blacklist associated storage in the blacklist library.
Wherein, IP address refers to Internet protocol address (Internet Protocol Address, and be translated into internet association Discuss address), it is the abbreviation of IP Address.IP address is a kind of unified address format that IP agreement provides, it is internet On one logical address of each network and each host assignment, the difference of physical address is shielded with this.
Optionally, signing messages is encrypted to obtain using authentication private key by second server to company information.
Wherein, company information for example may include: enterprise name, organization mechanism code, contact method, seller addresses, warp Seek range etc..
As can be seen that cloud authentication center receives the carrying second server that second server is sent in above-mentioned technical proposal Authentication information and authentication public key addition cloud authentication center request, in this way be cloud authentication center to second server Identity verifying provide it is convenient;It determines that the Internet protocol address in authentication information meets and presets legal Internet protocol Address, it is ensured that the legitimacy of the logical address of second server;Using authentication public key to the signature in authentication information Information carries out authentication, it is ensured that the signing messages that second server carries is not tampered with, and ensure that the conjunction of second server Method,;When authentication passes through, blacklist request is sent to second server, wherein blacklist request is used to indicate second Server encrypts the first blacklist to be encrypted using public key, obtains the first encryption blacklist, when authentication passes through, Just agree to that encryption blacklist can be sent to cloud authentication center by second server, ensures that a reasonable addition is former Then;Receive the blacklist response that second server is sent, wherein blacklist response carries the first encryption blacklist and public key, obtains To public key, first server can be allowed to encrypt user information to be encrypted, homomorphic cryptography can also be realized using public key;By public key and First encryption blacklist associated storage realizes that cloud authentication center obtains public key in blacklist library.To sum up, cloud is added by setting to test The condition at card center ensures that the accuracy of blacklist, lays the groundwork for subsequent benign blacklist library construction.
Optionally, based in a first aspect, the blacklist response is also in the possible embodiment of the first of the invention J blacklist term data in encryption blacklist mark and the described first blacklist to be encrypted is carried, J is positive integer, described Encryption blacklist mark is for indicating that the J blacklist term data belongs to the first encryption blacklist, the black name of J item Every blacklist term data in single term data is for indicating that personal flame is recorded in the described first black name to be encrypted Single time limit, described by the public key and the first encryption blacklist associated storage is after the blacklist library, The method also includes:
The public key and the first encryption blacklist associated storage are obtained in the blacklist library at interval of preset period of time Time, obtain N number of storing time intervals, wherein N is positive integer;
N number of storing time intervals are inputted into predetermined encryption blacklist storage period function according to the sequencing of time, are obtained To N number of output term data;
By N number of output term data according to the sequencing of time successively and in the J blacklist term data Every blacklist term data compare, determine in N number of output term data exist be greater than H blacklist time limit number According to first output term data, wherein the H blacklist term data belongs to the J blacklist term data, 0 < H ≤ J and H are integer;
It calls blacklist to exceed the time limit to identify generating algorithm and generate H blacklist the H blacklist term data to exceed the time limit to mark Know, wherein the H blacklist exceed the time limit mark in every blacklist exceed the time limit mark for indicated it is described individual flame Failure;
Blacklist is sent to the second server and updates request, wherein the blacklist update request carries H described Blacklist exceeds the time limit to identify, and the blacklist updates request and is used to indicate the second server for the described first blacklist to be encrypted In exceed the time limit to identify matched H item individual's flame with the H blacklist and delete, obtain the second blacklist to be encrypted, use The public key encrypts the described second blacklist to be encrypted, obtains the second encryption blacklist;
It receives the second server and sends blacklist update response, wherein described in the blacklist update response carries Second encryption blacklist;
The first encryption blacklist with the public key associated storage is substituted for the second encryption blacklist.
Wherein, J for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, H for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, in a kind of optinal plan, blacklist term data can be as shown in the table:
The blacklist time limit (day) 2
The blacklist time limit (day) 15
The blacklist time limit (day) 30
Left side ellipsis in upper table indicates blacklist time limit (day), and right side ellipsis indicates specific number of days.
Optionally, preset time for example may include: half an hour, and 1 day, 3 days, one week, 2 weeks, one month, 3 months, 6 The other times such as the moon, 1 year.
Wherein, preset time can be previously set by administrator.Or preset time is also recordable in configuration file, can be led to Query configuration file is crossed to determine preset time.
Optionally, predetermined encryption blacklist storage period function is y=x+sin (x/6), wherein y is output time limit number According to x is storing time intervals.
Wherein, personal flame for example may include: name, gender, the age, ID card No., contact method, break one's promise Reason, time of breaking one's promise, event of breaking one's promise, place of breaking one's promise etc..
As can be seen that obtaining public key in above-mentioned technical proposal at interval of preset period of time and the first encryption blacklist association being deposited Storage obtains N number of storing time intervals in the time in the blacklist library, by obtaining storing time intervals at interval of preset period of time, will realize Dynamic monitors blacklist library;N number of storing time intervals are inputted into predetermined encryption blacklist storage period letter according to the sequencing of time Number, obtains N number of output term data, and N number of storing time intervals are inputted predetermined encryption blacklist by the sequencing according to the time Storage period function is realized and orderly obtains output term data, accelerates cloud authentication center processing speed;By N number of output time limit Data are successively compared with every blacklist term data in J blacklist term data according to the sequencing of time, Determine there is the first output term data for being greater than H blacklist term data in N number of output term data, by successively by N A output term data is compared with every blacklist term data in J blacklist term data, quickly obtains N number of output phase It limits and there is the first output term data for being greater than H blacklist term data in data, so that it is determined that J blacklist term data In have H blacklist term data no longer valid;Blacklist is called to exceed the time limit to identify generating algorithm life H blacklist term data Exceed the time limit to identify at H blacklist, wherein the H blacklist every blacklist in mark that exceeds the time limit exceeds the time limit mark for indicating personal Flame has failed, and generates H blacklist and exceeds the time limit to identify, and deletes in blacklist to be encrypted failed for second server People's flame is prepared;Blacklist update request is sent to second server, wherein it is a black that blacklist update request carries H List exceeds the time limit to identify, blacklist update request be used to indicate second server by the first blacklist to be encrypted with H blacklist Exceed the time limit to identify matched H item individual's flame deletion, obtains the second blacklist to be encrypted, it is to be encrypted black to second using public key List is encrypted, and the second encryption blacklist is obtained, so that second server be allowed to be exceeded the time limit to identify deletion H item according to H blacklist Personal flame then encrypts the second blacklist to be encrypted using public key, obtains to obtain the second blacklist to be encrypted To the second encryption blacklist, second encryption blacklist is issued cloud authentication center and prepared to be subsequent;Receive second server hair Blacklist is sent to update response, wherein blacklist updates response and carries the second encryption blacklist, realizes the transmission of data;It will be with First encryption blacklist of public key associated storage is substituted for the second encryption blacklist, to realize individual of failing in blacklist library The deletion of flame, saves memory space, alleviates the carrying cost of cloud authentication center.
206, cloud authentication center obtains the public key with the first encryption blacklist associated storage.
207, cloud authentication center carries out the encryption user information and the first encryption blacklist using the public key Homomorphic cryptography obtains homomorphic cryptography result.
Optionally, homomorphic cryptography can be for example additive homomorphism, multiplicative homomorphic, mixing multiplicative homomorphic, subtraction homomorphism, division Homomorphism, algebra homomorphism, any one in arithmetic homomorphism.
Wherein, homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Add to by homomorphism Close data are handled to obtain an output, this output is decrypted, and result handles unencryption with Same Way The obtained output deadline information of initial data be the same.
208, cloud authentication center sends blacklist matching request to second server.
Wherein, the blacklist matching request carries the homomorphic cryptography as a result, the blacklist matching request is for referring to Show that the second server carries out homomorphic decryption to the homomorphic cryptography result using private key and obtains blacklist verification result.
209, cloud authentication center receives the blacklist matching response that the second server is sent.
Wherein, the blacklist matching response carries the blacklist verification result.
210, cloud authentication center sends blacklist auth response to the first server.
Wherein, the blacklist auth response carries the blacklist verification result, and the blacklist auth response is used for It indicates that the first server carries out risk assessment to the blacklist verification result, obtains risk assessment value, based on described Risk assessment value determines whether to employ the job hunter.
Optionally, in a first aspect, in a kind of possible embodiment of the invention, the method also includes:
Receive the blacklist checking request that the first server is sent, wherein the blacklist checking request is taken The M encryption user information with M blacklist verifying mark and M job hunter;
It is searched from the blacklist library and identifies matched M encryption blacklist with M blacklist verifying, wherein The M blacklist verifying mark is corresponded with the M encryption blacklist;
Obtain the M public key with described M encryption blacklist associated storage;
Homomorphic cryptography is carried out to the M encryption user information and the M encryption blacklist using the M public key, Obtain M homomorphic cryptography result, wherein i-th of homomorphic cryptography result in the M homomorphic cryptography result is public by described M I-th of public key in key encrypts to obtain to i-th of encryption user information and i-th of encryption blacklist, i-th of encryption User information belongs to the M encryption user information, and i-th of encryption blacklist belongs to the M encryption blacklist, 0 < i ≤ M and i are integer;
M blacklist matching request is sent to M second server, wherein the M second server and the M Blacklist matching request corresponds, and the M blacklist matching request carries the M homomorphic cryptography as a result, the M black I-th of blacklist matching request in list matching request is used to indicate i-th of second server using i-th of private key to described I-th of homomorphic cryptography result carries out homomorphic decryption and obtains i-th group of blacklist verification result in M group blacklist verification result, institute It states i-th of second server and belongs to the M second server, include K blacklist in i-th group of blacklist verification result Verification result, K are positive integer;
Receive the M blacklist matching response that the M second server is sent, wherein the M second server and The M blacklist matching response corresponds, and the M blacklist matching response carries the M group blacklist verification result;
Every group of blacklist verification result in the M group blacklist verification result is sieved according to default not recurring rule Choosing, to obtain N group blacklist verification result, wherein every group of blacklist verification result packet in the N group blacklist verification result Containing L blacklist verification result, N is positive integer, and N=M, L≤K and L are positive integer;
It calls file generated interface to generate the blacklist comprising the N group blacklist verification result and verifies report;
The blacklist auth response is sent to the first server, wherein the blacklist auth response carries institute Blacklist verifying report is stated, the blacklist auth response is used to indicate the first server and extracts the blacklist verifying report The N group blacklist verification result in announcement carries out risk assessment to the N group blacklist verification result, obtains N number of risk and comment Valuation, to determine whether to employ the M job hunter based on N number of risk assessment value.
Wherein, M for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, i for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, K for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, L for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, based in a first aspect, being given birth in the possible embodiment of the first of the invention in the calling file Before generating the blacklist verifying report comprising the N group blacklist verification result at interface, the method also includes:
S1: the integer that initial value is 1 is set by n;
S2: whether detection n is less than or equal to N, if so, S3 is executed, if it is not, then executing S9;
S3: the L blacklist verification result in n-th group blacklist verification result is obtained, wherein the n-th group is black List verification result belongs to the N group blacklist verification result;
S4: L blacklist term data in the L blacklist verification result is extracted;
S5: determine corresponding with L blacklist term data L risk class, wherein blacklist term data and Risk class is directly proportional;
S6: will the L blacklist term data corresponding with the L risk class according to risk class from high to low Sequence arranged, L blacklist verification result after being arranged;
S7: L blacklist verification result after the arrangement is added to the n-th group blacklist verification result;
S8: (n+1) is assigned to n, returns and executes S2;
S9: terminate arrangement.
Wherein, n for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, based on the possible embodiment of the first of first aspect or first aspect, at of the invention second In possible embodiment, determination L risk class corresponding with the L blacklist term data, comprising:
Blacklist time limit maximum blacklist term data is filtered out from the L blacklist term data;
The blacklist term data and default blacklist term data are compared, with the determination blacklist time limit Whether data are greater than the default blacklist term data;
If the blacklist term data is greater than the default blacklist term data, from risk class valuation functions library Middle determination risk class valuation functions corresponding with the blacklist term data;
The L blacklist term data is inputted into the risk class valuation functions respectively, to obtain L risk class Assess data;
The maximum risk class of risk class assessment data is extracted from L risk class assessment data assesses number According to;
Determining default risk class assessment weight corresponding with risk class assessment data;
L risk class assessment data are calculated according to default risk class assessment weight, obtain L risk Grade.
Wherein, in a kind of optinal plan, the corresponding different risk class of different blacklist term datas assesses letter Number, can be as shown in the table:
Blacklist time limit maximum blacklist time limit (day) Default blacklist term data (day) Risk class valuation functions
15 10 Y=x/a+cos (x-a)
30 10 Y=xa/1+tan(x/a)
X in upper table indicates the maximum blacklist time limit in blacklist time limit, and a indicates that default blacklist term data, y indicate Risk class assesses data.
Wherein, in a kind of optinal plan, the different corresponding different default risk class of risk class assessment data Assessment weight, can be as shown in the table:
Risk class assesses data Default risk class assessment weight
1.5 1.5/3+0.28
3.2 3.2/3+0.28
Optionally, the first based on first aspect or first aspect or second of possible embodiment, in this hair In the third bright possible embodiment, the method also includes:
If the blacklist term data is not more than the default blacklist term data, by the L blacklist phase It limits data and inputs risk forecast model, to obtain risk profile value;
The risk profile value and default risk profile value are compared, with the determination risk profile value whether be more than The default risk profile value;
If the risk profile value is more than the default risk profile value, it is determined that institute corresponding with the risk profile value State first group of blacklist verification result in N group blacklist verification result;
Alert messages are sent to the first server, wherein the alert messages carry the risk profile value and institute First group of blacklist verification result is stated, the alert messages are used to indicate the first server will based on the risk profile value Job hunter corresponding with first group of blacklist verification result is labeled as insincere job hunter.
Optionally, based on the first or second or the third possible embodiment party of first aspect or first aspect Formula, in the 4th kind of possible embodiment of the invention, the public key request also carries member's letter of the first server Breath, the method also includes:
If the risk profile value is less than the default risk profile value, it is determined that the member etc. in the membership information Grade;
The membership grade and default membership grade are compared, default member etc. is higher than with the determination membership grade Grade;
The risk profile value is inputted into risk profile Rating Model, obtains risk profile scoring;
Second group of blacklist verifying in the determining corresponding N group blacklist verification result that scores with the risk profile As a result;
It is sent to the first server and carries the risk profile scoring and second group of blacklist verification result Risk profile scoring message, wherein the risk profile scoring message is used to indicate the first server and is based on the risk Corresponding with second group of blacklist verification result job hunter is assessed in prediction scoring, it is determined whether admission is described and described second The corresponding job hunter of group blacklist verification result.
Referring to Fig. 3, a kind of blacklist cloud shared authentication based on homomorphic cryptography that one embodiment of the present of invention provides is filled Setting 300 may include:
First receiving module 301, for receiving the blacklist checking request of first server transmission.
Wherein, the blacklist checking request carries the encryption user information of blacklist verifying mark and job hunter.
Wherein, cloud authentication center for example may include server.
Searching module 302 is black with matched first encryption of blacklist verifying mark for searching from blacklist library List.
Module 303 is obtained, for obtaining the public key with the first encryption blacklist associated storage.
Encrypting module 304, for using the public key to the encryption user information and it is described first encrypt blacklist into Row homomorphic cryptography obtains homomorphic cryptography result.
Optionally, homomorphic cryptography can be for example additive homomorphism, multiplicative homomorphic, mixing multiplicative homomorphic, subtraction homomorphism, division Homomorphism, algebra homomorphism, any one in arithmetic homomorphism.
Wherein, homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Add to by homomorphism Close data are handled to obtain an output, this output is decrypted, and result handles unencryption with Same Way The obtained output deadline information of initial data be the same.
First sending module 305, for sending blacklist matching request to second server.
Wherein, the blacklist matching request carries the homomorphic cryptography as a result, the blacklist matching request is for referring to Show that the second server carries out homomorphic decryption to the homomorphic cryptography result using private key and obtains blacklist verification result.
Second receiving module 306, the blacklist matching response sent for receiving the second server.
Wherein, the blacklist matching response carries the blacklist verification result.
Second sending module 307, for sending blacklist auth response to the first server.
Wherein, the blacklist auth response carries the blacklist verification result, and the blacklist auth response is used for It indicates that the first server carries out risk assessment to the blacklist verification result, obtains risk assessment value, based on described Risk assessment value determines whether to employ the job hunter.
The electronic equipment for the blacklist cloud shared authentication based on homomorphic cryptography that the embodiment of the invention provides a kind of, including place Manage device, memory, communication interface and one or more programs, wherein one or more of programs are stored in described deposit In reservoir, and it is configured to be executed by the processor, includes that blacklist cloud of any one based on homomorphic cryptography is shared to execute The instruction of step in the method for verifying.
The embodiment of the invention provides a kind of computer storage medium, the computer readable storage medium is based on storing Calculation machine program, the storage computer program are executed by the processor, to realize including any one based on the black of homomorphic cryptography The method of list cloud shared authentication.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art answer it is described know, the present invention is not limited by the sequence of acts described, because For according to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also Ying Suoshu Know, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily this hair Necessary to bright.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that arriving, disclosed device can be by others side Formula is realized.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, only one Kind of logical function partition, there may be another division manner in actual implementation, for example, multiple module or components can combine or It is desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed it is mutual it Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or module It connects, can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be with the shape of software product in other words Formula embodies, and the computer software product is stored in a storage medium, including some instructions are used so that a meter It calculates machine equipment (can be personal computer, server or network equipment etc.) and executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), deposits at random Access to memory (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. are various to can store program generation The medium of code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. the method for the blacklist cloud shared authentication based on homomorphic cryptography characterized by comprising
Receive the blacklist checking request that first server is sent, wherein the blacklist checking request carries blacklist verifying The encryption user information of mark and job hunter;
It is searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;
Obtain the public key with the first encryption blacklist associated storage;
Homomorphic cryptography is carried out to the encryption user information and the first encryption blacklist using the public key, homomorphism is obtained and adds Close result;
Blacklist matching request is sent to second server, wherein the blacklist matching request carries the homomorphic cryptography knot Fruit, the blacklist matching request are used to indicate the second server and carry out homomorphism to the homomorphic cryptography result using private key Decryption obtains blacklist verification result;
Receive the blacklist matching response that the second server is sent, wherein the blacklist matching response carries described black List verification result;
Blacklist auth response is sent to the first server, wherein the blacklist auth response carries the blacklist Verification result, the blacklist auth response are used to indicate the first server and carry out risk to the blacklist verification result Assessment, obtains risk assessment value, to determine whether to employ the job hunter based on the risk assessment value.
2. the method according to claim 1, wherein the blacklist verifying sent in the reception first server Before request, the method also includes:
Receive the public key request that the first server is sent, wherein the public key request carries public key mark, the public key mark Know to be generated by the first server based on blacklist verifying mark and obtain;
It is searched from the blacklist library and identifies the matched public key with the public key;
Public key response is sent to the first server, wherein the public key response carries the public key, and the public key response is used User information to be encrypted is encrypted using the public key in the instruction first server, obtains the encryption user letter Breath.
3. the method according to claim 1, wherein described search from blacklist library is verified with the blacklist Before identifying matched first encryption blacklist, the method also includes:
Receive the addition cloud authentication center request that the second server is sent, wherein the addition cloud authentication center request is taken Authentication information with the second server and authentication public key;
It determines that the Internet protocol address in the authentication information meets and presets legal Internet protocol address;
Authentication is carried out to the signing messages in the authentication information using the authentication public key;
When authentication passes through, Xiang Suoshu second server sends blacklist request, wherein the blacklist request is for referring to Show that the second server encrypts the first blacklist to be encrypted using the public key, obtains the black name of first encryption It is single;
Receive the blacklist response that the second server is sent, wherein it is black that the blacklist response carries first encryption List and the public key;
By the public key and the first encryption blacklist associated storage in the blacklist library.
4. according to the method described in claim 3, it is characterized in that, the blacklist response also carry encryption blacklist mark and J blacklist term data in first blacklist to be encrypted, J is positive integer, and the encryption blacklist mark is used for table Show that the J blacklist term data belongs to the first encryption blacklist, every in the J blacklist term data is black List term data is incited somebody to action for indicating that personal flame is recorded in the time limit of the described first blacklist to be encrypted described The public key and described first encrypts blacklist associated storage after the blacklist library, the method also includes:
At interval of preset period of time obtain the public key and it is described first encryption blacklist associated storage the blacklist library when Between, obtain N number of storing time intervals, wherein N is positive integer;
N number of storing time intervals are inputted into predetermined encryption blacklist storage period function according to the sequencing of time, are obtained N number of Export term data;
By it is described it is N number of output term data according to the time sequencing successively with it is every in the J blacklist term data Blacklist term data compares, and determines to exist in N number of output term data and is greater than H blacklist term data First output term data, wherein the H blacklist term data belongs to the J blacklist term data, 0 < H≤J And H is integer;
It calls blacklist to exceed the time limit to identify generating algorithm and generate H blacklist the H blacklist term data to exceed the time limit to identify, In, the H blacklist every blacklist in mark that exceeds the time limit exceeds the time limit mark for indicating that the personal flame has failed;
Blacklist is sent to the second server and updates request, wherein the blacklist updates request and carries the H black name Singly exceed the time limit to identify, the blacklist update request be used to indicate the second server will in the described first blacklist to be encrypted and The H blacklist exceeds the time limit to identify matched H item individual's flame deletion, the second blacklist to be encrypted is obtained, using described Public key encrypts the described second blacklist to be encrypted, obtains the second encryption blacklist;
It receives the second server and sends blacklist update response, wherein the blacklist updates response and carries described second Encrypt blacklist;
The first encryption blacklist with the public key associated storage is substituted for the second encryption blacklist.
5. the method according to claim 1, which is characterized in that the method also includes:
Receive the blacklist checking request that the first server is sent, wherein the blacklist checking request carries M M encryption user information of blacklist verifying mark and M job hunter;
It is searched from the blacklist library and identifies matched M encryption blacklist with M blacklist verifying, wherein the M A blacklist verifying mark is corresponded with the M encryption blacklist;
Obtain the M public key with described M encryption blacklist associated storage;
Homomorphic cryptography is carried out to the M encryption user information and the M encryption blacklist using the M public key, obtains M A homomorphic cryptography result, wherein i-th of homomorphic cryptography result in the M homomorphic cryptography result is by the M public key I-th of public key encrypts to obtain to i-th of encryption user information and i-th of encryption blacklist, i-th of encryption user letter Breath belongs to the M encryption user information, and i-th of encryption blacklist belongs to the M encryption blacklist, 0 < i≤M and i For integer;
M blacklist matching request is sent to M second server, wherein the M second server and the M black names Single matching request corresponds, and the M blacklist matching request carries the M homomorphic cryptography as a result, the M blacklist I-th of blacklist matching request in matching request is used to indicate i-th of second server using i-th of private key to described i-th A homomorphic cryptography result carries out homomorphic decryption and obtains i-th group of blacklist verification result in M group blacklist verification result, and described the I second server belongs to the M second server, includes K blacklist verifying in i-th group of blacklist verification result As a result, K is positive integer;
The M blacklist matching that the M second server is sent is received to respond, wherein the M second server with it is described M blacklist matching response corresponds, and the M blacklist matching response carries the M group blacklist verification result;
Every group of blacklist verification result in the M group blacklist verification result is screened according to default not recurring rule, To obtain N group blacklist verification result, wherein every group of blacklist verification result in the N group blacklist verification result includes L Blacklist verification result, N are positive integer, and N=M, L≤K and L are positive integer;
It calls file generated interface to generate the blacklist comprising the N group blacklist verification result and verifies report;
The blacklist auth response is sent to the first server, wherein the blacklist auth response carries described black List verifying report, the blacklist auth response are used to indicate the first server and extract in the blacklist verifying report The N group blacklist verification result, to the N group blacklist verification result carry out risk assessment, obtain N number of risk assessment Value, to determine whether to employ the M job hunter based on N number of risk assessment value.
6. according to the method described in claim 5, it is characterized in that, generating in the calling file generated interface includes the N Before the blacklist verifying report of group blacklist verification result, the method also includes:
S1: the integer that initial value is 1 is set by n;
S2: whether detection n is less than or equal to N, if so, S3 is executed, if it is not, then executing S9;
S3: the L blacklist verification result in n-th group blacklist verification result is obtained, wherein the n-th group blacklist Verification result belongs to the N group blacklist verification result;
S4: L blacklist term data in the L blacklist verification result is extracted;
S5: L risk class corresponding with the L blacklist term data is determined, wherein blacklist term data and risk Grade is directly proportional;
S6: by the L blacklist term data corresponding with the L risk class according to risk class from high to low suitable Sequence is arranged, L blacklist verification result after being arranged;
S7: L blacklist verification result after the arrangement is added to the n-th group blacklist verification result;
S8: (n+1) is assigned to n, returns and executes S2;
S9: terminate arrangement.
7. according to the method described in claim 6, it is characterized in that, the determination is corresponding with the L blacklist term data L risk class, comprising:
Blacklist time limit maximum blacklist term data is filtered out from the L blacklist term data;
The blacklist term data and default blacklist term data are compared, with the determination blacklist term data Whether the default blacklist term data is greater than;
If the blacklist term data is greater than the default blacklist term data, from risk class valuation functions library really Fixed risk class valuation functions corresponding with the blacklist term data;
The L blacklist term data is inputted into the risk class valuation functions respectively, to obtain L risk class assessment Data;
The maximum risk class of risk class assessment data is extracted from L risk class assessment data assesses data;
Determining default risk class assessment weight corresponding with risk class assessment data;
L risk class assessment data are calculated according to default risk class assessment weight, obtain L risk etc. Grade.
8. a kind of blacklist cloud shared authentication device based on homomorphic cryptography characterized by comprising
First receiving module, for receiving the blacklist checking request of first server transmission, wherein the blacklist verifying is asked Seek the encryption user information for carrying blacklist verifying mark and job hunter;
Searching module, for being searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;
Module is obtained, for obtaining the public key with the first encryption blacklist associated storage;
Encrypting module, for the encryption user information and the first encryption blacklist to be carried out homomorphism and added using the public key It is close, obtain homomorphic cryptography result;
First sending module, for sending blacklist matching request to second server, wherein the blacklist matching request is taken With the homomorphic cryptography as a result, the blacklist matching request is used to indicate the second server using private key to the homomorphism Encrypted result carries out homomorphic decryption and obtains blacklist verification result;
Second receiving module, the blacklist matching response sent for receiving the second server, wherein the blacklist The blacklist verification result is carried with response;
Second sending module, for sending blacklist auth response to the first server, wherein the blacklist verifying is rung The blacklist verification result should be carried, the blacklist auth response is used to indicate the first server to the blacklist Verification result carries out risk assessment, obtains risk assessment value, to determine whether to employ the job hunting based on the risk assessment value Person.
9. a kind of electronic equipment of the blacklist cloud shared authentication based on homomorphic cryptography, which is characterized in that including processor, storage Device, communication interface and one or more programs, wherein one or more of programs are stored in the memory, and And be generated and executed by the processor, the instruction of the step in any one of 1-7 method is required with perform claim.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer Program, the storage computer program are executed by the processor, to realize the described in any item methods of claim 1-7.
CN201910421986.2A 2019-05-21 2019-05-21 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography Pending CN110232283A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910421986.2A CN110232283A (en) 2019-05-21 2019-05-21 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography
PCT/CN2019/120154 WO2020233038A1 (en) 2019-05-21 2019-11-22 Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910421986.2A CN110232283A (en) 2019-05-21 2019-05-21 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography

Publications (1)

Publication Number Publication Date
CN110232283A true CN110232283A (en) 2019-09-13

Family

ID=67861458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910421986.2A Pending CN110232283A (en) 2019-05-21 2019-05-21 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography

Country Status (2)

Country Link
CN (1) CN110232283A (en)
WO (1) WO2020233038A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461728A (en) * 2020-03-31 2020-07-28 支付宝(杭州)信息技术有限公司 Risk identification method, device and system
WO2020233038A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus
CN114584283A (en) * 2022-03-21 2022-06-03 深圳壹账通智能科技有限公司 Privacy protection method, device, equipment and storage medium for blacklist matching

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8468595B1 (en) * 2006-03-22 2013-06-18 Trend Micro Incorporated Content filtering prior to data encryption
CN107231434A (en) * 2017-07-10 2017-10-03 北京小米移动软件有限公司 The control method and device of terminal device
WO2018090183A1 (en) * 2016-11-15 2018-05-24 深圳达闼科技控股有限公司 Identity authentication method, terminal device, authentication server and electronic device
CN108494738A (en) * 2018-02-27 2018-09-04 华南理工大学 A kind of rear Quantum Electronics ballot system that can verify that and its implementation
WO2019024485A1 (en) * 2017-07-31 2019-02-07 平安科技(深圳)有限公司 Data sharing method and device and computer readable storage medium
CN109669986A (en) * 2018-12-12 2019-04-23 深圳乐信软件技术有限公司 Blacklist sharing method, device, equipment and storage medium based on block chain
CN109711973A (en) * 2018-11-09 2019-05-03 深圳壹账通智能科技有限公司 Methods of risk assessment and device, storage medium, computer equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281377B (en) * 2013-05-31 2016-06-08 北京创世泰克科技股份有限公司 A kind of encrypt data storage and querying method of facing cloud
CN106302312B (en) * 2015-05-13 2019-09-17 阿里巴巴集团控股有限公司 Obtain the method and device of electronic document
CN110232283A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8468595B1 (en) * 2006-03-22 2013-06-18 Trend Micro Incorporated Content filtering prior to data encryption
WO2018090183A1 (en) * 2016-11-15 2018-05-24 深圳达闼科技控股有限公司 Identity authentication method, terminal device, authentication server and electronic device
CN107231434A (en) * 2017-07-10 2017-10-03 北京小米移动软件有限公司 The control method and device of terminal device
WO2019024485A1 (en) * 2017-07-31 2019-02-07 平安科技(深圳)有限公司 Data sharing method and device and computer readable storage medium
CN108494738A (en) * 2018-02-27 2018-09-04 华南理工大学 A kind of rear Quantum Electronics ballot system that can verify that and its implementation
CN109711973A (en) * 2018-11-09 2019-05-03 深圳壹账通智能科技有限公司 Methods of risk assessment and device, storage medium, computer equipment
CN109669986A (en) * 2018-12-12 2019-04-23 深圳乐信软件技术有限公司 Blacklist sharing method, device, equipment and storage medium based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233038A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus
CN111461728A (en) * 2020-03-31 2020-07-28 支付宝(杭州)信息技术有限公司 Risk identification method, device and system
CN111461728B (en) * 2020-03-31 2023-03-10 支付宝(杭州)信息技术有限公司 Risk identification method, device and system
CN114584283A (en) * 2022-03-21 2022-06-03 深圳壹账通智能科技有限公司 Privacy protection method, device, equipment and storage medium for blacklist matching

Also Published As

Publication number Publication date
WO2020233038A1 (en) 2020-11-26

Similar Documents

Publication Publication Date Title
US10917246B2 (en) System and method for blockchain-based cross-entity authentication
Leng et al. Blockchain security: A survey of techniques and research directions
US10824701B2 (en) System and method for mapping decentralized identifiers to real-world entities
US20210075589A1 (en) System and method for blockchain-based cross-entity authentication
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
CN106254374B (en) A kind of cloud data public audit method having duplicate removal function
Zhu et al. Dynamic audit services for outsourced storages in clouds
CN111259070A (en) Method and related device for storing and acquiring service data
CN108235805A (en) Account unifying method and device and storage medium
CN109246137A (en) The safety protecting method and device of naval warfare data based on block chain
CN103002040B (en) Method for checking cloud computation user data
Lin et al. Consortium blockchain-based public integrity verification in cloud storage for IoT
CN110490610A (en) A kind of community management system based on block chain
CN110493237A (en) Identity management method, device, computer equipment and storage medium
CN110232283A (en) The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography
CN108960832A (en) The method for secret protection and system of block chain real name communication
Yan et al. Integrity audit of shared cloud data with identity tracking
CN109102404A (en) The method for secret protection and system of block chain real name communication
CN109104419A (en) A kind of generation method and system of block chain account
Zhang et al. Privacy-preserving reputation management for blockchain-based mobile crowdsensing
CN110012024A (en) A kind of data sharing method, system, equipment and computer readable storage medium
Alansari et al. Efficient and privacy-preserving contact tracing system for COVID-19 using blockchain
Zhou et al. A Scalable Blockchain‐Based Integrity Verification Scheme
CN109450636A (en) The integrity verification method of group data in a kind of cloud storage
Killer et al. Blockchain-Based Voting Considered Harmful?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240112

AD01 Patent right deemed abandoned