CN110232283A - The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography - Google Patents
The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography Download PDFInfo
- Publication number
- CN110232283A CN110232283A CN201910421986.2A CN201910421986A CN110232283A CN 110232283 A CN110232283 A CN 110232283A CN 201910421986 A CN201910421986 A CN 201910421986A CN 110232283 A CN110232283 A CN 110232283A
- Authority
- CN
- China
- Prior art keywords
- blacklist
- server
- encryption
- verification result
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000012795 verification Methods 0.000 claims abstract description 95
- 230000004044 response Effects 0.000 claims abstract description 71
- 238000012502 risk assessment Methods 0.000 claims description 30
- 230000006870 function Effects 0.000 claims description 14
- 238000012163 sequencing technique Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 4
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 238000004422 calculation algorithm Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 2
- 239000000284 extract Substances 0.000 claims description 2
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 239000000654 additive Substances 0.000 description 3
- 230000000996 additive effect Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 241000872198 Serjania polyphylla Species 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application involves cloud storage, the method for the blacklist cloud shared authentication based on homomorphic cryptography is disclosed, comprising: receive the blacklist checking request for carrying blacklist verifying mark and the encryption user information of job hunter that first server is sent;It is searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;Obtain public key;Homomorphic cryptography result is obtained to encryption user information and the first encryption blacklist homomorphic cryptography using public key;The blacklist matching request for carrying homomorphic cryptography result is sent to second server, blacklist matching request is used to indicate second server and obtains blacklist verification result to homomorphic cryptography result progress homomorphic decryption using private key;The blacklist for receiving the carrying blacklist verification result that second server is sent matches response;The blacklist auth response for carrying blacklist verification result is sent to first server.Implement the embodiment of the present invention, realizes the safety and privacy for ensuring information in the case where blacklist is shared.
Description
Technical field
The present invention relates to field of computer technology, more particularly to the method for the blacklist cloud shared authentication based on homomorphic cryptography
And relevant apparatus.
Background technique
Currently, each enterprise can safeguard respective blacklist library, to resist some malicious attacks.Although each enterprise it
Between blacklist library in there may be some duplicate blacklists, but because the field that is related to of each enterprise is different, often
There are many different blacklists in blacklist library between a enterprise again.With the development of the times, when enterprise interviews job hunter, one
As according to the simple exchange of the resume content of job hunter and interview process determine whether to recruit the job hunter.However, this
Mode cannot consider the conduct of job hunter.It therefore, is the reasonable utilization for realizing resource, many enterprises can place blacklist now
In third-party platform, so as to which the user information for needing to verify is matched with blacklist all in third-party platform,
To determine whether job hunter corresponding with user information has bad reference behavior, fraud etc., to help whether enterprise records
With the job hunter.
However, either blacklist verification process or blacklist are uploaded to third-party platform in this sharing mode
Process, to there are problems that information is intercepted, does not only result in user information loss, also leads due to not using cryptographic means
Blackening list information leakage.In addition, leading to all black names since third-party platform possesses all black list informations of enterprise's upload
Single information is all exposed to third-party platform, experiences for each enterprise customer bad.Likewise, the user of job hunter believes
Breath is also exposed to third-party platform.Therefore, the safety of this mode information and privacy are all insufficient.
Summary of the invention
The embodiment of the invention provides the methods and relevant apparatus of the blacklist cloud shared authentication based on homomorphic cryptography, implement
The embodiment of the present invention realizes the safety and privacy for ensuring information in the case where blacklist is shared.
First aspect of the embodiment of the present invention provides the method for the blacklist cloud shared authentication based on homomorphic cryptography, comprising:
Receive the blacklist checking request that first server is sent, wherein the blacklist checking request carries blacklist
The encryption user information of verifying mark and job hunter;
It is searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;
Obtain the public key with the first encryption blacklist associated storage;
Homomorphic cryptography is carried out to the encryption user information and the first encryption blacklist using the public key, is obtained same
State encrypted result;
Blacklist matching request is sent to second server, wherein the blacklist matching request carries the homomorphism and adds
It is close to use private key to carry out the homomorphic cryptography result as a result, the blacklist matching request is used to indicate the second server
Homomorphic decryption obtains blacklist verification result;
Receive the blacklist matching response that the second server is sent, wherein the blacklist matching response carries institute
State blacklist verification result;
Blacklist auth response is sent to the first server, wherein the blacklist auth response carries described black
List verification result, the blacklist auth response are used to indicate the first server and carry out to the blacklist verification result
Risk assessment obtains risk assessment value, to determine whether to employ the job hunter based on the risk assessment value.
Second aspect of the embodiment of the present invention provides a kind of blacklist cloud shared authentication device based on homomorphic cryptography, packet
It includes:
First receiving module, for receiving the blacklist checking request of first server transmission, wherein the blacklist is tested
Card request carries the encryption user information of blacklist verifying mark and job hunter;
Searching module, for being searched from blacklist library and the black name of matched first encryption of blacklist verifying mark
It is single;
Module is obtained, for obtaining the public key with the first encryption blacklist associated storage;
Encrypting module, it is same for being carried out using the public key to the encryption user information and the first encryption blacklist
State encryption, obtains homomorphic cryptography result;
First sending module, for sending blacklist matching request to second server, wherein the blacklist matching is asked
It asks and carries the homomorphic cryptography as a result, the blacklist matching request is used to indicate the second server using private key to described
Homomorphic cryptography result carries out homomorphic decryption and obtains blacklist verification result;
Second receiving module, the blacklist matching response sent for receiving the second server, wherein the black name
Single matching response carries the blacklist verification result;
Second sending module, for sending blacklist auth response to the first server, wherein the blacklist is tested
Card response carries the blacklist verification result, and the blacklist auth response is used to indicate the first server to described black
List verification result carries out risk assessment, obtains risk assessment value, described to determine whether to employ based on the risk assessment value
Job hunter.
As can be seen that cloud authentication center receives the carrying blacklist verifying that first server is sent in above-mentioned technical proposal
The encryption user information of mark and job hunter realizes the safety for ensuring user information in transmission process, avoids user information quilt
Interception, also avoids user information and is known by cloud authentication center, while being verified based on blacklist and being identified with and to verify conducive to determination
Blacklist;It is searched from blacklist library and encrypts blacklist with blacklist verifying mark matched first, realized purposive
The blacklist to be verified of determination saves the verification time;The public key with the first encryption blacklist associated storage is obtained, is realized first
Encryption blacklist and public key obtain the public key for encrypting blacklist to be encrypted when being associated storage, be subsequent homomorphic cryptography and
Homomorphic decryption is prepared;Homomorphic cryptography is carried out to encryption user information and the first encryption blacklist using public key, homomorphism is obtained and adds
It is close as a result, by using same public key encryption, prepare for subsequent homomorphic decryption;Blacklist matching is sent to second server
Request, wherein blacklist matching request carries homomorphic cryptography as a result, blacklist matching request is used to indicate second server use
Private key carries out homomorphic decryption to homomorphic cryptography result and obtains blacklist verification result, realizes in data transmission procedure, avoids
Homomorphic cryptography result is intercepted, meanwhile, it is realized using homomorphic decryption and is obtained in the case where second server unknown subscriber's information
Blacklist verification result is arrived, to realize the separation of data rights and data ownership, it is ensured that the peace of all information
Full property and privacy;The blacklist for receiving the carrying blacklist verification result that second server is sent matches response, in the second clothes
It is engaged in blacklist verification result being obtained, in order to which blacklist verification result is sent to first service after the matching of device blacklist
Device;Blacklist auth response is sent to first server, wherein blacklist auth response carries blacklist verification result, black name
Single auth response is used to indicate first server and carries out risk assessment to blacklist verification result, risk assessment value is obtained, with base
Determine whether to take a job applicant on the staff in the risk assessment value, blacklist verification result is sent to first server, in order to
One server carries out risk assessment to blacklist verification result, to determine whether to employ the job hunting based on the risk assessment value
Person avoids enterprise from employing the job hunting for having bad reference behavior, fraud to realize the reasonable utilization of blacklist resource
Person maintains company interest in all directions.To sum up, implement the embodiment of the present invention, realize the peace for ensuring information in the case where blacklist is shared
Full property and privacy, and realize the reasonable utilization of blacklist resource, it avoids enterprise from employing and has bad reference behavior, fraud
Job hunter, maintain company interest in all directions.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Wherein:
Fig. 1 is a kind of process of the method for the blacklist cloud shared authentication based on homomorphic cryptography provided in an embodiment of the present invention
Schematic diagram;
Fig. 2 is the stream of the method for another blacklist cloud shared authentication based on homomorphic cryptography provided in an embodiment of the present invention
Journey schematic diagram;
Fig. 3 is a kind of signal of the blacklist cloud shared authentication device based on homomorphic cryptography provided in an embodiment of the present invention
Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
It is described in detail separately below.
Description and claims of this specification and the term " first " in above-mentioned attached drawing, " second " are for distinguishing not
Same object, is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
Non-exclusive include in covering.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising
For the intrinsic other step or units of these process, methods, product or equipment.
Firstly, Fig. 1 is a kind of blacklist cloud based on homomorphic cryptography that one embodiment of the present of invention provides referring to Fig. 1
The flow diagram of the method for shared authentication.Wherein, as shown in Figure 1, one kind that one embodiment of the present of invention provides is based on together
The method of blacklist cloud shared authentication of state encryption may include:
101, cloud authentication center receives the blacklist checking request that first server is sent.
Wherein, the blacklist checking request carries the encryption user information of blacklist verifying mark and job hunter.
Wherein, cloud authentication center for example may include server.
102, cloud authentication center is searched and the black name of matched first encryption of blacklist verifying mark from blacklist library
It is single.
103, cloud authentication center obtains the public key with the first encryption blacklist associated storage.
104, cloud authentication center carries out the encryption user information and the first encryption blacklist using the public key
Homomorphic cryptography obtains homomorphic cryptography result.
Optionally, homomorphic cryptography can be for example additive homomorphism, multiplicative homomorphic, mixing multiplicative homomorphic, subtraction homomorphism, division
Homomorphism, algebra homomorphism, any one in arithmetic homomorphism.
Wherein, homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Add to by homomorphism
Close data are handled to obtain an output, this output is decrypted, and result handles unencryption with Same Way
The obtained output deadline information of initial data be the same.
105, cloud authentication center sends blacklist matching request to second server.
Wherein, the blacklist matching request carries the homomorphic cryptography as a result, the blacklist matching request is for referring to
Show that the second server carries out homomorphic decryption to the homomorphic cryptography result using private key and obtains blacklist verification result.
106, cloud authentication center receives the blacklist matching response that the second server is sent.
Wherein, the blacklist matching response carries the blacklist verification result.
107, cloud authentication center sends blacklist auth response to the first server.
Wherein, the blacklist auth response carries the blacklist verification result, and the blacklist auth response is used for
It indicates that the first server carries out risk assessment to the blacklist verification result, obtains risk assessment value, based on described
Risk assessment value determines whether to employ the job hunter.
Referring to fig. 2, Fig. 2 is that another blacklist cloud based on homomorphic cryptography that one embodiment of the present of invention provides is shared
The flow diagram of the method for verifying.Wherein, as shown in Fig. 2, one kind that one embodiment of the present of invention provides is added based on homomorphism
The method of close blacklist cloud shared authentication may include:
201, cloud authentication center receives the public key request that the first server is sent.
Wherein, the public key request carries public key mark, and the public key mark is based on described black by the first server
List verifying mark, which generates, to be obtained.
202, cloud authentication center is searched from the blacklist library identifies the matched public key with the public key.
203, cloud authentication center sends public key response to the first server.
Wherein, the public key response carries the public key, and the public key response is used to indicate the first server and uses
The public key encrypts user information to be encrypted, obtains the encryption user information.
Optionally, user information to be encrypted for example may include: name, gender, the age, ID card No., contact method,
Pass through college school etc..
204, cloud authentication center receives the blacklist checking request that first server is sent.
Wherein, the blacklist checking request carries the encryption user information of blacklist verifying mark and job hunter.
Wherein, cloud authentication center for example may include server.
205, cloud authentication center is searched and the black name of matched first encryption of blacklist verifying mark from blacklist library
It is single.
Optionally, in a first aspect, in a kind of possible embodiment of the invention, it is described from blacklist library search with
Before the matched first encryption blacklist of blacklist verifying mark, the method also includes:
Receive the addition cloud authentication center request that the second server is sent, wherein the addition cloud authentication center is asked
Seek the authentication information and authentication public key for carrying the second server;
It determines that the Internet protocol address in the authentication information meets and presets legal Internet protocol address;
Authentication is carried out to the signing messages in the authentication information using the authentication public key;
When authentication passes through, Xiang Suoshu second server sends blacklist request, wherein the blacklist request is used
The first blacklist to be encrypted is encrypted using the public key in the instruction second server, it is black to obtain first encryption
List;
Receive the blacklist response that the second server is sent, wherein the blacklist response carries described first and adds
Close blacklist and the public key;
By the public key and the first encryption blacklist associated storage in the blacklist library.
Wherein, IP address refers to Internet protocol address (Internet Protocol Address, and be translated into internet association
Discuss address), it is the abbreviation of IP Address.IP address is a kind of unified address format that IP agreement provides, it is internet
On one logical address of each network and each host assignment, the difference of physical address is shielded with this.
Optionally, signing messages is encrypted to obtain using authentication private key by second server to company information.
Wherein, company information for example may include: enterprise name, organization mechanism code, contact method, seller addresses, warp
Seek range etc..
As can be seen that cloud authentication center receives the carrying second server that second server is sent in above-mentioned technical proposal
Authentication information and authentication public key addition cloud authentication center request, in this way be cloud authentication center to second server
Identity verifying provide it is convenient;It determines that the Internet protocol address in authentication information meets and presets legal Internet protocol
Address, it is ensured that the legitimacy of the logical address of second server;Using authentication public key to the signature in authentication information
Information carries out authentication, it is ensured that the signing messages that second server carries is not tampered with, and ensure that the conjunction of second server
Method,;When authentication passes through, blacklist request is sent to second server, wherein blacklist request is used to indicate second
Server encrypts the first blacklist to be encrypted using public key, obtains the first encryption blacklist, when authentication passes through,
Just agree to that encryption blacklist can be sent to cloud authentication center by second server, ensures that a reasonable addition is former
Then;Receive the blacklist response that second server is sent, wherein blacklist response carries the first encryption blacklist and public key, obtains
To public key, first server can be allowed to encrypt user information to be encrypted, homomorphic cryptography can also be realized using public key;By public key and
First encryption blacklist associated storage realizes that cloud authentication center obtains public key in blacklist library.To sum up, cloud is added by setting to test
The condition at card center ensures that the accuracy of blacklist, lays the groundwork for subsequent benign blacklist library construction.
Optionally, based in a first aspect, the blacklist response is also in the possible embodiment of the first of the invention
J blacklist term data in encryption blacklist mark and the described first blacklist to be encrypted is carried, J is positive integer, described
Encryption blacklist mark is for indicating that the J blacklist term data belongs to the first encryption blacklist, the black name of J item
Every blacklist term data in single term data is for indicating that personal flame is recorded in the described first black name to be encrypted
Single time limit, described by the public key and the first encryption blacklist associated storage is after the blacklist library,
The method also includes:
The public key and the first encryption blacklist associated storage are obtained in the blacklist library at interval of preset period of time
Time, obtain N number of storing time intervals, wherein N is positive integer;
N number of storing time intervals are inputted into predetermined encryption blacklist storage period function according to the sequencing of time, are obtained
To N number of output term data;
By N number of output term data according to the sequencing of time successively and in the J blacklist term data
Every blacklist term data compare, determine in N number of output term data exist be greater than H blacklist time limit number
According to first output term data, wherein the H blacklist term data belongs to the J blacklist term data, 0 < H
≤ J and H are integer;
It calls blacklist to exceed the time limit to identify generating algorithm and generate H blacklist the H blacklist term data to exceed the time limit to mark
Know, wherein the H blacklist exceed the time limit mark in every blacklist exceed the time limit mark for indicated it is described individual flame
Failure;
Blacklist is sent to the second server and updates request, wherein the blacklist update request carries H described
Blacklist exceeds the time limit to identify, and the blacklist updates request and is used to indicate the second server for the described first blacklist to be encrypted
In exceed the time limit to identify matched H item individual's flame with the H blacklist and delete, obtain the second blacklist to be encrypted, use
The public key encrypts the described second blacklist to be encrypted, obtains the second encryption blacklist;
It receives the second server and sends blacklist update response, wherein described in the blacklist update response carries
Second encryption blacklist;
The first encryption blacklist with the public key associated storage is substituted for the second encryption blacklist.
Wherein, J for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, H for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, in a kind of optinal plan, blacklist term data can be as shown in the table:
The blacklist time limit (day) | 2 |
The blacklist time limit (day) | 15 |
The blacklist time limit (day) | 30 |
… | … |
Left side ellipsis in upper table indicates blacklist time limit (day), and right side ellipsis indicates specific number of days.
Optionally, preset time for example may include: half an hour, and 1 day, 3 days, one week, 2 weeks, one month, 3 months, 6
The other times such as the moon, 1 year.
Wherein, preset time can be previously set by administrator.Or preset time is also recordable in configuration file, can be led to
Query configuration file is crossed to determine preset time.
Optionally, predetermined encryption blacklist storage period function is y=x+sin (x/6), wherein y is output time limit number
According to x is storing time intervals.
Wherein, personal flame for example may include: name, gender, the age, ID card No., contact method, break one's promise
Reason, time of breaking one's promise, event of breaking one's promise, place of breaking one's promise etc..
As can be seen that obtaining public key in above-mentioned technical proposal at interval of preset period of time and the first encryption blacklist association being deposited
Storage obtains N number of storing time intervals in the time in the blacklist library, by obtaining storing time intervals at interval of preset period of time, will realize
Dynamic monitors blacklist library;N number of storing time intervals are inputted into predetermined encryption blacklist storage period letter according to the sequencing of time
Number, obtains N number of output term data, and N number of storing time intervals are inputted predetermined encryption blacklist by the sequencing according to the time
Storage period function is realized and orderly obtains output term data, accelerates cloud authentication center processing speed;By N number of output time limit
Data are successively compared with every blacklist term data in J blacklist term data according to the sequencing of time,
Determine there is the first output term data for being greater than H blacklist term data in N number of output term data, by successively by N
A output term data is compared with every blacklist term data in J blacklist term data, quickly obtains N number of output phase
It limits and there is the first output term data for being greater than H blacklist term data in data, so that it is determined that J blacklist term data
In have H blacklist term data no longer valid;Blacklist is called to exceed the time limit to identify generating algorithm life H blacklist term data
Exceed the time limit to identify at H blacklist, wherein the H blacklist every blacklist in mark that exceeds the time limit exceeds the time limit mark for indicating personal
Flame has failed, and generates H blacklist and exceeds the time limit to identify, and deletes in blacklist to be encrypted failed for second server
People's flame is prepared;Blacklist update request is sent to second server, wherein it is a black that blacklist update request carries H
List exceeds the time limit to identify, blacklist update request be used to indicate second server by the first blacklist to be encrypted with H blacklist
Exceed the time limit to identify matched H item individual's flame deletion, obtains the second blacklist to be encrypted, it is to be encrypted black to second using public key
List is encrypted, and the second encryption blacklist is obtained, so that second server be allowed to be exceeded the time limit to identify deletion H item according to H blacklist
Personal flame then encrypts the second blacklist to be encrypted using public key, obtains to obtain the second blacklist to be encrypted
To the second encryption blacklist, second encryption blacklist is issued cloud authentication center and prepared to be subsequent;Receive second server hair
Blacklist is sent to update response, wherein blacklist updates response and carries the second encryption blacklist, realizes the transmission of data;It will be with
First encryption blacklist of public key associated storage is substituted for the second encryption blacklist, to realize individual of failing in blacklist library
The deletion of flame, saves memory space, alleviates the carrying cost of cloud authentication center.
206, cloud authentication center obtains the public key with the first encryption blacklist associated storage.
207, cloud authentication center carries out the encryption user information and the first encryption blacklist using the public key
Homomorphic cryptography obtains homomorphic cryptography result.
Optionally, homomorphic cryptography can be for example additive homomorphism, multiplicative homomorphic, mixing multiplicative homomorphic, subtraction homomorphism, division
Homomorphism, algebra homomorphism, any one in arithmetic homomorphism.
Wherein, homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Add to by homomorphism
Close data are handled to obtain an output, this output is decrypted, and result handles unencryption with Same Way
The obtained output deadline information of initial data be the same.
208, cloud authentication center sends blacklist matching request to second server.
Wherein, the blacklist matching request carries the homomorphic cryptography as a result, the blacklist matching request is for referring to
Show that the second server carries out homomorphic decryption to the homomorphic cryptography result using private key and obtains blacklist verification result.
209, cloud authentication center receives the blacklist matching response that the second server is sent.
Wherein, the blacklist matching response carries the blacklist verification result.
210, cloud authentication center sends blacklist auth response to the first server.
Wherein, the blacklist auth response carries the blacklist verification result, and the blacklist auth response is used for
It indicates that the first server carries out risk assessment to the blacklist verification result, obtains risk assessment value, based on described
Risk assessment value determines whether to employ the job hunter.
Optionally, in a first aspect, in a kind of possible embodiment of the invention, the method also includes:
Receive the blacklist checking request that the first server is sent, wherein the blacklist checking request is taken
The M encryption user information with M blacklist verifying mark and M job hunter;
It is searched from the blacklist library and identifies matched M encryption blacklist with M blacklist verifying, wherein
The M blacklist verifying mark is corresponded with the M encryption blacklist;
Obtain the M public key with described M encryption blacklist associated storage;
Homomorphic cryptography is carried out to the M encryption user information and the M encryption blacklist using the M public key,
Obtain M homomorphic cryptography result, wherein i-th of homomorphic cryptography result in the M homomorphic cryptography result is public by described M
I-th of public key in key encrypts to obtain to i-th of encryption user information and i-th of encryption blacklist, i-th of encryption
User information belongs to the M encryption user information, and i-th of encryption blacklist belongs to the M encryption blacklist, 0 < i
≤ M and i are integer;
M blacklist matching request is sent to M second server, wherein the M second server and the M
Blacklist matching request corresponds, and the M blacklist matching request carries the M homomorphic cryptography as a result, the M black
I-th of blacklist matching request in list matching request is used to indicate i-th of second server using i-th of private key to described
I-th of homomorphic cryptography result carries out homomorphic decryption and obtains i-th group of blacklist verification result in M group blacklist verification result, institute
It states i-th of second server and belongs to the M second server, include K blacklist in i-th group of blacklist verification result
Verification result, K are positive integer;
Receive the M blacklist matching response that the M second server is sent, wherein the M second server and
The M blacklist matching response corresponds, and the M blacklist matching response carries the M group blacklist verification result;
Every group of blacklist verification result in the M group blacklist verification result is sieved according to default not recurring rule
Choosing, to obtain N group blacklist verification result, wherein every group of blacklist verification result packet in the N group blacklist verification result
Containing L blacklist verification result, N is positive integer, and N=M, L≤K and L are positive integer;
It calls file generated interface to generate the blacklist comprising the N group blacklist verification result and verifies report;
The blacklist auth response is sent to the first server, wherein the blacklist auth response carries institute
Blacklist verifying report is stated, the blacklist auth response is used to indicate the first server and extracts the blacklist verifying report
The N group blacklist verification result in announcement carries out risk assessment to the N group blacklist verification result, obtains N number of risk and comment
Valuation, to determine whether to employ the M job hunter based on N number of risk assessment value.
Wherein, M for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, i for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, K for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, L for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, based in a first aspect, being given birth in the possible embodiment of the first of the invention in the calling file
Before generating the blacklist verifying report comprising the N group blacklist verification result at interface, the method also includes:
S1: the integer that initial value is 1 is set by n;
S2: whether detection n is less than or equal to N, if so, S3 is executed, if it is not, then executing S9;
S3: the L blacklist verification result in n-th group blacklist verification result is obtained, wherein the n-th group is black
List verification result belongs to the N group blacklist verification result;
S4: L blacklist term data in the L blacklist verification result is extracted;
S5: determine corresponding with L blacklist term data L risk class, wherein blacklist term data and
Risk class is directly proportional;
S6: will the L blacklist term data corresponding with the L risk class according to risk class from high to low
Sequence arranged, L blacklist verification result after being arranged;
S7: L blacklist verification result after the arrangement is added to the n-th group blacklist verification result;
S8: (n+1) is assigned to n, returns and executes S2;
S9: terminate arrangement.
Wherein, n for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, based on the possible embodiment of the first of first aspect or first aspect, at of the invention second
In possible embodiment, determination L risk class corresponding with the L blacklist term data, comprising:
Blacklist time limit maximum blacklist term data is filtered out from the L blacklist term data;
The blacklist term data and default blacklist term data are compared, with the determination blacklist time limit
Whether data are greater than the default blacklist term data;
If the blacklist term data is greater than the default blacklist term data, from risk class valuation functions library
Middle determination risk class valuation functions corresponding with the blacklist term data;
The L blacklist term data is inputted into the risk class valuation functions respectively, to obtain L risk class
Assess data;
The maximum risk class of risk class assessment data is extracted from L risk class assessment data assesses number
According to;
Determining default risk class assessment weight corresponding with risk class assessment data;
L risk class assessment data are calculated according to default risk class assessment weight, obtain L risk
Grade.
Wherein, in a kind of optinal plan, the corresponding different risk class of different blacklist term datas assesses letter
Number, can be as shown in the table:
Blacklist time limit maximum blacklist time limit (day) | Default blacklist term data (day) | Risk class valuation functions |
15 | 10 | Y=x/a+cos (x-a) |
30 | 10 | Y=xa/1+tan(x/a) |
… | … | … |
X in upper table indicates the maximum blacklist time limit in blacklist time limit, and a indicates that default blacklist term data, y indicate
Risk class assesses data.
Wherein, in a kind of optinal plan, the different corresponding different default risk class of risk class assessment data
Assessment weight, can be as shown in the table:
Risk class assesses data | Default risk class assessment weight |
1.5 | 1.5/3+0.28 |
3.2 | 3.2/3+0.28 |
… | … |
Optionally, the first based on first aspect or first aspect or second of possible embodiment, in this hair
In the third bright possible embodiment, the method also includes:
If the blacklist term data is not more than the default blacklist term data, by the L blacklist phase
It limits data and inputs risk forecast model, to obtain risk profile value;
The risk profile value and default risk profile value are compared, with the determination risk profile value whether be more than
The default risk profile value;
If the risk profile value is more than the default risk profile value, it is determined that institute corresponding with the risk profile value
State first group of blacklist verification result in N group blacklist verification result;
Alert messages are sent to the first server, wherein the alert messages carry the risk profile value and institute
First group of blacklist verification result is stated, the alert messages are used to indicate the first server will based on the risk profile value
Job hunter corresponding with first group of blacklist verification result is labeled as insincere job hunter.
Optionally, based on the first or second or the third possible embodiment party of first aspect or first aspect
Formula, in the 4th kind of possible embodiment of the invention, the public key request also carries member's letter of the first server
Breath, the method also includes:
If the risk profile value is less than the default risk profile value, it is determined that the member etc. in the membership information
Grade;
The membership grade and default membership grade are compared, default member etc. is higher than with the determination membership grade
Grade;
The risk profile value is inputted into risk profile Rating Model, obtains risk profile scoring;
Second group of blacklist verifying in the determining corresponding N group blacklist verification result that scores with the risk profile
As a result;
It is sent to the first server and carries the risk profile scoring and second group of blacklist verification result
Risk profile scoring message, wherein the risk profile scoring message is used to indicate the first server and is based on the risk
Corresponding with second group of blacklist verification result job hunter is assessed in prediction scoring, it is determined whether admission is described and described second
The corresponding job hunter of group blacklist verification result.
Referring to Fig. 3, a kind of blacklist cloud shared authentication based on homomorphic cryptography that one embodiment of the present of invention provides is filled
Setting 300 may include:
First receiving module 301, for receiving the blacklist checking request of first server transmission.
Wherein, the blacklist checking request carries the encryption user information of blacklist verifying mark and job hunter.
Wherein, cloud authentication center for example may include server.
Searching module 302 is black with matched first encryption of blacklist verifying mark for searching from blacklist library
List.
Module 303 is obtained, for obtaining the public key with the first encryption blacklist associated storage.
Encrypting module 304, for using the public key to the encryption user information and it is described first encrypt blacklist into
Row homomorphic cryptography obtains homomorphic cryptography result.
Optionally, homomorphic cryptography can be for example additive homomorphism, multiplicative homomorphic, mixing multiplicative homomorphic, subtraction homomorphism, division
Homomorphism, algebra homomorphism, any one in arithmetic homomorphism.
Wherein, homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.Add to by homomorphism
Close data are handled to obtain an output, this output is decrypted, and result handles unencryption with Same Way
The obtained output deadline information of initial data be the same.
First sending module 305, for sending blacklist matching request to second server.
Wherein, the blacklist matching request carries the homomorphic cryptography as a result, the blacklist matching request is for referring to
Show that the second server carries out homomorphic decryption to the homomorphic cryptography result using private key and obtains blacklist verification result.
Second receiving module 306, the blacklist matching response sent for receiving the second server.
Wherein, the blacklist matching response carries the blacklist verification result.
Second sending module 307, for sending blacklist auth response to the first server.
Wherein, the blacklist auth response carries the blacklist verification result, and the blacklist auth response is used for
It indicates that the first server carries out risk assessment to the blacklist verification result, obtains risk assessment value, based on described
Risk assessment value determines whether to employ the job hunter.
The electronic equipment for the blacklist cloud shared authentication based on homomorphic cryptography that the embodiment of the invention provides a kind of, including place
Manage device, memory, communication interface and one or more programs, wherein one or more of programs are stored in described deposit
In reservoir, and it is configured to be executed by the processor, includes that blacklist cloud of any one based on homomorphic cryptography is shared to execute
The instruction of step in the method for verifying.
The embodiment of the invention provides a kind of computer storage medium, the computer readable storage medium is based on storing
Calculation machine program, the storage computer program are executed by the processor, to realize including any one based on the black of homomorphic cryptography
The method of list cloud shared authentication.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art answer it is described know, the present invention is not limited by the sequence of acts described, because
For according to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also Ying Suoshu
Know, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily this hair
Necessary to bright.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that arriving, disclosed device can be by others side
Formula is realized.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, only one
Kind of logical function partition, there may be another division manner in actual implementation, for example, multiple module or components can combine or
It is desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed it is mutual it
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or module
It connects, can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module
It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be with the shape of software product in other words
Formula embodies, and the computer software product is stored in a storage medium, including some instructions are used so that a meter
It calculates machine equipment (can be personal computer, server or network equipment etc.) and executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), deposits at random
Access to memory (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. are various to can store program generation
The medium of code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. the method for the blacklist cloud shared authentication based on homomorphic cryptography characterized by comprising
Receive the blacklist checking request that first server is sent, wherein the blacklist checking request carries blacklist verifying
The encryption user information of mark and job hunter;
It is searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;
Obtain the public key with the first encryption blacklist associated storage;
Homomorphic cryptography is carried out to the encryption user information and the first encryption blacklist using the public key, homomorphism is obtained and adds
Close result;
Blacklist matching request is sent to second server, wherein the blacklist matching request carries the homomorphic cryptography knot
Fruit, the blacklist matching request are used to indicate the second server and carry out homomorphism to the homomorphic cryptography result using private key
Decryption obtains blacklist verification result;
Receive the blacklist matching response that the second server is sent, wherein the blacklist matching response carries described black
List verification result;
Blacklist auth response is sent to the first server, wherein the blacklist auth response carries the blacklist
Verification result, the blacklist auth response are used to indicate the first server and carry out risk to the blacklist verification result
Assessment, obtains risk assessment value, to determine whether to employ the job hunter based on the risk assessment value.
2. the method according to claim 1, wherein the blacklist verifying sent in the reception first server
Before request, the method also includes:
Receive the public key request that the first server is sent, wherein the public key request carries public key mark, the public key mark
Know to be generated by the first server based on blacklist verifying mark and obtain;
It is searched from the blacklist library and identifies the matched public key with the public key;
Public key response is sent to the first server, wherein the public key response carries the public key, and the public key response is used
User information to be encrypted is encrypted using the public key in the instruction first server, obtains the encryption user letter
Breath.
3. the method according to claim 1, wherein described search from blacklist library is verified with the blacklist
Before identifying matched first encryption blacklist, the method also includes:
Receive the addition cloud authentication center request that the second server is sent, wherein the addition cloud authentication center request is taken
Authentication information with the second server and authentication public key;
It determines that the Internet protocol address in the authentication information meets and presets legal Internet protocol address;
Authentication is carried out to the signing messages in the authentication information using the authentication public key;
When authentication passes through, Xiang Suoshu second server sends blacklist request, wherein the blacklist request is for referring to
Show that the second server encrypts the first blacklist to be encrypted using the public key, obtains the black name of first encryption
It is single;
Receive the blacklist response that the second server is sent, wherein it is black that the blacklist response carries first encryption
List and the public key;
By the public key and the first encryption blacklist associated storage in the blacklist library.
4. according to the method described in claim 3, it is characterized in that, the blacklist response also carry encryption blacklist mark and
J blacklist term data in first blacklist to be encrypted, J is positive integer, and the encryption blacklist mark is used for table
Show that the J blacklist term data belongs to the first encryption blacklist, every in the J blacklist term data is black
List term data is incited somebody to action for indicating that personal flame is recorded in the time limit of the described first blacklist to be encrypted described
The public key and described first encrypts blacklist associated storage after the blacklist library, the method also includes:
At interval of preset period of time obtain the public key and it is described first encryption blacklist associated storage the blacklist library when
Between, obtain N number of storing time intervals, wherein N is positive integer;
N number of storing time intervals are inputted into predetermined encryption blacklist storage period function according to the sequencing of time, are obtained N number of
Export term data;
By it is described it is N number of output term data according to the time sequencing successively with it is every in the J blacklist term data
Blacklist term data compares, and determines to exist in N number of output term data and is greater than H blacklist term data
First output term data, wherein the H blacklist term data belongs to the J blacklist term data, 0 < H≤J
And H is integer;
It calls blacklist to exceed the time limit to identify generating algorithm and generate H blacklist the H blacklist term data to exceed the time limit to identify,
In, the H blacklist every blacklist in mark that exceeds the time limit exceeds the time limit mark for indicating that the personal flame has failed;
Blacklist is sent to the second server and updates request, wherein the blacklist updates request and carries the H black name
Singly exceed the time limit to identify, the blacklist update request be used to indicate the second server will in the described first blacklist to be encrypted and
The H blacklist exceeds the time limit to identify matched H item individual's flame deletion, the second blacklist to be encrypted is obtained, using described
Public key encrypts the described second blacklist to be encrypted, obtains the second encryption blacklist;
It receives the second server and sends blacklist update response, wherein the blacklist updates response and carries described second
Encrypt blacklist;
The first encryption blacklist with the public key associated storage is substituted for the second encryption blacklist.
5. the method according to claim 1, which is characterized in that the method also includes:
Receive the blacklist checking request that the first server is sent, wherein the blacklist checking request carries M
M encryption user information of blacklist verifying mark and M job hunter;
It is searched from the blacklist library and identifies matched M encryption blacklist with M blacklist verifying, wherein the M
A blacklist verifying mark is corresponded with the M encryption blacklist;
Obtain the M public key with described M encryption blacklist associated storage;
Homomorphic cryptography is carried out to the M encryption user information and the M encryption blacklist using the M public key, obtains M
A homomorphic cryptography result, wherein i-th of homomorphic cryptography result in the M homomorphic cryptography result is by the M public key
I-th of public key encrypts to obtain to i-th of encryption user information and i-th of encryption blacklist, i-th of encryption user letter
Breath belongs to the M encryption user information, and i-th of encryption blacklist belongs to the M encryption blacklist, 0 < i≤M and i
For integer;
M blacklist matching request is sent to M second server, wherein the M second server and the M black names
Single matching request corresponds, and the M blacklist matching request carries the M homomorphic cryptography as a result, the M blacklist
I-th of blacklist matching request in matching request is used to indicate i-th of second server using i-th of private key to described i-th
A homomorphic cryptography result carries out homomorphic decryption and obtains i-th group of blacklist verification result in M group blacklist verification result, and described the
I second server belongs to the M second server, includes K blacklist verifying in i-th group of blacklist verification result
As a result, K is positive integer;
The M blacklist matching that the M second server is sent is received to respond, wherein the M second server with it is described
M blacklist matching response corresponds, and the M blacklist matching response carries the M group blacklist verification result;
Every group of blacklist verification result in the M group blacklist verification result is screened according to default not recurring rule,
To obtain N group blacklist verification result, wherein every group of blacklist verification result in the N group blacklist verification result includes L
Blacklist verification result, N are positive integer, and N=M, L≤K and L are positive integer;
It calls file generated interface to generate the blacklist comprising the N group blacklist verification result and verifies report;
The blacklist auth response is sent to the first server, wherein the blacklist auth response carries described black
List verifying report, the blacklist auth response are used to indicate the first server and extract in the blacklist verifying report
The N group blacklist verification result, to the N group blacklist verification result carry out risk assessment, obtain N number of risk assessment
Value, to determine whether to employ the M job hunter based on N number of risk assessment value.
6. according to the method described in claim 5, it is characterized in that, generating in the calling file generated interface includes the N
Before the blacklist verifying report of group blacklist verification result, the method also includes:
S1: the integer that initial value is 1 is set by n;
S2: whether detection n is less than or equal to N, if so, S3 is executed, if it is not, then executing S9;
S3: the L blacklist verification result in n-th group blacklist verification result is obtained, wherein the n-th group blacklist
Verification result belongs to the N group blacklist verification result;
S4: L blacklist term data in the L blacklist verification result is extracted;
S5: L risk class corresponding with the L blacklist term data is determined, wherein blacklist term data and risk
Grade is directly proportional;
S6: by the L blacklist term data corresponding with the L risk class according to risk class from high to low suitable
Sequence is arranged, L blacklist verification result after being arranged;
S7: L blacklist verification result after the arrangement is added to the n-th group blacklist verification result;
S8: (n+1) is assigned to n, returns and executes S2;
S9: terminate arrangement.
7. according to the method described in claim 6, it is characterized in that, the determination is corresponding with the L blacklist term data
L risk class, comprising:
Blacklist time limit maximum blacklist term data is filtered out from the L blacklist term data;
The blacklist term data and default blacklist term data are compared, with the determination blacklist term data
Whether the default blacklist term data is greater than;
If the blacklist term data is greater than the default blacklist term data, from risk class valuation functions library really
Fixed risk class valuation functions corresponding with the blacklist term data;
The L blacklist term data is inputted into the risk class valuation functions respectively, to obtain L risk class assessment
Data;
The maximum risk class of risk class assessment data is extracted from L risk class assessment data assesses data;
Determining default risk class assessment weight corresponding with risk class assessment data;
L risk class assessment data are calculated according to default risk class assessment weight, obtain L risk etc.
Grade.
8. a kind of blacklist cloud shared authentication device based on homomorphic cryptography characterized by comprising
First receiving module, for receiving the blacklist checking request of first server transmission, wherein the blacklist verifying is asked
Seek the encryption user information for carrying blacklist verifying mark and job hunter;
Searching module, for being searched from blacklist library and the matched first encryption blacklist of blacklist verifying mark;
Module is obtained, for obtaining the public key with the first encryption blacklist associated storage;
Encrypting module, for the encryption user information and the first encryption blacklist to be carried out homomorphism and added using the public key
It is close, obtain homomorphic cryptography result;
First sending module, for sending blacklist matching request to second server, wherein the blacklist matching request is taken
With the homomorphic cryptography as a result, the blacklist matching request is used to indicate the second server using private key to the homomorphism
Encrypted result carries out homomorphic decryption and obtains blacklist verification result;
Second receiving module, the blacklist matching response sent for receiving the second server, wherein the blacklist
The blacklist verification result is carried with response;
Second sending module, for sending blacklist auth response to the first server, wherein the blacklist verifying is rung
The blacklist verification result should be carried, the blacklist auth response is used to indicate the first server to the blacklist
Verification result carries out risk assessment, obtains risk assessment value, to determine whether to employ the job hunting based on the risk assessment value
Person.
9. a kind of electronic equipment of the blacklist cloud shared authentication based on homomorphic cryptography, which is characterized in that including processor, storage
Device, communication interface and one or more programs, wherein one or more of programs are stored in the memory, and
And be generated and executed by the processor, the instruction of the step in any one of 1-7 method is required with perform claim.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer
Program, the storage computer program are executed by the processor, to realize the described in any item methods of claim 1-7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910421986.2A CN110232283A (en) | 2019-05-21 | 2019-05-21 | The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography |
PCT/CN2019/120154 WO2020233038A1 (en) | 2019-05-21 | 2019-11-22 | Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910421986.2A CN110232283A (en) | 2019-05-21 | 2019-05-21 | The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110232283A true CN110232283A (en) | 2019-09-13 |
Family
ID=67861458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910421986.2A Pending CN110232283A (en) | 2019-05-21 | 2019-05-21 | The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110232283A (en) |
WO (1) | WO2020233038A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111461728A (en) * | 2020-03-31 | 2020-07-28 | 支付宝(杭州)信息技术有限公司 | Risk identification method, device and system |
WO2020233038A1 (en) * | 2019-05-21 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus |
CN114584283A (en) * | 2022-03-21 | 2022-06-03 | 深圳壹账通智能科技有限公司 | Privacy protection method, device, equipment and storage medium for blacklist matching |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8468595B1 (en) * | 2006-03-22 | 2013-06-18 | Trend Micro Incorporated | Content filtering prior to data encryption |
CN107231434A (en) * | 2017-07-10 | 2017-10-03 | 北京小米移动软件有限公司 | The control method and device of terminal device |
WO2018090183A1 (en) * | 2016-11-15 | 2018-05-24 | 深圳达闼科技控股有限公司 | Identity authentication method, terminal device, authentication server and electronic device |
CN108494738A (en) * | 2018-02-27 | 2018-09-04 | 华南理工大学 | A kind of rear Quantum Electronics ballot system that can verify that and its implementation |
WO2019024485A1 (en) * | 2017-07-31 | 2019-02-07 | 平安科技(深圳)有限公司 | Data sharing method and device and computer readable storage medium |
CN109669986A (en) * | 2018-12-12 | 2019-04-23 | 深圳乐信软件技术有限公司 | Blacklist sharing method, device, equipment and storage medium based on block chain |
CN109711973A (en) * | 2018-11-09 | 2019-05-03 | 深圳壹账通智能科技有限公司 | Methods of risk assessment and device, storage medium, computer equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281377B (en) * | 2013-05-31 | 2016-06-08 | 北京创世泰克科技股份有限公司 | A kind of encrypt data storage and querying method of facing cloud |
CN106302312B (en) * | 2015-05-13 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Obtain the method and device of electronic document |
CN110232283A (en) * | 2019-05-21 | 2019-09-13 | 深圳壹账通智能科技有限公司 | The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography |
-
2019
- 2019-05-21 CN CN201910421986.2A patent/CN110232283A/en active Pending
- 2019-11-22 WO PCT/CN2019/120154 patent/WO2020233038A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8468595B1 (en) * | 2006-03-22 | 2013-06-18 | Trend Micro Incorporated | Content filtering prior to data encryption |
WO2018090183A1 (en) * | 2016-11-15 | 2018-05-24 | 深圳达闼科技控股有限公司 | Identity authentication method, terminal device, authentication server and electronic device |
CN107231434A (en) * | 2017-07-10 | 2017-10-03 | 北京小米移动软件有限公司 | The control method and device of terminal device |
WO2019024485A1 (en) * | 2017-07-31 | 2019-02-07 | 平安科技(深圳)有限公司 | Data sharing method and device and computer readable storage medium |
CN108494738A (en) * | 2018-02-27 | 2018-09-04 | 华南理工大学 | A kind of rear Quantum Electronics ballot system that can verify that and its implementation |
CN109711973A (en) * | 2018-11-09 | 2019-05-03 | 深圳壹账通智能科技有限公司 | Methods of risk assessment and device, storage medium, computer equipment |
CN109669986A (en) * | 2018-12-12 | 2019-04-23 | 深圳乐信软件技术有限公司 | Blacklist sharing method, device, equipment and storage medium based on block chain |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233038A1 (en) * | 2019-05-21 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus |
CN111461728A (en) * | 2020-03-31 | 2020-07-28 | 支付宝(杭州)信息技术有限公司 | Risk identification method, device and system |
CN111461728B (en) * | 2020-03-31 | 2023-03-10 | 支付宝(杭州)信息技术有限公司 | Risk identification method, device and system |
CN114584283A (en) * | 2022-03-21 | 2022-06-03 | 深圳壹账通智能科技有限公司 | Privacy protection method, device, equipment and storage medium for blacklist matching |
Also Published As
Publication number | Publication date |
---|---|
WO2020233038A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10917246B2 (en) | System and method for blockchain-based cross-entity authentication | |
Leng et al. | Blockchain security: A survey of techniques and research directions | |
CN108595126B (en) | Data storage system, query method, query device, server, and storage medium | |
US20200242221A1 (en) | System and method for mapping decentralized identifiers to real-world entities | |
CN111914027B (en) | Block chain transaction keyword searchable encryption method and system | |
CN106254374B (en) | A kind of cloud data public audit method having duplicate removal function | |
Zhu et al. | Dynamic audit services for outsourced storages in clouds | |
CN111259070A (en) | Method and related device for storing and acquiring service data | |
EP3814948A1 (en) | System and method for blockchain-based cross-entity authentication | |
CN108235805A (en) | Account unifying method and device and storage medium | |
CN109067801A (en) | A kind of identity identifying method, identification authentication system and computer-readable medium | |
CN109246137A (en) | The safety protecting method and device of naval warfare data based on block chain | |
Lin et al. | Consortium blockchain-based public integrity verification in cloud storage for IoT | |
CN110490610A (en) | A kind of community management system based on block chain | |
CN111191283A (en) | Beidou positioning information security encryption method and device based on alliance block chain | |
CN110493237A (en) | Identity management method, device, computer equipment and storage medium | |
CN110232283A (en) | The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography | |
CN108960832A (en) | The method for secret protection and system of block chain real name communication | |
CN109102404A (en) | The method for secret protection and system of block chain real name communication | |
CN109104419A (en) | A kind of generation method and system of block chain account | |
Zhang et al. | Privacy-preserving reputation management for blockchain-based mobile crowdsensing | |
CN110012024A (en) | A kind of data sharing method, system, equipment and computer readable storage medium | |
Zhou et al. | A Scalable Blockchain‐Based Integrity Verification Scheme | |
CN109450636A (en) | The integrity verification method of group data in a kind of cloud storage | |
Rani et al. | A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20240112 |
|
AD01 | Patent right deemed abandoned |