CN112866254A - Method, terminal and system for obtaining common clients - Google Patents

Method, terminal and system for obtaining common clients Download PDF

Info

Publication number
CN112866254A
CN112866254A CN202110081355.8A CN202110081355A CN112866254A CN 112866254 A CN112866254 A CN 112866254A CN 202110081355 A CN202110081355 A CN 202110081355A CN 112866254 A CN112866254 A CN 112866254A
Authority
CN
China
Prior art keywords
ciphertext
terminal
client
common
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110081355.8A
Other languages
Chinese (zh)
Inventor
蓝振杰
漆英
罗剑平
戴丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110081355.8A priority Critical patent/CN112866254A/en
Publication of CN112866254A publication Critical patent/CN112866254A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a method, a terminal and a system for obtaining common clients, which can be particularly used in the technical field of data security.

Description

Method, terminal and system for obtaining common clients
Technical Field
The application relates to the technical field of computers, in particular to a method, a terminal and a system for acquiring a common client.
Background
With the rapid development of the internet, the cooperation between the bank organization and the e-commerce platform is continuously strengthened, and the complementation is insufficient. There is such a scenario: the bank A cooperates with a certain E-commerce platform B, and the bank A provides special loans for customers of the E-commerce platform B, such as special consumption loans for agricultural products in poor regions. Bank a directs the group of customers marketing the loan product to meet a condition that the customer is both a customer and must be B. Due to the reasons of business privacy, client privacy and the like, A cannot directly take a client list from B and only can take some encrypted data. How to find the common client of both parties is a problem to be solved urgently under the condition that A can only take the encrypted information provided by B.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a method, a terminal and a system for obtaining a common client, wherein firstly, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to a second terminal; then, a second ciphertext is obtained, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key; then, the second ciphertext is encrypted by using a first private key through the preset encryption function to obtain a third ciphertext, and the third ciphertext is transmitted to the second terminal; then, a fourth ciphertext is obtained, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal; and finally, searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information. The method for obtaining the common client can effectively prevent the leakage of the client information, protect the privacy of the client information of each terminal, simultaneously can obtain the common client information required by each terminal, and provides favorable conditions for cooperative win-win.
In one aspect of the present invention, a method for acquiring a common client is provided, where the method is performed by a first terminal and includes:
encrypting the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and transmitting the first ciphertext to the second terminal;
acquiring a second ciphertext, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key;
encrypting the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and transmitting the third ciphertext to the second terminal;
acquiring a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through a second terminal;
and searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information.
In a preferred embodiment, further comprising: and modifying the first customer information sequence through a hash algorithm to obtain a first modified customer information sequence.
In a preferred embodiment, the preset encryption function complies with the exchange law, including:
fe(x)=xemod p
where x is the data to be encrypted, e is the private key (not public), and p is a sufficiently large prime number.
In a preferred embodiment, the determining the common client according to the common ciphertext information includes:
determining the position serial number of the common ciphertext information in the fourth ciphertext;
indexing the client corresponding to the position sequence number in the first client information sequence to determine that the client is the common client;
in a preferred embodiment, the encryption process for the client information sequence or ciphertext keeps the sequence number unchanged.
In another aspect of the present invention, a method for acquiring a common client is provided, including:
the first terminal encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and the second terminal encrypts the second client information sequence by using a second private key through the preset encryption function to obtain a second ciphertext;
the first terminal transmits the first ciphertext to the second terminal, and the second terminal transmits the second ciphertext to the first terminal;
the first terminal acquires the second ciphertext and encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and the second terminal acquires the first ciphertext and encrypts the first ciphertext by using the second private key through the preset encryption function to obtain a fourth ciphertext;
the first terminal transmits the third ciphertext to the second terminal, and the second terminal transmits the fourth ciphertext to the first terminal;
and the first terminal and the second terminal respectively search the common ciphertext information in the third ciphertext and the fourth ciphertext, and determine the common client according to the common ciphertext information.
In still another aspect of the present invention, there is provided a first terminal for common client acquisition, including:
the encryption transmission module encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to the second terminal;
the ciphertext obtaining module is used for obtaining a second ciphertext, and the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key;
the encryption transmission module encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext and transmits the third ciphertext to the second terminal;
the ciphertext obtaining module is used for obtaining a fourth ciphertext, and the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal;
and the common client determining module is used for searching common ciphertext information in the third ciphertext and the fourth ciphertext and determining the common client according to the common ciphertext information.
In a preferred embodiment, further comprising: and modifying the first customer information sequence through a hash algorithm to obtain a first modified customer information sequence.
In a preferred embodiment, the preset encryption function complies with the exchange law, including:
fe(x)=xemod p
where x is the data to be encrypted, e is the private key (not public), and p is a sufficiently large prime number.
In a preferred embodiment, the determining the common client according to the common ciphertext information includes:
the position sequence number determining unit is used for determining the position sequence number of the common ciphertext information in the fourth ciphertext;
a common client determining unit, which indexes the client corresponding to the position sequence number in the first client information sequence to determine as the common client;
in a preferred embodiment, the encryption process for the client information sequence or ciphertext keeps the sequence number unchanged.
In still another aspect of the present invention, an apparatus for acquiring a common client includes:
the first terminal encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and the second terminal encrypts the second client information sequence by using a second private key through the preset encryption function to obtain a second ciphertext;
the first terminal transmits the first ciphertext to the second terminal, and the second terminal transmits the second ciphertext to the first terminal;
the first terminal acquires the second ciphertext and encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and the second terminal acquires the first ciphertext and encrypts the first ciphertext by using the second private key through the preset encryption function to obtain a fourth ciphertext;
the first terminal transmits the third ciphertext to the second terminal, and the second terminal transmits the fourth ciphertext to the first terminal;
and the first terminal and the second terminal respectively search the common ciphertext information in the third ciphertext and the fourth ciphertext, and determine the common client according to the common ciphertext information.
In yet another aspect of the present invention, the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the common client obtaining method when executing the program.
In still another aspect of the present invention, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the common client acquisition method.
According to the technical scheme, the method for acquiring the common client comprises the following steps: firstly, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to a second terminal; then, a second ciphertext is obtained, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key; then, the second ciphertext is encrypted by using a first private key through the preset encryption function to obtain a third ciphertext, and the third ciphertext is transmitted to the second terminal; then, a fourth ciphertext is obtained, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal; and finally, searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information. The method for obtaining the common client can effectively prevent the leakage of the client information, protect the privacy of the client information of each terminal, simultaneously can obtain the common client information required by each terminal, and provides favorable conditions for cooperative win-win.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a common client acquisition method (first terminal execution).
Fig. 2 is a flow diagram of indexing a common client based on common client information.
Fig. 3 is a flow chart of a common client acquisition method.
Fig. 4 is a diagram of raw customer information data for the A, B organization.
Fig. 5 is a schematic diagram of client information encryption.
Fig. 6 is a schematic diagram of ciphertext data exchange.
Fig. 7 is a schematic diagram of information secondary encryption.
Fig. 8 is a schematic diagram of a twice encrypted data exchange.
Fig. 9 is a schematic diagram of obtaining the same ciphertext data.
Fig. 10 is a schematic diagram of finding common customers by serial number.
Fig. 11 is a configuration diagram of a common client acquisition apparatus.
Fig. 12 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the method, the terminal, and the system for acquiring a common client disclosed in the present application may be used in the technical field of data security, and may also be used in any field other than the technical field of data security.
With the rapid development of the internet, the cooperation between the bank organization and the e-commerce platform is continuously strengthened, and the complementation is insufficient. There is such a scenario: the bank A cooperates with a certain E-commerce platform B, and the bank A provides special loans for customers of the E-commerce platform B, such as special consumption loans for agricultural products in poor regions. Bank a directs the group of customers marketing the loan product to meet a condition that the customer is both a customer and must be B. Due to the reasons of business privacy, client privacy and the like, A cannot directly take a client list from B and only can take some encrypted data. How to find the common client of both parties is a problem to be solved urgently under the condition that A can only take the encrypted information provided by B.
Aiming at the problems in the prior art, the application provides a method, a terminal and a system for obtaining a common client, wherein firstly, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to a second terminal; then, a second ciphertext is obtained, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key; then, the second ciphertext is encrypted by using a first private key through the preset encryption function to obtain a third ciphertext, and the third ciphertext is transmitted to the second terminal; then, a fourth ciphertext is obtained, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal; and finally, searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information. The method for obtaining the common client can effectively prevent the leakage of the client information, protect the privacy of the client information of each terminal, simultaneously can obtain the common client information required by each terminal, and provides favorable conditions for cooperative win-win.
In the embodiment of the present invention, the common client refers to a common client owned by different terminals, where the terminals may be servers storing client information, or may be smart devices storing client information, such as a portable computer, a smart phone, and the like. Acquiring a common client refers to acquiring a common user of both terminals, so there is a first terminal and a second terminal.
The following describes a method, a terminal and a system for acquiring a common client according to the present invention in detail with reference to the accompanying drawings.
In an embodiment of the present invention, there is provided a method for acquiring a common client, where the method is performed by a first terminal, and includes the following steps:
and S1, encrypting the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and transmitting the first ciphertext to the second terminal.
Specifically, the client information is encrypted to ensure the privacy of the client, a plurality of encryption algorithms are adopted at present, such as MD5, AES, RSA and other algorithms, the encryption method adopted by the invention is a debit private key exchange method for encrypting the client information, and the preset encryption function is in a form of
fe(x)=xemod p
Where x is the data to be encrypted, e is the private key (not public), and p is a sufficiently large prime number. The private key used by each terminal corresponds to the exponent e in the cryptographic function, e.g., the private key of the first terminal is e1, the private key of the second terminal is e2, and e1 and e2 are generated autonomously by each terminal, which are not public, and may be equal values or unequal values.
In the practice of the invention, the use of an encryption function is
fe(x)=xemod p
Where x is the data to be encrypted, e is the private key (not public), and p is a sufficiently large prime number. Since the cryptographic functions have commutative laws, i.e.
Figure BDA0002909246440000071
In a specific encryption process, if a certain piece of client information of the first terminal is the same as a certain piece of client information of the second terminal, the encryption function has an exchangeable characteristic, which means that a ciphertext obtained by encrypting the client information of the first terminal by itself and encrypting the client information of the second terminal by itself is the same as a ciphertext obtained by encrypting the client information of the second terminal by itself and encrypting the client information of the first terminal by itself.
On the other hand, in the embodiment of the present invention, the client information usually includes many text information or longer numerical information, which increases the workload of calculation for calculation, and in order to overcome this weakness, before encrypting the client information, the client information may be modified by a hash algorithm, and the client information may be modified into a hash value, which is more convenient for subsequent processing. As a specific example, it is assumed that the sequence of the client information stored in the first terminal is (x1, x2, x3, x4, x5), where xi corresponds to the identification number of the client, the length of the identification number is 18 bits, and the modification result obtained by performing hash modification on the identification number may only be 4 bits, thereby reducing the subsequent calculation amount. Assuming that the modified sequence of the client information obtained by hash modification is (y1, y2, y3, y4, y5), the sequence is encrypted by the encryption function to obtain the first ciphertext (W1(y1), W1(y2), W1(y3), W1(y4), W1(y 5)).
After the first ciphertext is obtained, the first terminal needs to transmit the first ciphertext to the second terminal, and the communication mode between the two terminals can adopt wired transmission, such as through an optical fiber, and also can adopt wireless transmission, such as wifi.
In the implementation of the present invention, the encryption process is to encrypt each piece of client information in the client information list to obtain a ciphertext. In order to avoid the problem of sequence number confusion in the encryption process, before encryption, each piece of client information in the client information list needs to be assigned with a sequence number, and the sequence number is kept unchanged in the encryption process.
And S2, acquiring a second ciphertext, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key.
Specifically, the second ciphertext is transmitted to the first terminal by the second terminal, and the transmission mode may be wired transmission or wireless transmission. The encryption function adopted by the second terminal is consistent with the format of the first terminal, the p of the second terminal is the same as the p of the first terminal, but the used encryption private key is autonomously generated and is not public for the first terminal, and the value of the encryption private key can be equal to or different from that of the first private key.
And S3, encrypting the second ciphertext by using the first private key through the preset encryption function to obtain a third ciphertext, and transmitting the third ciphertext to the second terminal.
Specifically, after receiving a second ciphertext transmitted by a second terminal, the first terminal needs to encrypt the second ciphertext by using a first private key. The specific encryption process may be understood as keeping the serial number of each piece of information in the second ciphertext unchanged, and performing encryption processing on each piece of ciphertext information one by using an encryption function to obtain secondary encrypted ciphertext information corresponding to each piece of ciphertext information, so as to form the third ciphertext, where the third ciphertext is a result of performing secondary encryption on the second client information list of the second terminal.
And S4, acquiring a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal.
Specifically, the first terminal acquires the third ciphertext, that is, the secondary encryption result of the second client information list, and also needs to acquire the fourth ciphertext, that is, the secondary encryption result of the first client information list.
The fourth ciphertext is obtained by encrypting the first ciphertext by using the second private key by the second terminal, and is a secondary encryption result of the first client information list.
And S5, searching the common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information.
Specifically, after the third ciphertext and the fourth ciphertext are possessed, because the selected encryption function is exchangeable, if a certain client in the first client information list also exists in the second client information list, the ciphertext obtained by encrypting the client information through the first private key and the ciphertext obtained by encrypting the client information through the second private key is the same as the ciphertext obtained by encrypting the client information through the second private key and the first private key, so that the common ciphertext information of the third ciphertext and the fourth ciphertext is searched, and the common client can be obtained. For searching the common ciphertext information of the third ciphertext user and the fourth ciphertext user, the following strategies are adopted: and comparing the first ciphertext information in the fourth ciphertext with all the ciphertext information in the third ciphertext one by one, if the ciphertext information in the third ciphertext is consistent, recording the serial number of the ciphertext information in the fourth ciphertext until the last ciphertext information in the fourth ciphertext is compared with all the ciphertext information in the third ciphertext. Through the search strategy, the common ciphertext information of the third ciphertext and the fourth ciphertext can be searched, wherein the ciphertext information comprises ciphertext contents and ciphertext serial numbers. After obtaining the common ciphertext information, the first terminal may locate the common client according to the common ciphertext information, as shown in fig. 2, and the steps are as follows:
s51, determining the position serial number of the common ciphertext information in the fourth ciphertext;
specifically, in the process of searching the common ciphertext information, the position serial number of the common ciphertext information in the fourth ciphertext is recorded, so that the next step can be performed only by extracting the serial number information in the common ciphertext information.
S52, indexing the client corresponding to the position sequence number in the first client information sequence to determine the client as the common client;
specifically, the client corresponding to the position number of the common ciphertext, i.e. the common client, is retrieved from the first client information sequence, so that the client can be indexed in the first client information sequence according to the position number of the common ciphertext, because the sequence number is maintained in the encryption process no matter at the first terminal or at the second terminal, a sufficient condition is provided for indexing the common client according to the common ciphertext information.
In the embodiment of the present invention, a method for acquiring a common client is described from the perspective of a system, where the system includes a first terminal and a second terminal, as shown in fig. 3, and the specific method includes:
s101, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and a second terminal encrypts a second client information sequence by using a second private key through the preset encryption function to obtain a second ciphertext;
s102, the first terminal transmits the first ciphertext to the second terminal, and the second terminal transmits the second ciphertext to the first terminal;
s103, the first terminal acquires the second ciphertext, encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and acquires the first ciphertext, and encrypts the first ciphertext by using the second private key through the preset encryption function to obtain a fourth ciphertext;
s104, the first terminal transmits the third ciphertext to the second terminal, and the second terminal transmits the fourth ciphertext to the first terminal;
and S105, the first terminal and the second terminal respectively search the common ciphertext information in the third ciphertext and the fourth ciphertext, and determine the common client according to the common ciphertext information.
To describe the obtaining method of the whole common user in detail, as a specific example, the following is given:
suppose that a list of customer information (a, b, c, d, e) is stored in the information system of institution a; similarly, another list of customer information (g, B, c, f, h) is stored in the information system of organization B, as shown in fig. 1. A. The two client information of B and c are not known to be the same between the organizations B, and the common client is found according to the following steps under the condition that the two parties do not need to know the client information list owned by the other party.
S201: A. the B organization sorts the customer information and assigns a sequence number to each customer information as shown in fig. 4.
S202: a, B respectively, the organization encrypts the client information using its own private key. Where the private key used by organization a is K1 and the private key used by organization B is K2. Each client information is encrypted to obtain a corresponding ciphertext, and the original serial number is kept unchanged. As shown in fig. 5.
S203: A. the B organization exchanges the encrypted ciphertext data, and at this time, the a organization owns the client information list encrypted by the B organization, and similarly, the B organization owns the client information encrypted by the a organization, as shown in fig. 6. The encryption algorithm ensures that A, B mechanism cannot get the original client information data through the ciphertext. Note that, after data exchange, the A, B mechanism should keep the order of each record (the sequence number assigned in S201) unchanged.
S204: A. the mechanism B re-encrypts the ciphertext received in step S203 with its own private key to obtain a secondary encrypted ciphertext, as shown in fig. 7. Likewise, the encryption process keeps the order of the data unchanged.
S205: A. the B organization exchanges the secondarily encrypted customer information data again as shown in fig. 8. At this time, both A, B agencies have twice encrypted data for both agencies.
S206: finding out the same data in the two ciphertext texts to obtain the serial number of the data. As shown in fig. 9, the process of the a mechanism is taken as an example for explanation.
According to the exchange characteristics of the encryption functions of the present invention, K1 × K2 × b — K2 × K1 × b and K1 × K2 × c — K2 × K1 c in the two ciphers are shown in the box of fig. 9. At this time, the organization a knows that the two records with sequence numbers 2 and 3 in the ciphertext data are the common client information owned by the A, B organization.
S207: based on the serial number in S206, a common client group is found in the own original client information data, as shown in fig. 10.
As can be seen from the above description, in the method for acquiring a common client according to the present invention, first, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and transmits the first ciphertext to a second terminal; then, a second ciphertext is obtained, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key; then, the second ciphertext is encrypted by using a first private key through the preset encryption function to obtain a third ciphertext, and the third ciphertext is transmitted to the second terminal; then, a fourth ciphertext is obtained, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal; and finally, searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information. The method for obtaining the common client can effectively prevent the leakage of the client information, protect the privacy of the client information of each terminal, simultaneously can obtain the common client information required by each terminal, and provides favorable conditions for cooperative win-win.
From a software aspect, the present application provides an embodiment of an obtaining apparatus of a common client for executing all or part of contents in the obtaining method of the common client, and referring to fig. 11, the obtaining apparatus of the common client specifically includes the following contents:
the encryption transmission module 1 encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to a second terminal;
the ciphertext module 2 is used for acquiring a second ciphertext, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key;
the encryption transmission module 3 encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext and transmits the third ciphertext to the second terminal;
the ciphertext module 4 is used for acquiring a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext by the second terminal through the preset encryption function by using a second private key;
and the common client determining module 5 is used for searching common ciphertext information in the third ciphertext and the fourth ciphertext and determining the common client according to the common ciphertext information.
As can be seen from the above description, in the apparatus for acquiring a common client according to the present invention, first, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and transmits the first ciphertext to a second terminal; then, a second ciphertext is obtained, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key; then, the second ciphertext is encrypted by using a first private key through the preset encryption function to obtain a third ciphertext, and the third ciphertext is transmitted to the second terminal; then, a fourth ciphertext is obtained, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal; and finally, searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information. The method for obtaining the common client can effectively prevent the leakage of the client information, protect the privacy of the client information of each terminal, simultaneously can obtain the common client information required by each terminal, and provides favorable conditions for cooperative win-win.
In an embodiment of the present invention, an apparatus for acquiring a common client is provided, where the apparatus includes a first terminal, and includes the following modules:
and the encryption transmission module 1 encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to the second terminal.
Specifically, the client information is encrypted to ensure the privacy of the client, a plurality of encryption algorithms are adopted at present, such as MD5, AES, RSA and other algorithms, the encryption method adopted by the invention is a debit private key exchange method for encrypting the client information, and the preset encryption function is in a form of
fe(x)=xemod p
Where x is the data to be encrypted, e is the private key (not public), and p is a sufficiently large prime number. The private key used by each terminal corresponds to the exponent e in the cryptographic function, e.g., the private key of the first terminal is e1, the private key of the second terminal is e2, and e1 and e2 are generated autonomously by each terminal, which are not public, and may be equal values or unequal values.
In the practice of the invention, the use of an encryption function is
fe(x)=xemod p
Where x is the data to be encrypted, e is the private key (not public), and p is a sufficiently large prime number. Since the cryptographic functions have commutative laws, i.e.
Figure BDA0002909246440000121
In a specific encryption process, if a certain piece of client information of the first terminal is the same as a certain piece of client information of the second terminal, the encryption function has an exchangeable characteristic, which means that a ciphertext obtained by encrypting the client information of the first terminal by itself and encrypting the client information of the second terminal by itself is the same as a ciphertext obtained by encrypting the client information of the second terminal by itself and encrypting the client information of the first terminal by itself.
On the other hand, in the embodiment of the present invention, the client information usually includes many text information or longer numerical information, which increases the workload of calculation for calculation, and in order to overcome this weakness, before encrypting the client information, the client information may be modified by a hash algorithm, and the client information may be modified into a hash value, which is more convenient for subsequent processing. As a specific example, it is assumed that the sequence of the client information stored in the first terminal is (x1, x2, x3, x4, x5), where xi corresponds to the identification number of the client, the length of the identification number is 18 bits, and the modification result obtained by performing hash modification on the identification number may only be 4 bits, thereby reducing the subsequent calculation amount. Assuming that the modified sequence of the client information obtained by hash modification is (y1, y2, y3, y4, y5), the sequence is encrypted by the encryption function to obtain the first ciphertext (W1(y1), W1(y2), W1(y3), W1(y4), W1(y 5)).
After the first ciphertext is obtained, the first terminal needs to transmit the first ciphertext to the second terminal, and the communication mode between the two terminals can adopt wired transmission, such as through an optical fiber, and also can adopt wireless transmission, such as wifi.
In the implementation of the present invention, the encryption process is to encrypt each piece of client information in the client information list to obtain a ciphertext. In order to avoid the problem of sequence number confusion in the encryption process, before encryption, each piece of client information in the client information list needs to be assigned with a sequence number, and the sequence number is kept unchanged in the encryption process.
And the ciphertext obtaining module 2 is used for obtaining a second ciphertext, and the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key.
Specifically, the second ciphertext is transmitted to the first terminal by the second terminal, and the transmission mode may be wired transmission or wireless transmission. The encryption function adopted by the second terminal is consistent with the format of the first terminal, the p of the second terminal is the same as the p of the first terminal, but the used encryption private key is autonomously generated and is not public for the first terminal, and the value of the encryption private key can be equal to or different from that of the first private key.
And the encryption transmission module 3 encrypts the second ciphertext by using the first private key through the preset encryption function to obtain a third ciphertext and transmits the third ciphertext to the second terminal.
Specifically, after receiving a second ciphertext transmitted by a second terminal, the first terminal needs to encrypt the second ciphertext by using a first private key. The specific encryption process may be understood as keeping the serial number of each piece of information in the second ciphertext unchanged, and performing encryption processing on each piece of ciphertext information one by using an encryption function to obtain secondary encrypted ciphertext information corresponding to each piece of ciphertext information, so as to form the third ciphertext, where the third ciphertext is a result of performing secondary encryption on the second client information list of the second terminal.
And the ciphertext obtaining module 4 is used for obtaining a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function and by using a second private key by the second terminal.
Specifically, the first terminal acquires the third ciphertext, that is, the secondary encryption result of the second client information list, and also needs to acquire the fourth ciphertext, that is, the secondary encryption result of the first client information list.
The fourth ciphertext is obtained by encrypting the first ciphertext by using the second private key by the second terminal, and is a secondary encryption result of the first client information list.
And the common client determining module 5 is used for searching common ciphertext information in the third ciphertext and the fourth ciphertext and determining the common client according to the common ciphertext information.
Specifically, after the third ciphertext and the fourth ciphertext are possessed, because the selected encryption function is exchangeable, if a certain client in the first client information list also exists in the second client information list, the ciphertext obtained by encrypting the client information through the first private key and the ciphertext obtained by encrypting the client information through the second private key is the same as the ciphertext obtained by encrypting the client information through the second private key and the first private key, so that the common ciphertext information of the third ciphertext and the fourth ciphertext is searched, and the common client can be obtained. For searching the common ciphertext information of the third ciphertext user and the fourth ciphertext user, the following strategies are adopted: and comparing the first ciphertext information in the fourth ciphertext with all the ciphertext information in the third ciphertext one by one, if the ciphertext information in the third ciphertext is consistent, recording the serial number of the ciphertext information in the fourth ciphertext until the last ciphertext information in the fourth ciphertext is compared with all the ciphertext information in the third ciphertext. Through the search strategy, the common ciphertext information of the third ciphertext and the fourth ciphertext can be searched, wherein the ciphertext information comprises ciphertext contents and ciphertext serial numbers. After obtaining the common ciphertext information, the first terminal may locate the common client according to the common ciphertext information, and the common client determining module 5 performs the following steps:
s51, determining the position serial number of the common ciphertext information in the fourth ciphertext;
specifically, in the process of searching the common ciphertext information, the position serial number of the common ciphertext information in the fourth ciphertext is recorded, so that the next step can be performed only by extracting the serial number information in the common ciphertext information.
S52, indexing the client corresponding to the position sequence number in the first client information sequence to determine the client as the common client;
specifically, the client corresponding to the position number of the common ciphertext, i.e. the common client, is retrieved from the first client information sequence, so that the client can be indexed in the first client information sequence according to the position number of the common ciphertext, because the sequence number is maintained in the encryption process no matter at the first terminal or at the second terminal, a sufficient condition is provided for indexing the common client according to the common ciphertext information.
In an embodiment of the present invention, an apparatus for acquiring a common client is provided, where the apparatus includes a first terminal and a second terminal, and each terminal in the entire apparatus performs the following steps:
s101, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and a second terminal encrypts a second client information sequence by using a second private key through the preset encryption function to obtain a second ciphertext;
s102, the first terminal transmits the first ciphertext to the second terminal, and the second terminal transmits the second ciphertext to the first terminal;
s103, the first terminal acquires the second ciphertext, encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and acquires the first ciphertext, and encrypts the first ciphertext by using the second private key through the preset encryption function to obtain a fourth ciphertext;
s104, the first terminal transmits the third ciphertext to the second terminal, and the second terminal transmits the fourth ciphertext to the first terminal;
and S105, the first terminal and the second terminal respectively search the common ciphertext information in the third ciphertext and the fourth ciphertext, and determine the common client according to the common ciphertext information.
To describe the acquisition apparatus of the entire co-user in detail, as a specific example, the following is:
suppose that a list of customer information (a, b, c, d, e) is stored in the information system of institution a; similarly, another list of customer information (g, B, c, f, h) is stored in the information system of organization B, as shown in fig. 1. A. The two client information of B and c are not known to be the same between the organizations B, and the common client is found according to the following steps under the condition that the two parties do not need to know the client information list owned by the other party.
S201: A. the B organization sorts the customer information and assigns a sequence number to each customer information as shown in fig. 1.
S202: a, B respectively, the organization encrypts the client information using its own private key. Where the private key used by organization a is K1 and the private key used by organization B is K2. Each client information is encrypted to obtain a corresponding ciphertext, and the original serial number is kept unchanged. As shown in fig. 2.
S203: A. the B organization exchanges the encrypted ciphertext data, and at this time, the a organization owns the client information list encrypted by the B organization, and similarly, the B organization owns the client information encrypted by the a organization, as shown in fig. 3. The encryption algorithm ensures that A, B mechanism cannot get the original client information data through the ciphertext. Note that, after data exchange, the A, B mechanism should keep the order of each record (the sequence number assigned in S201) unchanged.
S204: A. and B, encrypting the ciphertext received in the third step again by using the private key of the mechanism B to obtain a secondary encrypted ciphertext, as shown in figure 4. Likewise, the encryption process keeps the order of the data unchanged.
S205: A. the B organization exchanges the secondarily encrypted customer information data again as shown in fig. 5. At this time, both A, B agencies have twice encrypted data for both agencies.
S206: finding out the same data in the two ciphertext texts to obtain the serial number of the data. As shown in fig. 6, the process of the a mechanism is taken as an example for explanation.
From the principle of the power function encryption algorithm, K1 × K2 × b — K2 × K1 × b and K1 × K2 × c — K2 × K1 × c in two ciphers are shown in the box of fig. 6. At this time, the organization a knows that the two records with sequence numbers 2 and 3 in the ciphertext data are the common client information owned by the A, B organization.
S207: based on the serial number in S206, a common client group is found in the own original client information data, as shown in fig. 7. At this point, the algorithm ends.
As can be seen from the above description, in the apparatus for acquiring a common client according to the present invention, first, a first terminal encrypts a first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and transmits the first ciphertext to a second terminal; then, a second ciphertext is obtained, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key; then, the second ciphertext is encrypted by using a first private key through the preset encryption function to obtain a third ciphertext, and the third ciphertext is transmitted to the second terminal; then, a fourth ciphertext is obtained, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal; and finally, searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information. The method for obtaining the common client can effectively prevent the leakage of the client information, protect the privacy of the client information of each terminal, simultaneously can obtain the common client information required by each terminal, and provides favorable conditions for cooperative win-win.
In terms of hardware, the present application provides an embodiment of an electronic device for implementing all or part of contents in an obtaining method of a common client, where the electronic device specifically includes the following contents:
fig. 12 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 12, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this fig. 12 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the acquisition functionality of the common client may be integrated into a central processor. Wherein the central processor may be configured to control:
s1, encrypting the first client information sequence by a preset encryption function and a first private key to obtain a first ciphertext, and transmitting the first ciphertext to the second terminal;
s2, acquiring a second ciphertext, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key;
s3, encrypting the second ciphertext by using the first private key through the preset encryption function to obtain a third ciphertext, and transmitting the third ciphertext to the second terminal;
s4, acquiring a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal;
and S5, searching the common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information.
As can be seen from the above description, the electronic device provided in the embodiment of the present application can effectively prevent leakage of client information, protect privacy of client information of each terminal, and simultaneously can obtain common client information required by each terminal, thereby providing a favorable condition for cooperative win-win.
In another embodiment, the obtaining device of the common client may be configured separately from the central processor 9100, for example, the obtaining device of the common client may be configured as a chip connected to the central processor 9100, and the obtaining function of the common client is realized by the control of the central processor.
As shown in fig. 12, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 12; further, the electronic device 9600 may further include components not shown in fig. 12, which can be referred to in the related art.
As shown in fig. 12, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
An embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps in the method for acquiring a common client in the foregoing embodiments, where the computer-readable storage medium stores thereon a computer program, and when the computer program is executed by a processor, the computer program implements all the steps of the method for acquiring a common client whose execution subject is a server or a client in the foregoing embodiments, for example, when the processor executes the computer program, the processor implements the following steps:
s1, encrypting the first client information sequence by a preset encryption function and a first private key to obtain a first ciphertext, and transmitting the first ciphertext to the second terminal;
s2, acquiring a second ciphertext, wherein the second ciphertext is obtained by encrypting the second client information sequence by the second terminal through the preset encryption function by using a second private key;
s3, encrypting the second ciphertext by using the first private key through the preset encryption function to obtain a third ciphertext, and transmitting the third ciphertext to the second terminal;
s4, acquiring a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal;
and S5, searching the common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information.
As can be seen from the above description, the computer-readable storage medium provided in the embodiments of the present application can effectively prevent leakage of client information, protect privacy of client information of each terminal, and simultaneously can obtain common client information required by each terminal, thereby providing a favorable condition for cooperative win-win.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (14)

1. An acquisition method of a common client, the acquisition method being performed by a first terminal, the acquisition method comprising:
encrypting the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and transmitting the first ciphertext to the second terminal;
acquiring a second ciphertext, wherein the second ciphertext is obtained by encrypting a second client information sequence by a second terminal through the preset encryption function by using a second private key;
encrypting the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and transmitting the third ciphertext to the second terminal;
acquiring a fourth ciphertext, wherein the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through a second terminal;
and searching common ciphertext information in the third ciphertext and the fourth ciphertext, and determining the common client according to the common ciphertext information.
2. The common client acquisition method according to claim 1, further comprising: and modifying the first customer information sequence through a hash algorithm to obtain a first modified customer information sequence.
3. The method for acquiring a common client according to claim 1, wherein the predetermined encryption function complies with a swap law, comprising: f. ofe(x)=xemod p。
4. The method for acquiring a common client according to claim 1, wherein the determining the common client based on the common ciphertext information comprises:
determining the position serial number of the common ciphertext information in the fourth ciphertext;
and indexing the client corresponding to the position sequence number in the first client information sequence to determine the client as the common client.
5. The common client acquisition method according to claim 1, wherein the encryption process for the client information sequence or the ciphertext keeps the sequence number unchanged.
6. A method for obtaining a common client, comprising:
the first terminal encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and the second terminal encrypts the second client information sequence by using a second private key through the preset encryption function to obtain a second ciphertext;
the first terminal transmits the first ciphertext to the second terminal, and the second terminal transmits the second ciphertext to the first terminal;
the first terminal acquires the second ciphertext and encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and the second terminal acquires the first ciphertext and encrypts the first ciphertext by using the second private key through the preset encryption function to obtain a fourth ciphertext;
the first terminal transmits the third ciphertext to the second terminal, and the second terminal transmits the fourth ciphertext to the first terminal;
and the first terminal and the second terminal respectively search the common ciphertext information in the third ciphertext and the fourth ciphertext, and determine the common client according to the common ciphertext information.
7. A first terminal for co-client acquisition, comprising:
the encryption transmission module encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext and transmits the first ciphertext to the second terminal;
the ciphertext obtaining module is used for obtaining a second ciphertext, and the second ciphertext is obtained by encrypting a second client information sequence by a second terminal through the preset encryption function by using a second private key;
the encryption transmission module encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext and transmits the third ciphertext to the second terminal;
the ciphertext obtaining module is used for obtaining a fourth ciphertext, and the fourth ciphertext is obtained by encrypting the first ciphertext through the preset encryption function by using a second private key through the second terminal;
and the common client determining module is used for searching common ciphertext information in the third ciphertext and the fourth ciphertext and determining the common client according to the common ciphertext information.
8. The first co-client acquired terminal of claim 7, further comprising: and modifying the first customer information sequence through a hash algorithm to obtain a first modified customer information sequence.
9. The first co-client acquired terminal of claim 7, wherein the predetermined cryptographic function complies with the exchange law comprising: f. ofe(x)=xemod p。
10. The first terminal acquired by the common client according to claim 7, wherein the determining the common client based on the common ciphertext information comprises:
the position sequence number determining unit is used for determining the position sequence number of the common ciphertext information in the fourth ciphertext;
and the common client determining unit is used for indexing the client corresponding to the position sequence number in the first client information sequence and determining the client as the common client.
11. The first client-acquired terminal as claimed in claim 7, wherein the encryption process for the client information sequence or the ciphertext maintains the sequence number.
12. A co-client acquisition system, comprising:
the first terminal encrypts the first client information sequence by using a first private key through a preset encryption function to obtain a first ciphertext, and the second terminal encrypts the second client information sequence by using a second private key through the preset encryption function to obtain a second ciphertext;
the first terminal transmits the first ciphertext to the second terminal, and the second terminal transmits the second ciphertext to the first terminal;
the first terminal acquires the second ciphertext and encrypts the second ciphertext by using a first private key through the preset encryption function to obtain a third ciphertext, and the second terminal acquires the first ciphertext and encrypts the first ciphertext by using the second private key through the preset encryption function to obtain a fourth ciphertext;
the first terminal transmits the third ciphertext to the second terminal, and the second terminal transmits the fourth ciphertext to the first terminal;
and the first terminal and the second terminal respectively search the common ciphertext information in the third ciphertext and the fourth ciphertext, and determine the common client according to the common ciphertext information.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of obtaining a common client according to any one of claims 1 to 6 when executing the program.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the common client acquisition method of any one of claims 1 to 6.
CN202110081355.8A 2021-01-21 2021-01-21 Method, terminal and system for obtaining common clients Pending CN112866254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110081355.8A CN112866254A (en) 2021-01-21 2021-01-21 Method, terminal and system for obtaining common clients

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110081355.8A CN112866254A (en) 2021-01-21 2021-01-21 Method, terminal and system for obtaining common clients

Publications (1)

Publication Number Publication Date
CN112866254A true CN112866254A (en) 2021-05-28

Family

ID=76008691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110081355.8A Pending CN112866254A (en) 2021-01-21 2021-01-21 Method, terminal and system for obtaining common clients

Country Status (1)

Country Link
CN (1) CN112866254A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017129644A (en) * 2016-01-19 2017-07-27 公立大学法人広島市立大学 Secret calculation information exchanging system, data processor, secret calculation information exchanging method, secret calculation information exchanging program and recording medium
CN112054891A (en) * 2020-08-09 2020-12-08 中信银行股份有限公司 Block chain-based common user determination method, electronic device and storage medium
CN112217642A (en) * 2020-09-30 2021-01-12 招商局金融科技有限公司 Data encryption sharing method and device, electronic equipment and computer storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017129644A (en) * 2016-01-19 2017-07-27 公立大学法人広島市立大学 Secret calculation information exchanging system, data processor, secret calculation information exchanging method, secret calculation information exchanging program and recording medium
CN112054891A (en) * 2020-08-09 2020-12-08 中信银行股份有限公司 Block chain-based common user determination method, electronic device and storage medium
CN112217642A (en) * 2020-09-30 2021-01-12 招商局金融科技有限公司 Data encryption sharing method and device, electronic equipment and computer storage medium

Similar Documents

Publication Publication Date Title
CN110895611B (en) Data query method, device, equipment and system based on privacy information protection
CN110892672A (en) Key authentication assertion generation to provide device anonymity
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
CN112787976B (en) Data encryption, decryption and sharing method, device, system and storage medium
CN105069365A (en) Data processing method and mobile terminal
CN113987584A (en) Method and system for hiding query
CN112150030A (en) Account management method based on multiple units and multiple identities, terminal equipment and storage medium
CN110874476B (en) Data processing system, method, storage medium, and processor
US11569979B2 (en) Cryptographic systems with variable layout cryptography
CN111404954A (en) Hierarchical sharing method and device
CN108985109B (en) Data storage method and device
CN110995775A (en) Service data processing method, device and system
CN113438083B (en) Signature adding and checking method and device based on interface automatic test
CN112866254A (en) Method, terminal and system for obtaining common clients
CN115459909A (en) Key data processing method and device
US11870887B2 (en) Managing central secret keys of a plurality of user devices associated with a single public key
CN112329047A (en) Private data encryption query method and device
CN114285632B (en) Block chain data transmission method, device and equipment and readable storage medium
WO2017215436A1 (en) Information encryption and decryption method, device and terminal
CN113127535B (en) Data processing method and device based on block chain and electronic equipment
US8607047B2 (en) Mobile system, service system, and service providing method to securely transmit private information for use in service
CN113297587B (en) Data storage method and system
CN113179161B (en) Method and device for replacing secret key, computer equipment and storage medium
CN115017927B (en) Card simulation method, electronic device, and storage medium
CN117151717A (en) Device password modification method, device, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210528