CN113378174A - Trusted computing method and device - Google Patents

Trusted computing method and device Download PDF

Info

Publication number
CN113378174A
CN113378174A CN202010163609.6A CN202010163609A CN113378174A CN 113378174 A CN113378174 A CN 113378174A CN 202010163609 A CN202010163609 A CN 202010163609A CN 113378174 A CN113378174 A CN 113378174A
Authority
CN
China
Prior art keywords
data
algorithm
provider
tee
computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010163609.6A
Other languages
Chinese (zh)
Inventor
方建
胡原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuketianxia Beijing Technology Co ltd
Original Assignee
Xuketianxia Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuketianxia Beijing Technology Co ltd filed Critical Xuketianxia Beijing Technology Co ltd
Priority to CN202010163609.6A priority Critical patent/CN113378174A/en
Publication of CN113378174A publication Critical patent/CN113378174A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The application discloses a method and a device for trusted computing, and relates to the field of cloud computing. The method comprises the following steps: the method comprises the steps that TEE is constructed in advance, and a calculation algorithm is obtained from an algorithm provider, wherein the calculation algorithm is invisible to all calculated participants; receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE; according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using the computing algorithm, and outputting a computing result to the data provider sending the request. The device includes: the device comprises an initial module, a receiving module and a calculating module. According to the method and the device, the problem that a plurality of participants need to share data and an algorithm on the premise of not exposing private data is solved, the calculation requirements are completed in a cooperative mode, and the calculation correctness and the data safety and privacy can be guaranteed.

Description

Trusted computing method and device
Technical Field
The present application relates to the field of cloud computing, and in particular, to a method and an apparatus for trusted computing.
Background
At present, when a plurality of data providers desire to share data, a method of exposing their own data to each other has to be adopted. And each data provider does not want to expose its own data to other parties, which may hinder cooperation among them. Similarly, the relationship between the algorithm provider and the data provider is also the same, and the algorithm provider does not want to disclose its latest algorithm to the data provider, nor does the data provider want to disclose data to the algorithm provider, and therefore, the two parties cannot achieve cooperation.
Disclosure of Invention
It is an object of the present application to overcome the above problems or to at least partially solve or mitigate the above problems.
According to an aspect of the present application, there is provided a method of trusted computing, comprising:
the method comprises the steps of constructing a TEE (Trusted Execution Environment) in advance, and obtaining a calculation algorithm from an algorithm provider, wherein the calculation algorithm is invisible to all participants of calculation;
receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE;
according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using the computing algorithm, and outputting a computing result to the data provider sending the request.
Optionally, obtaining the calculation algorithm from an algorithm provider comprises:
and receiving the encrypted calculation algorithm transmitted by the algorithm provider through the corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE.
Optionally, the method further comprises:
if a request for inquiring the algorithm is received from any party except the algorithm provider, the information of the algorithm is refused to be provided to the requesting party.
Optionally, the method further comprises:
and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
Optionally, the method further comprises:
and all data in the memory of the TEE are also encrypted and stored.
According to another aspect of the present application, there is provided an apparatus for trusted computing, comprising:
an initial module configured to pre-construct a trusted execution environment TEE and obtain a calculation algorithm from an algorithm provider, the calculation algorithm being invisible to all participants of the calculation;
a receiving module configured to receive encrypted data transmitted by a plurality of data providers through respective encryption channels and store in the TEE;
and the computing module is configured to acquire data of all data providers related to a certain data provider in the TEE according to a trusted computing request of the data provider, perform combined computation on all the acquired data by using the computing algorithm, and output a computing result to the data provider sending the request.
Optionally, the initial module is specifically configured to:
and receiving the encrypted calculation algorithm transmitted by the algorithm provider through the corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE.
Optionally, the computing module is further configured to:
if a request for inquiring the algorithm is received from any party except the algorithm provider, the information of the algorithm is refused to be provided to the requesting party.
Optionally, the computing module is further configured to:
and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
Optionally, the apparatus further comprises:
an encryption module configured to also encrypt all data in the memory of the TEE.
According to yet another aspect of the application, there is provided a computing device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method as described above when executing the computer program.
According to yet another aspect of the application, a computer-readable storage medium, preferably a non-volatile readable storage medium, is provided, having stored therein a computer program which, when executed by a processor, implements a method as described above.
According to yet another aspect of the application, there is provided a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method described above.
According to the technical scheme, a trusted execution environment TEE is constructed in advance, and a calculation algorithm is obtained from an algorithm provider, wherein the calculation algorithm is invisible to all participants of calculation; receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE; according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using a computing algorithm, and outputting a computing result to the data provider sending the request; therefore, the method and the device solve the requirement that a plurality of participants need to share data and algorithm and collaborate to complete calculation on the premise of not exposing private data. The participants upload respective data to the trusted computing center through the secure data channel, the computing algorithm is deployed in the trusted computing center, the trusted computing center reads the data to execute the computing algorithm, and the result is output, so that the computing accuracy and the data security and privacy can be guaranteed.
The above and other objects, advantages and features of the present application will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the present application will be described in detail hereinafter by way of illustration and not limitation with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow diagram of a method of trusted computing according to one embodiment of the present application;
FIG. 2 is a flow diagram of a method of trusted computing according to another embodiment of the present application;
FIG. 3 is an interaction diagram of trusted computing according to another embodiment of the present application;
FIG. 4 is a block diagram of an apparatus for trusted computing according to another embodiment of the present application;
FIG. 5 is a block diagram of a computing device according to another embodiment of the present application;
fig. 6 is a diagram of a computer-readable storage medium structure according to another embodiment of the present application.
Detailed Description
FIG. 1 is a flow diagram of a method according to one embodiment of the present application. Referring to fig. 1, the method includes:
101: a trusted execution environment TEE is constructed in advance, a calculation algorithm is obtained from an algorithm provider, and the calculation algorithm is invisible to all participants of calculation;
102: receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE;
103: according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request in the TEE, performing combined computation on all the acquired data by using a computing algorithm, and outputting a computing result to the data provider sending the request.
In this embodiment, optionally, obtaining the calculation algorithm from the algorithm provider includes:
and receiving the encrypted calculation algorithm transmitted by the algorithm provider through the corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE.
In this embodiment, optionally, the method further includes:
if a request for inquiring the algorithm is received from any party except the algorithm provider, the information of the algorithm is refused to be provided to the requesting party.
In this embodiment, optionally, the method further includes:
and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
In this embodiment, optionally, the method further includes:
all data in the memory of the TEE is also stored encrypted.
In the method provided by the embodiment, a trusted execution environment TEE is pre-constructed, and a calculation algorithm is acquired from an algorithm provider, wherein the calculation algorithm is invisible to all participants of calculation; receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE; according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using a computing algorithm, and outputting a computing result to the data provider sending the request; therefore, the method and the device solve the requirement that a plurality of participants need to share data and algorithm and collaborate to complete calculation on the premise of not exposing private data. The participants upload respective data to the trusted computing center through the secure data channel, the computing algorithm is deployed in the trusted computing center, the trusted computing center reads the data to execute the computing algorithm, and the result is output, so that the computing accuracy and the data security and privacy can be guaranteed.
FIG. 2 is a flow diagram of a method of trusted computing according to another embodiment of the present application. Referring to fig. 2, the method includes:
201: a trusted execution environment TEE is constructed in advance;
202: receiving an encrypted calculation algorithm transmitted by an algorithm provider through a corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE, wherein the calculation algorithm is invisible to all participants of calculation;
203: receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE;
the data transmitted by each encryption channel is different, but the encryption algorithm used may be the same.
204: according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using a computing algorithm, and outputting a computing result to the data provider sending the request;
205: if a request for inquiring the algorithm sent by any party except the algorithm provider is received, refusing to provide the information of the algorithm to the requester;
206: and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
In this embodiment, the method further includes:
all data in the memory of the TEE is also stored encrypted.
The method provided by the embodiment can be applied to a scene that a plurality of data providers want to share data and do not want to expose own data. For example, multiple gene companies want to perform more comprehensive data analysis by sharing their own gene library data, having a larger number of data samples, but do not want to expose their own data to other participants, and thus can use the above-described trusted computing method.
FIG. 3 is an interaction diagram of trusted computing, according to another embodiment of the present application. Referring to fig. 3, an algorithm provider uploads an AI algorithm model to a TEE for storage through a private data transmission protocol, a data provider uploads data to the TEE for storage through the private data transmission protocol, a participant a uploads the data to the TEE through the private data transmission protocol and requests for calculation, a trusted calculation center calls a corresponding algorithm to combine corresponding data for calculation, and finally a calculation result is output to the participant a.
In the embodiment, the data provider securely uploads the private data through the own encryption channel, and the algorithm provider securely uploads the calculation algorithm through the own encryption channel, so that the data privacy and the data security of each party are greatly protected on the premise of realizing sharing.
In the method provided by the embodiment, a trusted execution environment TEE is pre-constructed, and a calculation algorithm is acquired from an algorithm provider, wherein the calculation algorithm is invisible to all participants of calculation; receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE; according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using a computing algorithm, and outputting a computing result to the data provider sending the request; therefore, the method and the device solve the requirement that a plurality of participants need to share data and algorithm and collaborate to complete calculation on the premise of not exposing private data. The participants upload respective data to the trusted computing center through the secure data channel, the computing algorithm is deployed in the trusted computing center, the trusted computing center reads the data to execute the computing algorithm, and the result is output, so that the computing accuracy and the data security and privacy can be guaranteed.
FIG. 4 is a block diagram of a trusted computing device according to another embodiment of the present application. Referring to fig. 4, the apparatus includes:
an initial module 401 configured to pre-construct a trusted execution environment TEE and obtain a calculation algorithm from an algorithm provider, the calculation algorithm being invisible to all participants of the calculation;
a receiving module 402 configured to receive encrypted data transmitted by a plurality of data providers through respective encryption channels and store in the TEE;
and a calculation module 403, configured to, according to a trusted calculation request of a certain data provider, acquire data of all data providers related to the request in the TEE, perform a combination calculation on all the acquired data by using a calculation algorithm, and output a calculation result to the data provider sending the request.
In this embodiment, optionally, the initial module is specifically configured to:
and receiving the encrypted calculation algorithm transmitted by the algorithm provider through the corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE.
In this embodiment, optionally, the calculation module is further configured to:
if a request for inquiring the algorithm is received from any party except the algorithm provider, the information of the algorithm is refused to be provided to the requesting party.
In this embodiment, optionally, the calculation module is further configured to:
and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
In this embodiment, optionally, the apparatus further includes:
an encryption module configured to encrypt all data in the memory of the TEE as well.
The above device may be implemented by using a CPU whose hardware supports SGX by using Intel, which is certainly not exclusive and may also be implemented by using other manners, and is not limited specifically.
The apparatus provided in this embodiment may perform the method provided in any of the above method embodiments, and details of the process are described in the method embodiments and are not described herein again.
According to the device provided by the embodiment, the trusted execution environment TEE is constructed in advance, and the calculation algorithm is obtained from the algorithm provider and invisible to all participants of calculation; receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE; according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using a computing algorithm, and outputting a computing result to the data provider sending the request; therefore, the method and the device solve the requirement that a plurality of participants need to share data and algorithm and collaborate to complete calculation on the premise of not exposing private data. The participants upload respective data to the trusted computing center through the secure data channel, the computing algorithm is deployed in the trusted computing center, the trusted computing center reads the data to execute the computing algorithm, and the result is output, so that the computing accuracy and the data security and privacy can be guaranteed.
The above and other objects, advantages and features of the present application will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Embodiments also provide a computing device, referring to fig. 5, comprising a memory 1120, a processor 1110 and a computer program stored in said memory 1120 and executable by said processor 1110, the computer program being stored in a space 1130 for program code in the memory 1120, the computer program, when executed by the processor 1110, implementing the method steps 1131 for performing any of the methods according to the invention.
The embodiment of the application also provides a computer readable storage medium. Referring to fig. 6, the computer readable storage medium comprises a storage unit for program code provided with a program 1131' for performing the steps of the method according to the invention, which program is executed by a processor.
The embodiment of the application also provides a computer program product containing instructions. Which, when run on a computer, causes the computer to carry out the steps of the method according to the invention.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed by a computer, cause the computer to perform, in whole or in part, the procedures or functions described in accordance with the embodiments of the application. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by a program, and the program may be stored in a computer-readable storage medium, where the storage medium is a non-transitory medium, such as a random access memory, a read only memory, a flash memory, a hard disk, a solid state disk, a magnetic tape (magnetic tape), a floppy disk (floppy disk), an optical disk (optical disk), and any combination thereof.
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method of trusted computing, comprising:
a trusted execution environment TEE is constructed in advance, and a calculation algorithm is obtained from an algorithm provider, wherein the calculation algorithm is invisible to all participants of calculation;
receiving encrypted data transmitted by a plurality of data providers through respective encryption channels and storing the encrypted data in the TEE;
according to a trusted computing request of a certain data provider, acquiring data of all data providers related to the request from the TEE, performing combined computation on all the acquired data by using the computing algorithm, and outputting a computing result to the data provider sending the request.
2. The method of claim 1, wherein obtaining a computational algorithm from an algorithm provider comprises:
and receiving the encrypted calculation algorithm transmitted by the algorithm provider through the corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE.
3. The method of claim 1, further comprising:
if a request for inquiring the algorithm is received from any party except the algorithm provider, the information of the algorithm is refused to be provided to the requesting party.
4. The method of claim 1, further comprising:
and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
5. The method according to any one of claims 1-4, further comprising:
and all data in the memory of the TEE are also encrypted and stored.
6. An apparatus of trusted computing, comprising:
an initial module configured to pre-construct a trusted execution environment TEE and obtain a calculation algorithm from an algorithm provider, the calculation algorithm being invisible to all participants of the calculation;
a receiving module configured to receive encrypted data transmitted by a plurality of data providers through respective encryption channels and store in the TEE;
and the computing module is configured to acquire data of all data providers related to a certain data provider in the TEE according to a trusted computing request of the data provider, perform combined computation on all the acquired data by using the computing algorithm, and output a computing result to the data provider sending the request.
7. The apparatus of claim 6, wherein the initialization module is specifically configured to:
and receiving the encrypted calculation algorithm transmitted by the algorithm provider through the corresponding encryption channel, and storing the encrypted calculation algorithm in the TEE.
8. The apparatus of claim 6, wherein the computing module is further configured to:
if a request for inquiring the algorithm is received from any party except the algorithm provider, the information of the algorithm is refused to be provided to the requesting party.
9. The apparatus of claim 6, wherein the computing module is further configured to:
and if receiving a query request for the data of other data providers sent by any data provider, refusing to provide the corresponding data to the query requester.
10. The apparatus according to any one of claims 6-9, further comprising:
an encryption module configured to also encrypt all data in the memory of the TEE.
CN202010163609.6A 2020-03-10 2020-03-10 Trusted computing method and device Pending CN113378174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010163609.6A CN113378174A (en) 2020-03-10 2020-03-10 Trusted computing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010163609.6A CN113378174A (en) 2020-03-10 2020-03-10 Trusted computing method and device

Publications (1)

Publication Number Publication Date
CN113378174A true CN113378174A (en) 2021-09-10

Family

ID=77568888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010163609.6A Pending CN113378174A (en) 2020-03-10 2020-03-10 Trusted computing method and device

Country Status (1)

Country Link
CN (1) CN113378174A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109634619A (en) * 2018-11-23 2019-04-16 试金石信用服务有限公司 Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing
CN110096542A (en) * 2019-04-29 2019-08-06 百度在线网络技术(北京)有限公司 Data verification processing method, device, system and the medium of decentralization
US20190266330A1 (en) * 2018-02-23 2019-08-29 Microsoft Technology Licensing, Llc Trusted cyber physical system
CN110781502A (en) * 2019-11-06 2020-02-11 广州信安数据有限公司 Multi-party trusted computing platform and computing method
CN110855671A (en) * 2019-11-15 2020-02-28 三星电子(中国)研发中心 Trusted computing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190266330A1 (en) * 2018-02-23 2019-08-29 Microsoft Technology Licensing, Llc Trusted cyber physical system
CN109634619A (en) * 2018-11-23 2019-04-16 试金石信用服务有限公司 Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing
CN110096542A (en) * 2019-04-29 2019-08-06 百度在线网络技术(北京)有限公司 Data verification processing method, device, system and the medium of decentralization
CN110781502A (en) * 2019-11-06 2020-02-11 广州信安数据有限公司 Multi-party trusted computing platform and computing method
CN110855671A (en) * 2019-11-15 2020-02-28 三星电子(中国)研发中心 Trusted computing method and system

Similar Documents

Publication Publication Date Title
CN111740966B (en) Data processing method based on block chain network and related equipment
CN107248984B (en) Data exchange system, method and device
US20170170960A1 (en) Data analytics on encrypted data elements
CN111460458B (en) Data processing method, related device and computer storage medium
WO2017163140A1 (en) Privacy enhanced central data storage
Abdullah et al. PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle
CN111383018B (en) Node group creating method and node group-based transaction method in alliance chain network
EP3308496B1 (en) System, apparatus and method for secure coordination of a rendezvous point for distributed devices using entropy multiplexing
CN110377440B (en) Information processing method and device
CN110855777A (en) Node management method and device based on block chain
CN112202779B (en) Block chain based information encryption method, device, equipment and medium
CN111259448A (en) Data sharing method and device
CN114329565A (en) Data sharing method, device and storage medium
CN112202555B (en) Information processing method, device and equipment for generating random number based on information attribute
KR20210058784A (en) Method for providing virtual asset service based on dicentralized identity and virtual asset service providing server using them
CN111147235B (en) Object access method and device, electronic equipment and machine-readable storage medium
JP7174300B2 (en) Content use system, licensed terminal, viewing terminal, distribution terminal, and content use program
CN110059097B (en) Data processing method and device
CN113378174A (en) Trusted computing method and device
CN108847937B (en) Key processing method, device, equipment and medium
CN114897177A (en) Data modeling method and device, electronic equipment and storage medium
CN113392350A (en) Page routing processing method, device, equipment, storage medium and program product
CN112685778A (en) Data storage method and device
CN112543194A (en) Mobile terminal login method and device, computer equipment and storage medium
CN116561820B (en) Trusted data processing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination