CN113724112A - Student status management method based on public data calling - Google Patents
Student status management method based on public data calling Download PDFInfo
- Publication number
- CN113724112A CN113724112A CN202111014862.6A CN202111014862A CN113724112A CN 113724112 A CN113724112 A CN 113724112A CN 202111014862 A CN202111014862 A CN 202111014862A CN 113724112 A CN113724112 A CN 113724112A
- Authority
- CN
- China
- Prior art keywords
- information
- student
- module
- key
- class
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000007726 management method Methods 0.000 title claims abstract description 29
- 238000000034 method Methods 0.000 claims abstract description 23
- 238000012795 verification Methods 0.000 claims abstract description 7
- 230000010354 integration Effects 0.000 claims description 4
- 238000012552 review Methods 0.000 claims description 2
- 238000013523 data management Methods 0.000 abstract description 11
- 238000011161 development Methods 0.000 description 5
- 239000011159 matrix material Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000008021 deposition Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Educational Technology (AREA)
- Tourism & Hospitality (AREA)
- Data Mining & Analysis (AREA)
- Educational Administration (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a student status management method based on public data calling, belongs to the technical field of data management, and aims to solve the problem that the data management technology cannot play an important role in a student status management system. It includes: the method comprises the steps of inputting student status information, updating the student status information and calling the student status information; and (3) inputting student status information: inputting information into a user module; dividing the information into four types according to the key fields; uploading the data to a public data module, and respectively storing the data to different area blocks; respectively encrypting information in different area blocks to generate a ciphertext, generating a safety key, and sending the safety key to a user module; calling the student status information: the user module sends first-class information of student information to be called to the public data module, and other three types of information on the data chain are inquired according to the first-class information; selecting information type, and sending a security key of the region block; and after the safety secret key verification is passed, the information of the student to be called is sent to the user module. The invention is used for performing data management on student status.
Description
Technical Field
The invention relates to a student status management method, and belongs to the technical field of data management.
Background
With the development of information technology, data management technology has gone deep into various fields, and in any field, data management is an important support for industry development. With the development of data management technology, paperless office work is realized by using an office automation system, which is a development trend of modern office modes. Combining data management technology with paperless office also brings technical challenges to the management of the student status.
In the management of the school status, data is an important resource. The more the student status information is accumulated in the processes of storage, inquiry, transaction, update and the like, the paper office mode gradually fails to meet the time limit requirement, quality requirement and capacity requirement of the student status information storage. However, the paper subject management mode has undergone long-term deposition in the educational history, and the current digital office based on data management does not play a due role in the subject management, so that the workload is not reduced, the work efficiency is not improved, and on the contrary, the staff needs to record the paper file into the system to be stored as the electronic file, and the work load is increased. At the present stage, with the continuous improvement of education level, student archives grow explosively, the student status management difficulty is obviously increased, the problems existing in the traditional paper management mode are continuously highlighted, and the management of student status information by applying the digital management mode becomes a necessary trend.
At present, the following problems still exist in the school roll management work:
1. the manual and paper management is simply changed into an information system and storage management, when students are graduated or change school, the paper-edition book files still need to be transferred to a new school, and then the information in the materials is recorded into the information system, so that the work task is increased, and the electronization of the book management is not really realized;
2. the value of big data applied to the student status management is not fully mined;
3. paper files are still present in large numbers in the management of the books.
The student status management system can provide sufficient information and a quick query means for educational users, so that how to apply the data management technology to the maximum extent is an important direction for the development of student status management.
Disclosure of Invention
The invention aims to solve the problem that the data management technology cannot play an important role in a student status management system, and provides a student status management method based on public data calling.
The invention relates to a school roll management method based on public data calling, which comprises the following steps: the method comprises the steps of inputting student status information, updating the student status information and calling the student status information;
the specific method for the input of the student status information comprises the following steps:
s1, when the student initially enters the school, the student information is input into the user module;
s2, dividing the information of the trainees by the user module according to the key fields, wherein the information of each trainee is divided into first-class information, second-class information, third-class information and fourth-class information;
s3, uploading the student information to a public data module through a synchronization module by the user module, respectively storing first-class information, second-class information, third-class information and fourth-class information into different area blocks by the public data module, wherein the first-class information, the second-class information, the third-class information and the fourth-class information of each student are a data chain;
s4, the public data module respectively encrypts the student information in different area blocks to generate a ciphertext and a safety key, and then the safety key is sent to the user module;
the specific method for updating the student status information comprises the following steps:
s5, when the student information is updated, inputting the updated student information into the user module;
s6, the user module synchronizes the updated student information to the public data module through the synchronization module;
s7, the public data module compares the updated student information with the original information by adopting a data integration module, and the updated student information and the original information are updated and then combined;
the specific method for calling the school roll information comprises the following steps:
s8, the user module sends first-class information of the student information to be called to the public data module, and the public data module inquires second-class information, third-class information and fourth-class information on a data chain where the first-class information is located according to the first-class information;
s9, the user module selects the information category of the student information to be called, and sends the security key of the area block where the category information is located to the public data module;
and S10, the public data module verifies the security key, and the student information to be called is sent to the user module after the verification is passed.
The invention has the advantages that: the invention provides a student status management method based on public data calling, which comprises student status information entry, student status information updating and student status information calling, wherein relevant information of a student is entered at the initial stage of student entry (primary school stage), and is uploaded to a public data module. In the study in the early middle school stage, the high school stage and the like, only the safety secret key of the student is handed over to a new school, and the student status information of the student is called in the public data module, so that the student status file of the paper is not needed to be handed over, and the working efficiency is greatly improved.
In the common data module, the student information is classified, each category is stored in different area blocks, and the information of different categories of the same student is a data chain. Information except the basic information is encrypted, the safety secret key is stored in a school where the student is located, and after the student goes up to school, the safety secret key is handed over to other schools, so that only the school where the student is located can call transaction information, graduation information and reward and punishment information, and privacy of student status information is greatly protected.
Drawings
Fig. 1 is a schematic block diagram of a cadastral management method based on common data call according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention is further described with reference to the following drawings and specific examples, which are not intended to be limiting.
The first embodiment is as follows: the following describes the present embodiment with reference to fig. 1, and the present embodiment describes a method for managing a school roll based on a common data call, which includes: the method comprises the steps of inputting student status information, updating the student status information and calling the student status information;
the specific method for the input of the student status information comprises the following steps:
s1, when the student initially enters the school, the student information is input into the user module;
s2, dividing the information of the trainees by the user module according to the key fields, wherein the information of each trainee is divided into first-class information, second-class information, third-class information and fourth-class information;
s3, uploading the student information to a public data module through a synchronization module by the user module, respectively storing first-class information, second-class information, third-class information and fourth-class information into different area blocks by the public data module, wherein the first-class information, the second-class information, the third-class information and the fourth-class information of each student are a data chain;
s4, the public data module respectively encrypts the student information in different area blocks to generate a ciphertext and a safety key, and then the safety key is sent to the user module;
the specific method for updating the student status information comprises the following steps:
s5, when the student information is updated, inputting the updated student information into the user module;
s6, the user module synchronizes the updated student information to the public data module through the synchronization module;
s7, the public data module compares the updated student information with the original information by adopting a data integration module, and the updated student information and the original information are updated and then combined;
the specific method for calling the school roll information comprises the following steps:
s8, the user module sends first-class information of the student information to be called to the public data module, and the public data module inquires second-class information, third-class information and fourth-class information on a data chain where the first-class information is located according to the first-class information;
s9, the user module selects the information category of the student information to be called, and sends the security key of the area block where the category information is located to the public data module;
and S10, the public data module verifies the security key, and the student information to be called is sent to the user module after the verification is passed.
In this embodiment, the user module is a processing port of each school where the trainee is located. The public data module is a cloud service platform of the student status information data of the whole education system, when the students are graduated or transfer, only the security secret key corresponding to the student status information of the students needs to be handed over, and a new school (a new user module) calls the student status information of the students to the public data module without handing over the student status files of paper.
In this embodiment, the user module of S2 divides the student information according to the key fields, and the information of each student is divided into first-class information, second-class information, third-class information, and fourth-class information, and when the student initially enters a young student, the second-class information, the third-class information, and the fourth-class information are all empty, and at this time, the key field +0 corresponding to the information category needs to be input, and in the subsequent updating process of the student status information, the corresponding content is gradually filled. Further, the information of the type described in S2 is basic information; the second kind of information is transaction information, including shift, school, rest study, review, class reservation and retrospect; the three types of information are graduation information; four types of information are reward and punishment information.
The second embodiment is as follows: in this embodiment, to further explain the first embodiment, the specific method for dividing the trainee information by the user module according to the key field in S2 includes:
s2-1, the user module divides the data domain according to the key field;
s2-2, when the student information is input into the user module, the user module inquires key fields of the student information, and divides the student information into corresponding data fields according to the key fields; the student information in each data field is the same category information.
The third concrete implementation mode: in this embodiment, to further explain the first embodiment, the specific method for respectively encrypting the trainee information in different area blocks by the public data module in S4 to generate the ciphertext and the security key includes:
s4-1, inputting a security parameter lambda, generating a public parameter PK and a master key MSK:
Setup(1λ)→(PK,MSK);
s4-2, generating a ciphertext CT according to the public parameter PK, the access structure A, the data file F of the student information and the key field KW:
Encrypt(PK,A,F,KW)→(CT);
s4-3, according to public parameter PK, master key MSK and attribute set in student informationGenerating a security key SK:
in the present embodiment, Setup () represents an initialization algorithm:
inputting a security parameter lambda to generate multiplication cyclic groups G and G of the order of a prime number pTThe bilinear map e is:
e:G×G→GTg is a generator of G;
generating a public parameter PK and a master key MSK:
MSK={α,β,t1,t2,t3,t4};
wherein: alpha, beta, t1、t2、t3、t4Is from a secret factor set ZpIs selected randomly;
H1:{0,1}*→ G and H2:{0,1}*→ G are two hash functions.
Encrypt (·) represents a calling interface for encrypting a plaintext into a ciphertext, the interface can be directly operated in OpenAPI Explorer, and a ciphertext code can be automatically generated after the operation is successful.
Each keyword of the keyword field KW is denoted as Ni=Wi,NiRepresenting a generic key name, exposed with the ciphertext, WiThe key value which represents the sensitivity is hidden in the ciphertext;
access structure a: a ═ M, ρ; wherein M represents ls×nsMatrix of lsIndicating the number of attributes in M.
Kengen (·) represents a generator of keys that can be used as a stand-alone application and library, with the latter encryption being provided by OpenSSL.
When the student information is recorded, according to the attribute set in the student informationSelecting a random value r ∈ Zp,
Calculating D1=gβgαr,D2=gr,
Generating a security key SK:
the fourth concrete implementation mode: in this embodiment, to further explain the first embodiment, the step S10 of verifying the security key by the public data module, and sending the trainee information to be called to the user module after the verification is passed includes:
s5-1, according to the security key SK, the access structure P 'of the key field of the student information to be called and the public parameter PK, generating a trap door T related to P':
Trapgen(PK,SK,P')→(T);
s5-2, judging whether a key field in the ciphertext CT is matched with P' or not according to the public parameter PK, the ciphertext CT and the trapdoor T, and if so, judging that the student information to be called is inquired;
s5-3, judging attribute set of student information to be calledWhether an access structure A in the ciphertext CT is met, if yes, outputting a part of the decrypted file Z:
Search(PK,T,CT)→(Z);
s5-4, the public data module sends the acquired student information F' to be called to the user module:
Decrypt(PK,SK,Z)→(F')。
in the present embodiment, trapdoor function generator is represented by Trapgen (·):
the access structure P' of the key field of the student information to be called is as follows: p ═ N, pi, Wn(i));
Wherein: n represents l0×k0Matrix of l0Is the number of key values in P', the function pi maps the row of the matrix to the generic key name, W, corresponding to that rown(i)Representing the key value corresponding to the row;
And generating a trap door T:
randomly selecting a blinding value zeta ∈ ZpAnd blinding part of components in the attribute private key:
obtaining a trapdoor T:
search () represents the partial decryption file generator:
Z=e(g,g)arζt。
decrypt (·) denotes a decryption function generator that restores the encrypted file to plaintext information.
Inputting a ciphertext CT, a partial decryption file Z and a security key SK, and calculating to obtain a symmetric key ck:
and decrypting ck by adopting the symmetric secret key to obtain the student information F' to be called.
The working principle of the invention is explained below:
in the part of student status entry, the relevant information of the student is entered in the initial stage of student entry (primary school stage), and is uploaded to the public data module.
In the common data module, the student information is classified, each category is stored in different area blocks, and the information of different categories of the same student is a data chain. Information except the basic information is encrypted, the safety secret key is stored in a school where the student is located, and after the student goes up to school, the safety secret key is handed over to other schools, so that the school where the student is located can call transaction information, graduation information and reward punishment information.
In the student status information updating part, when the student information is updated, the updated student information is recorded and then synchronized into the public data module, and the public data module updates and combines the student information through the data integration module.
In the school status information calling part, after the student goes up to school or changes school, the safety secret key corresponding to the student information is handed over to a new school, the new school sends the basic information of the student to the public data module, and the public data module inquires corresponding transaction information, graduation information and reward and punishment information according to a data chain where the basic information is located. The user module selects the information category of the student to be called, sends a security key to the public data module, and can call the student status information after passing the verification.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims. It should be understood that features described in different dependent claims and herein may be combined in ways different from those described in the original claims. It is also to be understood that features described in connection with individual embodiments may be used in other described embodiments.
Claims (5)
1. A method for managing a school roll based on a public data call, comprising: the method comprises the steps of inputting student status information, updating the student status information and calling the student status information;
the specific method for the input of the student status information comprises the following steps:
s1, when the student initially enters the school, the student information is input into the user module;
s2, dividing the information of the trainees by the user module according to the key fields, wherein the information of each trainee is divided into first-class information, second-class information, third-class information and fourth-class information;
s3, uploading the student information to a public data module through a synchronization module by the user module, respectively storing first-class information, second-class information, third-class information and fourth-class information into different area blocks by the public data module, wherein the first-class information, the second-class information, the third-class information and the fourth-class information of each student are a data chain;
s4, the public data module respectively encrypts the student information in different area blocks to generate a ciphertext and a safety key, and then the safety key is sent to the user module;
the specific method for updating the student status information comprises the following steps:
s5, when the student information is updated, inputting the updated student information into the user module;
s6, the user module synchronizes the updated student information to the public data module through the synchronization module;
s7, the public data module compares the updated student information with the original information by adopting a data integration module, and the updated student information and the original information are updated and then combined;
the specific method for calling the school roll information comprises the following steps:
s8, the user module sends first-class information of the student information to be called to the public data module, and the public data module inquires second-class information, third-class information and fourth-class information on a data chain where the first-class information is located according to the first-class information;
s9, the user module selects the information category of the student information to be called, and sends the security key of the area block where the category information is located to the public data module;
and S10, the public data module verifies the security key, and the student information to be called is sent to the user module after the verification is passed.
2. The membership management method based on public data call as claimed in claim 1, wherein the specific method for the user module to divide the membership information according to the key fields at S2 includes:
s2-1, the user module divides the data domain according to the key field;
s2-2, when the student information is input into the user module, the user module inquires key fields of the student information, and divides the student information into corresponding data fields according to the key fields; the student information in each data field is the same category information.
3. A membership management method based on public data call as claimed in claim 1 or 2, wherein said information of S2 is basic information; the second kind of information is transaction information, including shift, school, rest study, review, class reservation and retrospect; the three types of information are graduation information; four types of information are reward and punishment information.
4. The method as claimed in claim 1, wherein the step S4 includes the public data module respectively encrypting the student information in different area blocks to generate ciphertext, and the specific method for generating the security key at the same time includes:
s4-1, inputting a security parameter lambda, generating a public parameter PK and a master key MSK:
Setup(1λ)→(PK,MSK);
s4-2, generating a ciphertext CT according to the public parameter PK, the access structure A, the data file F of the student information and the key field KW:
Encrypt(PK,A,F,KW)→(CT);
s4-3, according to public parameter PK, master key MSK and attribute set in student informationGenerating a security key SK:
5. the membership management method based on public data call as claimed in claim 4, wherein the public data module of S10 verifies the security key, and the specific method for sending the membership information to be called to the user module after the verification is passed includes:
s5-1, according to the security key SK, the access structure P 'of the key field of the student information to be called and the public parameter PK, generating a trap door T related to P':
Trapgen(PK,SK,P')→(T);
s5-2, judging whether a key field in the ciphertext CT is matched with P' or not according to the public parameter PK, the ciphertext CT and the trapdoor T, and if so, judging that the student information to be called is inquired;
s5-3, judging attribute set of student information to be calledWhether an access structure A in the ciphertext CT is met, if yes, outputting a part of the decrypted file Z:
Search(PK,T,CT)→(Z);
s5-4, the public data module sends the acquired student information F' to be called to the user module:
Decrypt(PK,SK,Z)→(F')。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111014862.6A CN113724112A (en) | 2021-08-31 | 2021-08-31 | Student status management method based on public data calling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111014862.6A CN113724112A (en) | 2021-08-31 | 2021-08-31 | Student status management method based on public data calling |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113724112A true CN113724112A (en) | 2021-11-30 |
Family
ID=78679984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111014862.6A Withdrawn CN113724112A (en) | 2021-08-31 | 2021-08-31 | Student status management method based on public data calling |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113724112A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104463738A (en) * | 2013-11-25 | 2015-03-25 | 北京建筑大学 | Method and system for managing student statuses |
WO2017061950A1 (en) * | 2015-10-09 | 2017-04-13 | Singapore Management University | Data security system and method for operation thereof |
CN107392813A (en) * | 2017-09-12 | 2017-11-24 | 杭州趣链科技有限公司 | A kind of student status information sharing system based on block chain |
CN108062734A (en) * | 2017-12-15 | 2018-05-22 | 佛山市晴天视觉数字科技有限公司 | A kind of Student Information Management System |
CN108092766A (en) * | 2017-11-30 | 2018-05-29 | 深圳大学 | A kind of cipher text searching method for verifying authority and its system |
CN108460577A (en) * | 2018-03-17 | 2018-08-28 | 滨州职业学院 | Students' archives management method, platform and its system |
CN108733783A (en) * | 2018-05-09 | 2018-11-02 | 深圳明创自控技术有限公司 | A kind of student status information management system based on privately owned block chain |
CN110599376A (en) * | 2019-08-29 | 2019-12-20 | 复旦大学 | Course selection system based on attribute password |
-
2021
- 2021-08-31 CN CN202111014862.6A patent/CN113724112A/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104463738A (en) * | 2013-11-25 | 2015-03-25 | 北京建筑大学 | Method and system for managing student statuses |
WO2017061950A1 (en) * | 2015-10-09 | 2017-04-13 | Singapore Management University | Data security system and method for operation thereof |
CN107392813A (en) * | 2017-09-12 | 2017-11-24 | 杭州趣链科技有限公司 | A kind of student status information sharing system based on block chain |
CN108092766A (en) * | 2017-11-30 | 2018-05-29 | 深圳大学 | A kind of cipher text searching method for verifying authority and its system |
CN108062734A (en) * | 2017-12-15 | 2018-05-22 | 佛山市晴天视觉数字科技有限公司 | A kind of Student Information Management System |
CN108460577A (en) * | 2018-03-17 | 2018-08-28 | 滨州职业学院 | Students' archives management method, platform and its system |
CN108733783A (en) * | 2018-05-09 | 2018-11-02 | 深圳明创自控技术有限公司 | A kind of student status information management system based on privately owned block chain |
CN110599376A (en) * | 2019-08-29 | 2019-12-20 | 复旦大学 | Course selection system based on attribute password |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Certificateless public integrity checking of group shared data on cloud storage | |
CA3058013C (en) | Managing sensitive data elements in a blockchain network | |
CN110417781A (en) | File encryption management method, client and server based on block chain | |
US8533489B2 (en) | Searchable symmetric encryption with dynamic updating | |
CN104363215B (en) | A kind of encryption method and system based on attribute | |
Kumar et al. | A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies | |
IL281671B1 (en) | Systems and computer-based methods of document certification and publication | |
EP1233324A2 (en) | Data distribution system | |
US20220300638A1 (en) | Encrypted knowledge graph | |
CN106936820A (en) | The elongated amending method of data and its application in big data encryption | |
CN109743327B (en) | Certificateless cloud storage based integrity public verification method for shared data | |
CN106951791A (en) | A kind of confidential document access control system based on ciphertext | |
CN115001730A (en) | Role attribute-based access control system and method in distributed scene | |
CN110474764A (en) | Ciphertext data set intersection calculation method, device, system, client, server and medium | |
WO2007123224A1 (en) | Method of generating secure tickets for a new secure group, method of secure group communication, computing device having a recording medium, and network system | |
CN110599376A (en) | Course selection system based on attribute password | |
CN113724112A (en) | Student status management method based on public data calling | |
KR20200039979A (en) | Apparatus and method for order-revealing encryption | |
Hong et al. | Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems | |
Cao et al. | An integrity verification scheme of completeness and zero‐knowledge for multi‐Cloud storage | |
Hou et al. | Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing. | |
KR102192594B1 (en) | Apparatus and method for order-revealing encryption in multi-client environment without trusted authority | |
Reddick et al. | Case study of attribute based access control for genomics data using named data networking | |
Silambarasan et al. | Attribute-based convergent encryption key management for secure deduplication in cloud | |
KR102126295B1 (en) | Method for comparing chiphertext based and apparatus for executing the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211130 |
|
WW01 | Invention patent application withdrawn after publication |