CN115292378B - Trusted execution environment and careless transmission-based hidden query system and method thereof - Google Patents

Trusted execution environment and careless transmission-based hidden query system and method thereof Download PDF

Info

Publication number
CN115292378B
CN115292378B CN202210979697.6A CN202210979697A CN115292378B CN 115292378 B CN115292378 B CN 115292378B CN 202210979697 A CN202210979697 A CN 202210979697A CN 115292378 B CN115292378 B CN 115292378B
Authority
CN
China
Prior art keywords
query
module
confusion
client
execution environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210979697.6A
Other languages
Chinese (zh)
Other versions
CN115292378A (en
Inventor
周航
陈浩栋
宋雨筱
刘尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Impulse Online Technology Co ltd
Original Assignee
Beijing Impulse Online Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Impulse Online Technology Co ltd filed Critical Beijing Impulse Online Technology Co ltd
Priority to CN202210979697.6A priority Critical patent/CN115292378B/en
Publication of CN115292378A publication Critical patent/CN115292378A/en
Application granted granted Critical
Publication of CN115292378B publication Critical patent/CN115292378B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a hidden query system based on a trusted execution environment and careless transmission, which comprises a query module, a query module and a query module, wherein the query module is used for initiating a query by providing a query keyword by a user and sealing and storing a query record; and the queried module is transmitted with the query module through a secure transport layer protocol (TLS) and is used for providing query keywords and outputting query data. The invention also relates to a hidden inquiry method based on the trusted execution environment and the careless transmission. The invention ensures confidentiality and non-tamper property of the data query, data processing and query record sealing process through the trusted execution environment, and ensures the privacy of the user query through an careless transmission protocol. By combining the trusted execution environment and the careless transmission protocol, the trace query system under the privacy protection condition is realized, and the auditability of query operation is ensured while the privacy of a user of a query party is protected.

Description

Trusted execution environment and careless transmission-based hidden query system and method thereof
Technical Field
The invention relates to the field of trusted computing and privacy computing, in particular to a hidden inquiry system and a method based on a trusted execution environment and careless transmission.
Background
Currently, in the big data age, various industries have the need of large amount of data for data mining to do wind control, marketing and the like. As a data consumer, the data consumer must know the particular query record of the consumer without privacy protection when querying the data consumer. Query records are also an important privacy, and data requesters have urgent requirements for protecting query privacy, and hope that reliable queries can be performed in a hidden manner. However, the queried party also wishes that the query record of the querying party be provable and that the querying source party be authenticated. Moreover, the supervisor also needs to audit the query of the querying party.
The prior art is related to the way of data query by including: 1) The inquiring party inquires in a plaintext mode; 2) The querying party queries using data confusion or inadvertent transmission techniques.
Mode 1) the inquired party can know all inquiry records of the inquired party, and the supervisor can audit and cannot protect the inquiry privacy of the inquired party; the mode 2) the inquired party cannot know the inquiry records of the inquired party, so that the inquiry privacy of the inquired party is protected, the inquiry records cannot be stored, and the supervision party cannot audit. In either way, the privacy of the querying party cannot be protected, and the query records can be stored and verified, so that the supervising party can audit.
Disclosure of Invention
The embodiment of the invention provides a hidden query system and a hidden query method based on a trusted execution environment and careless transmission, which are used for solving the defects in the prior art.
To achieve the above object, an embodiment of a first aspect of the present invention provides a trusted execution environment and an inadvertent transmission-based hidden query system, the system comprising: the query module is used for initiating a query by providing a query keyword by a user and sealing and storing a query record; and the queried module is transmitted with the query module through a secure transport layer protocol (TLS) and is used for providing query keywords and outputting query data.
Further, the query module includes: the query SDK is used for initiating data query by a user, inputting query keywords and outputting query results; the query device client is connected with the query SDK and is used for processing a query request initiated by a user and returning result data; the confusion device client is connected with the query device client and used for querying the needed confusion keywords; the auditing device is connected with the client of the inquiring device and is used for sealing and storing the inquiring operation record; and the log sealing device is connected with the auditing device and is used for storing the sealed encrypted log record.
Further, the queried module includes: the query device server is connected with the query device client and is used for processing the confused query sentences in batches and returning an encrypted query result by using an unintentional transmission protocol; the confusion device server is connected with the query device client and is used for providing the confusion keywords; the query execution device is connected with the query device server and the confusion device server and is used for querying data and returning the data and providing data keywords; and the data storage device is connected with the query execution device and is used for storing the original data.
Further, the querying device client also requires: the module operates in a trusted execution environment; the module will check the syntax of the query request initiated by the query SDK; the module and the inquiry device service end need to carry out identity verification and module integrity verification when each communication.
Further, the obfuscation device client also requires: the module and the client of the inquiring device operate in the same trusted execution environment; the module and the confusing device server end need to carry out identity verification and module integrity verification when each communication is carried out; the module periodically synchronizes the latest confusion keyword library from the service end of the confusion device; the module provides the confusing keywords to the client of the inquiry device to ensure randomness and validity.
Further, the auditing apparatus also requires: the module and the client of the inquiring device operate in the same trusted execution environment; the module encrypts the query record by using a preset audit public key in the trusted execution environment; the module may configure the encryption log storage mode to select a file system or database.
Further, the log sealing device further requires: the module is configured according to the encryption log storage mode of the auditing device and is realized by using a file system or a database.
Further, the query device server also requires: the module operates in a trusted execution environment; the module and the client of the inquiring device need to carry out identity verification and module integrity verification each time of communication.
Further, the obfuscation device server also requires: the module and the query device server run in the same trusted execution environment; the module and the confusing device client end need to carry out identity verification and module integrity verification each time when communicating.
Further, the query execution device further requires: the module can query a database and a file; the module needs to carry out identity verification when communicating with the query device server and the confusion device server.
An embodiment of the second aspect of the present invention provides a method for hidden inquiry based on a trusted execution environment and inadvertent transmission, the method comprising the steps of:
the method comprises the following steps: the client of the confusion device requests the server of the confusion device to acquire a query keyword library for confusion;
step 1: the user initiates a query by calling the query SDK, and queries the record with the keyword q;
step 2: the query device client receives a query request initiated by a query SDK, checks grammar of a query sentence, and calls the confusion device client to extract k-1 keywords which are different from the keyword q and used for confusion;
step 3: the client of the query device merges the keywords q of the query initiated by the user, forms k query sentences according to the merged k keywords, and invokes the server of the query device to initiate the query;
step 4: after receiving a query request initiated by a query device client, a query device server processes k query sentences, invokes a query execution device to query, and the query execution device queries a data storage device to obtain corresponding k results and returns the k results to the query device server;
step 5: after the query device server acquires k results returned by the query execution device, the query device server returns a notification that the query of the query device client is completed, and the query device client and the query device server perform query result transmission through an unintentional transmission protocol to acquire an encrypted query result;
step 6: the query device client decrypts the result corresponding to the keyword q from the obtained encrypted query result and returns the result to the query SDK.
Further, the k-1 confusion keys in step 2 must be randomly extracted and must be the keys actually existing in the data storage device.
Further, in the step 3, when k query sentences are formed, the k keywords need to be desensitized and encoded by splicing random salt after passing through SHA-256.
Further, the specific step of processing k query sentences in the step 4 includes the following steps: splicing random salt after carrying out SHA-256 coding on all keywords, and matching and restoring k keywords to be queried; and after the k keywords are successfully acquired, generating k plaintext query sentences containing the corresponding keywords.
Further, the step 5 of the careless transmission protocol includes, but is not limited to, 1 out N careless transmission protocol based on RSA.
Drawings
The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate the invention and together with the description serve to explain, without limitation, the invention. In the drawings:
FIG. 1 is a schematic diagram of a trusted execution environment and inadvertent transmission based hidden query system in accordance with an embodiment of the present invention.
FIG. 2 is a flow chart of a trusted execution environment and inadvertent transmission based hidden query method provided by an embodiment of the present invention.
Description of the embodiments
The following detailed description of specific embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
FIG. 1 is a schematic diagram of a trusted execution environment and inadvertent transmission based hidden query system according to an embodiment of the present invention, as shown in FIG. 1, the system includes:
the query module is used for initiating a query by providing a query keyword by a user and sealing and storing a query record;
the queried module is transmitted with the query module through a secure transport layer protocol (TLS) and is used for providing query keywords and outputting query data;
the query module comprises:
the query SDK is used for initiating data query by a user, inputting query keywords and outputting query results;
the query device client is connected with the query SDK and is used for processing a query request initiated by a user and returning result data;
the confusion device client is connected with the query device client and used for querying the needed confusion keywords;
the auditing device is connected with the client of the inquiring device and is used for sealing and storing the inquiring operation record;
the log sealing device is connected with the auditing device and used for storing the sealed encrypted log record;
the inquired module comprises:
the query device server is connected with the query device client and is used for processing the confused query sentences in batches and returning an encrypted query result by using an unintentional transmission protocol;
the confusion device server is connected with the query device client and is used for providing the confusion keywords;
the query execution device is connected with the query device server and the confusion device server and is used for querying data and returning the data and providing data keywords;
and the data storage device is connected with the query execution device and is used for storing the original data.
As a specific embodiment of the invention, the trusted execution environments in which the query device client, the confusion device client, the auditing device, the query device server and the confusion device server operate can adopt technical modes such as Intel SGX, ARM Trustzone and the like.
As a specific implementation mode of the invention, the audit device can encrypt the sealing memory of the query operation record by using an asymmetric key; specifically, the auditing device encrypts the log by using the public key of the appointed auditing party, so that the auditing party can decrypt the encrypted log by using the corresponding private key to audit.
As a specific embodiment of the present invention, the careless transmission protocol may use the RSA-based 1 out N careless transmission protocol.
As a specific embodiment of the present invention, the confusing keywords are provided, in particular, keywords of all data stored in the data storage device.
As a specific implementation mode of the invention, TLS communication is used for all communication between the query module and the queried module, so that encrypted transmission during data cross-domain circulation is ensured.
Fig. 2 is a flow chart of a trusted execution environment and careless transmission-based hidden query method provided in an embodiment of the present invention, where a query client refers to a query device client, a confusion device client, an audit device, and the like, and a query server refers to a query device server, a confusion device server, a query execution device, a data storage device, and the like, as shown in fig. 2, the method includes:
the method comprises the following steps: the client of the confusion device requests the server of the confusion device to acquire a query keyword library for confusion;
step 1: the user initiates a query by calling the query SDK, and queries the record with the keyword q;
step 2: the query device client receives a query request initiated by a query SDK, checks grammar of a query sentence, and calls the confusion device client to extract k-1 keywords which are different from the keyword q and used for confusion;
step 3: the client of the query device merges the keywords q of the query initiated by the user, forms k query sentences according to the merged k keywords, and invokes the server of the query device to initiate the query;
step 4: after receiving a query request initiated by a query device client, a query device server processes k query sentences, invokes a query execution device to query, and the query execution device queries a data storage device to obtain corresponding k results and returns the k results to the query device server;
step 5: after the query device server acquires k results returned by the query execution device, the query device server returns a notification that the query of the query device client is completed, and the query device client and the query device server perform query result transmission through an unintentional transmission protocol to acquire an encrypted query result;
step 6: the query device client decrypts the result corresponding to the keyword q from the obtained encrypted query result and returns the result to the query SDK.
Specifically, as the following examples:
the inquirer wants to inquire the c-type information of the user with the keyword q1 from the inquired party, the inquired content cannot be specifically known as q1 by the inquirer, and meanwhile, the record of the inquired q can be encrypted and used as audit.
First, the inquirer calls the inquiry SDK, the inquiry keyword is q1, and the sentence of the inquiry is "select c from db where key =q1".
After the query client receives the request, it is checked whether the grammar of the query statement is correct. When the grammar checks, the confusion client is called, and k-1 confusion keywords q2 and q3 … … qk are acquired, wherein the k-1 keywords are different from q 1.
After the acquisition of the confusion keywords is completed, the query client desensitizes and encodes all k keywords, and the random salt is spliced after SHA-256. The query client forms k query statements: "select c from db where key =sha (q 1) +salt", "select c from db where key =sha (q 2) +salt" … … "select c from db where key =sha (qk) +salt", and the k sentences are used to call the query server to initiate the query.
After receiving the query request, the query server performs SHA-256 post-splicing salt value salt on the keyword library, matches the original values q2, q3 … … qk of the k keywords, calls the query execution device, queries the values v1, v2 … … vk corresponding to the k shutdown keywords, and notifies the query client of query completion.
After the query client obtains the query, the 1 out N careless transmission protocol based on RSA is used to obtain the value to be queried, and the specific steps are as follows:
(1) The inquiring client informs the inquiring server to start transmission;
(2) The query server side pair generates k pairs of RSA public and private keys (p 1, s 1), (p 2, s 2) … … (pk, sk), and returns all public keys and corresponding key desensitization coding contents to (p 1, SHA (q 1) +salt), (p 2, SHA (q 2) +salt) … … (pk, SHA (qk) +salt);
(3) The query client generates a random number r, encrypts r by using a public key p1 corresponding to a keyword q1 to obtain enc (r), and sends the enc (r) to the query server;
(4) The query server uses k private keys s1, s2 … … sk to decrypt enc (r) to obtain r1, r2 … … rk, respectively using
r1, r2 … … rk exclusive or v1, v2 … … vk, obtaining encrypted values enc (v 1), enc (v 2) … … enc (vk), and returning to the query client;
(5) The querying client uses r exclusive OR enc (v 1) to obtain v1, i.e. the value it wants to query, and the other k-1 values cannot be decrypted.
After the decryption is completed, the query client returns the value v1 obtained by the decryption to the query SDK.
After the query is processed, the auditing device encrypts the query record about the keyword q1 in a trusted execution environment by using the public key audiopublic key provided by the auditing party to obtain enc (record), and stores the enc (record) in the log sealing device.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (12)

1. A trusted execution environment and inadvertent transmission based hidden query system comprising:
the query module is used for initiating a query by providing a query keyword by a user and sealing and storing a query record;
the queried module is transmitted with the query module through a secure transport layer protocol (TLS) and is used for providing query keywords and outputting query data;
the query module comprises:
the query SDK is used for initiating data query by a user, inputting query keywords and outputting query results;
the query device client is connected with the query SDK and is used for processing a query request initiated by a user and returning result data;
the confusion device client is connected with the query device client and used for querying the needed confusion keywords;
the auditing device is connected with the client of the inquiring device and is used for sealing and storing the inquiring operation record;
the log sealing device is connected with the auditing device and used for storing the sealed encrypted log record;
the inquired module comprises:
the query device server is connected with the query device client and is used for processing the confused query sentences in batches and returning an encrypted query result by using an unintentional transmission protocol;
the confusion device server is connected with the query device client and is used for providing the confusion keywords;
the query execution device is connected with the query device server and the confusion device server and is used for querying data and returning the data and providing data keywords;
the data storage device is connected with the query execution device and used for storing the original data;
the number of the confusion keywords provided by the single query of the client of the confusion device is one minus the confusion degree;
the confusion key words provided by the confusion device server side to the confusion device client side are required to be randomly extracted and are required to be key words actually existing in the storage device, the confusion key words are required to be desensitized and encoded in a mode of splicing random salts after SHA-256, and the query device server side is matched and restored to the key words in a mode of splicing random salts after SHA-256 is carried out on all the key words.
2. The trusted execution environment and inadvertent transmission based hidden query system of claim 1, wherein said query device client further requires:
the module operates in a trusted execution environment; the module will check the syntax of the query request initiated by the query SDK; the module and the inquiry device service end need to carry out identity verification and module integrity verification when each communication.
3. The trusted execution environment and inadvertent transmission based hidden query system of claim 1, wherein said obfuscation device client further requires:
the module and the client of the inquiring device operate in the same trusted execution environment; the module and the confusing device server end need to carry out identity verification and module integrity verification when each communication is carried out; the module periodically synchronizes the latest confusion keyword library from the confusion device server.
4. The trusted execution environment and inadvertent transmission based hidden inquiry system of claim 1 wherein said auditing means further requires:
the module and the client of the inquiring device operate in the same trusted execution environment; the module encrypts the query record by using a preset audit public key in the trusted execution environment; the module may configure the encryption log storage mode to select a file system or database.
5. The trusted execution environment and inadvertent transmission based hidden query system of claim 1, wherein said log blocking means further requires:
the module is configured according to the encryption log storage mode of the auditing device and is realized by using a file system or a database.
6. The trusted execution environment and inadvertent transmission based hidden query system of claim 1, wherein said query device server further requires:
the module operates in a trusted execution environment; the module and the client of the inquiring device need to carry out identity verification and module integrity verification each time of communication.
7. The trusted execution environment and inadvertent transmission based hidden query system of claim 1, wherein said obfuscation device server further requires:
the module and the query device server run in the same trusted execution environment; the module and the confusing device client end need to carry out identity verification and module integrity verification each time when communicating.
8. The trusted execution environment and inadvertent transmission based hidden query system of claim 1, wherein said query execution means further requires:
the module can query a database and a file; the module needs to carry out identity verification when communicating with the query device server and the confusion device server.
9. A method of hidden querying based on a trusted execution environment and inadvertent transmission, said method comprising the steps of:
the method comprises the following steps: the client of the confusion device requests the server of the confusion device to acquire a query keyword library for confusion;
step 1: the user initiates a query by calling the query SDK, and queries the record with the keyword q;
step 2: the query device client receives a query request initiated by a query SDK, checks grammar of a query sentence, has k confusion degree, calls a confusion device client to randomly extract k-1 truly existing keywords for confusion, which are different from the keyword q, wherein the truly existing keywords for confusion are required to be keywords truly existing in a data storage device, and needs to be subjected to desensitization coding in a mode of splicing random salt after SHA-256;
step 3: the client of the query device merges the keywords q of the query initiated by the user, forms k query sentences according to the merged k keywords, and invokes the server of the query device to initiate the query;
step 4: after receiving a query request initiated by a query device client, a query device server processes k query sentences, invokes a query execution device to query, and the query execution device queries a data storage device to obtain corresponding k results and returns the k results to the query device server;
step 5: after the query device server acquires k results returned by the query execution device, the query device server returns a notification that the query of the query device client is completed, and the query device client and the query device server perform query result transmission through an unintentional transmission protocol to acquire an encrypted query result;
step 6: the query device client decrypts the result corresponding to the keyword q from the obtained encrypted query result and returns the result to the query SDK.
10. The method of claim 9, wherein the k key words are desensitized and encoded by SHA-256 post-splicing random salt when k query sentences are formed in step 3.
11. The method of concealing query based on trusted execution environment and careless transmission according to claim 9, wherein the step 4 of processing k query statements comprises the steps of:
splicing random salt after carrying out SHA-256 coding on all keywords, and matching and restoring k keywords to be queried;
and after the k keywords are successfully acquired, generating k plaintext query sentences containing the corresponding keywords.
12. The method of concealing a query based on a trusted execution environment and inadvertent transmission according to claim 9, wherein the inadvertent transmission protocol of step 5 comprises, but is not limited to, 1 out N inadvertent transmission protocol based on RSA.
CN202210979697.6A 2022-08-16 2022-08-16 Trusted execution environment and careless transmission-based hidden query system and method thereof Active CN115292378B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210979697.6A CN115292378B (en) 2022-08-16 2022-08-16 Trusted execution environment and careless transmission-based hidden query system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210979697.6A CN115292378B (en) 2022-08-16 2022-08-16 Trusted execution environment and careless transmission-based hidden query system and method thereof

Publications (2)

Publication Number Publication Date
CN115292378A CN115292378A (en) 2022-11-04
CN115292378B true CN115292378B (en) 2023-12-05

Family

ID=83830407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210979697.6A Active CN115292378B (en) 2022-08-16 2022-08-16 Trusted execution environment and careless transmission-based hidden query system and method thereof

Country Status (1)

Country Link
CN (1) CN115292378B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115858914A (en) * 2022-11-10 2023-03-28 星环信息科技(上海)股份有限公司 Method, device and system for inquiring hiding trace, terminal equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001001260A2 (en) * 1999-06-30 2001-01-04 Raf Technology, Inc. Secure, limited-access database system and method
CN110781502A (en) * 2019-11-06 2020-02-11 广州信安数据有限公司 Multi-party trusted computing platform and computing method
CN111131145A (en) * 2019-11-08 2020-05-08 西安电子科技大学 Management query system and method for hiding communication key nodes
CN114462075A (en) * 2021-12-28 2022-05-10 浙商银行股份有限公司 Block chain privacy query method and system based on oblivious transmission technology
CN114547648A (en) * 2022-02-18 2022-05-27 中国银联股份有限公司 Data hiding trace query method and system
CN114661992A (en) * 2022-03-24 2022-06-24 深圳前海环融联易信息科技服务有限公司 Ordering query system and method based on careless transmission protocol

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001001260A2 (en) * 1999-06-30 2001-01-04 Raf Technology, Inc. Secure, limited-access database system and method
CN110781502A (en) * 2019-11-06 2020-02-11 广州信安数据有限公司 Multi-party trusted computing platform and computing method
CN111131145A (en) * 2019-11-08 2020-05-08 西安电子科技大学 Management query system and method for hiding communication key nodes
CN114462075A (en) * 2021-12-28 2022-05-10 浙商银行股份有限公司 Block chain privacy query method and system based on oblivious transmission technology
CN114547648A (en) * 2022-02-18 2022-05-27 中国银联股份有限公司 Data hiding trace query method and system
CN114661992A (en) * 2022-03-24 2022-06-24 深圳前海环融联易信息科技服务有限公司 Ordering query system and method based on careless transmission protocol

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向多用户的多层嵌套数据库加密方案;周福才;张鑫月;曾康;秦诗悦;;东北大学学报(自然科学版)(第12期);第22-27页 *

Also Published As

Publication number Publication date
CN115292378A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
CN108055125B (en) Method and device for encrypting and decrypting product information
CN111506901B (en) Block chain-based data processing method, terminal and storage medium
CN107294937B (en) Data transmission method based on network communication, client and server
CN110855671A (en) Trusted computing method and system
CN111461883A (en) Transaction processing method and device based on block chain and electronic equipment
EP4195583A1 (en) Data encryption method and apparatus, data decryption method and apparatus, terminal, and storage medium
CN113609522B (en) Data authorization and data access method and device
CN111090870A (en) Privacy-protecting user information query method and device
CN115292378B (en) Trusted execution environment and careless transmission-based hidden query system and method thereof
CN112685786A (en) Financial data encryption and decryption method, system, equipment and storage medium
CN116436682A (en) Data processing method, device and system
CN113204772A (en) Data processing method, device, system, terminal, server and storage medium
CN116346341A (en) Private key protection and server access method, system, equipment and storage medium
CN113918982B (en) Data processing method and system based on identification information
CN111917711A (en) Data access method and device, computer equipment and storage medium
CN113127818A (en) Block chain-based data authorization method and device and readable storage medium
CN111542050B (en) TEE-based method for guaranteeing remote initialization safety of virtual SIM card
CN115329359A (en) Secret query method and system
CN114584299A (en) Data processing method and device, electronic equipment and storage medium
CN113824713A (en) Key generation method, system and storage medium
Bojanova et al. Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
US11934516B2 (en) Method and system for enabling secure processing of data using untrusted processing application in a trusted execution environment
CN111737660B (en) Method, system and storage medium for realizing software authorization
CN117938546B (en) Verification and data access method of electronic account
CN113221189B (en) Identity authentication system, authentication method, medium and terminal based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant