CN116506123B - Multi-subject data community construction method, medium and system based on convention protocol - Google Patents

Multi-subject data community construction method, medium and system based on convention protocol Download PDF

Info

Publication number
CN116506123B
CN116506123B CN202310760222.2A CN202310760222A CN116506123B CN 116506123 B CN116506123 B CN 116506123B CN 202310760222 A CN202310760222 A CN 202310760222A CN 116506123 B CN116506123 B CN 116506123B
Authority
CN
China
Prior art keywords
data
protocol
key
party
provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310760222.2A
Other languages
Chinese (zh)
Other versions
CN116506123A (en
Inventor
高伟
周宇
王全胜
王攀峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xin'an Data Co ltd
Original Assignee
Guangzhou Xin'an Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xin'an Data Co ltd filed Critical Guangzhou Xin'an Data Co ltd
Priority to CN202310760222.2A priority Critical patent/CN116506123B/en
Publication of CN116506123A publication Critical patent/CN116506123A/en
Application granted granted Critical
Publication of CN116506123B publication Critical patent/CN116506123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the field of data interaction security technologies, and in particular, to a method for constructing a multi-body data community based on a convention protocol, a computer readable storage medium, and a system. According to the method for constructing the multi-subject data community based on the convention protocol, all subjects of the data community are incorporated into the alliance, and a new mode of data circulation operation is constructed jointly. The alliance body issues own data album to the data community data space through the exclusive client, and other bodies can view all the data catalogs in the platform and select the data catalogs according to the requirement. After determining the data requirement, the platform can negotiate the data protocol used together with the data provider, and the data can be used under the constraint of the protocol. All data and services sent out from the platform are in compliance examination of the platform, so that the data is ensured not to be divulged.

Description

Multi-subject data community construction method, medium and system based on convention protocol
Technical Field
The present invention relates to the field of data interaction security technologies, and in particular, to a method for constructing a multi-body data community based on a convention protocol, a computer readable storage medium, and a system.
Background
With the rapid development of informatization, the demand of business information is increasing, and a large amount of data needs to be accessed, transmitted, interacted, processed and the like, so that the requirements on data security and reliability are higher and higher. In the context of rapid development of data economy, data is also gradually factored, that is, data gradually becomes an element similar to a production element, and is important production data capable of promoting development of digital economy. Enterprises in various industries need to generate economic benefits through the circulation of own business data.
At present, a data circulation mode between enterprises can only be used for establishing a data channel between two enterprises, one party can provide data for the other party, namely point-to-point unilateral data circulation, and interaction and open circulation of multiparty main body data are related, and the method is still blank. How to realize the secure and trusted circulation and sharing opening of the data of the multiparty main body is not a mature method at present.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a multi-subject data community construction method based on a convention protocol and a computer readable storage medium storing a computer program for realizing the method when being executed, wherein the multi-subject data community construction method based on the convention protocol can realize data circulation and open sharing of multi-subjects.
In order to solve the technical problem, in a first aspect, the present invention provides a method for constructing a multi-body data community based on a convention protocol, which includes the following steps:
a data supply step, wherein each data provider issues own data list to the data space of the data community, so as to form a data catalog;
a data request step of generating a data use request according to the selection operation of the data directory by the data use party;
a data protocol step of generating a data protocol according to information of a data provider, a data consumer and a data use request, wherein the data protocol generation means that: invoking a convention protocol matched with the identity information of the data provider and the data user and the target data of the data use request from a convention protocol library preset by the data community;
a data circulation step, wherein the data provider provides data under the constraint of the data protocol, and the data user uses the data under the constraint of the data protocol;
the data circulation step further comprises a third party confirmation step executed before providing the data, verification information is generated according to a data use request initiated by the data user, the verification information is sent to one or more main bodies in the data community except the data provider and the data user for third party verification, and if the verification result of the third party verification is verification passing, the data circulation step is executed.
Further, in the third party confirmation step, verification information is specifically generated according to the data use request initiated by the data user: generating a plurality of key fragments through a preset threshold key sharing algorithm, wherein each key fragment is used as the main body remained in the verification information transmitting data community for verification.
Further, generating a plurality of key fragments by a preset threshold key sharing algorithm specifically: the data provider carries out confusion processing on the data use request information and the private key of the requested data to obtain a check code, the check code is segmented into a plurality of key fragments, two sections are stored in an encrypted mode by the data provider, two sections are stored in an encrypted mode by the third party, and one section is overlapped with the other section.
Further, the data provider encrypts the data to be sent by using the certificate public key stored by the third party, the data user acquires the decoding key from the third party by using the data use request information to receive the data, decrypts the data encrypted by the certificate public key, and then decrypts the received data by using the decrypted private key.
Further, in the data supply step, the data provider further performs a key sharing step of: generating a plurality of key fragments from the published data album information through a preset threshold key sharing algorithm, and respectively transmitting each key fragment to other main bodies in the data community; in the third party confirmation step, generating verification information according to the data use request initiated by the data user refers to retrieving key fragments of the data provider and the data user, and the third party verification refers to recovering the key through the key fragments of the third party and the key fragments of the data provider and the data user, and if the recovery is successful, the verification result of the third party verification is verification passing.
Further, the third party includes one or more of a data operator, a data service, and a data supervisor.
Further, the identity of the third party is not fixed.
Further, the data uploaded by the data provider are stored in an exclusive data space, and the exclusive data space opens the data request authority according to the setting of the data provider.
In a second aspect, there is also provided a computer readable storage medium storing a computer program which, when executed by a processor, is capable of implementing the above-described convention protocol-based multi-body data community construction method.
In a third aspect, a system for constructing a multi-body data community based on a convention protocol is provided, including a data request end, a data providing end, a processor, and the computer readable storage medium, where a computer program is executable by the processor.
According to the method for constructing the multi-subject data community based on the convention protocol, all subjects of the data community are incorporated into the alliance, and a new mode of data circulation operation is constructed jointly. The alliance body issues own data album to the data community data space through the exclusive client, and other bodies can view all the data catalogs in the platform and select the data catalogs according to the requirement. After determining the data requirement, the platform can negotiate the data protocol used together with the data provider, and the data can be used under the constraint of the protocol. The data uploaded by the data provider can form an exclusive data space, the authority of the data space can be controlled, and all operations of the data space are recorded in the blockchain and can be checked at any time. All data and services sent out from the platform are in compliance examination of the platform, so that the data is ensured not to be divulged.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the description of the embodiments will be briefly described below.
FIG. 1 is a flow chart of the steps of the convention-based multi-principal data community construction method.
Fig. 2 is a schematic diagram of a data community relationship of the convention-based multi-body data community construction method.
Fig. 3 is a schematic diagram of the coordination relationship of the convention-based multi-body data community construction method.
Fig. 4 is a schematic diagram of a data channel of the convention-based multi-body data community construction method.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The system for constructing the multi-subject data community based on the convention protocol of the present embodiment includes a data request end, a data providing end, a processor and a computer readable storage medium connected with the processor, wherein the computer readable storage medium stores a computer program in advance, and the computer program when executed by the processor realizes the method for constructing the multi-subject data community based on the convention protocol of the present embodiment, see fig. 1.
The specific steps are described below.
The multi-principal data community mechanism of this embodiment, see fig. 2, each principal participates in data sharing as a federation member, and in data sharing activities, each principal respectively acts as 5 primary identities of a data provider, a data consumer, a data operator, a data service, and a data supervisor when performing different functions, see fig. 3. The data provider performs data supply and data right confirmation to ensure the data quality and reliability; the data user is responsible for data cleaning, algorithm design, model development, application development and the like; the data operator is responsible for data operation, including data classification, standard formulation, quality control, data security compliance and the like; the data service side provides data processing service, data estimation, legal suggestion, consultation service and the like; the data supervisor supervises the data circulation process.
And a data supply step, wherein each data provider issues own data list to the data space of the data community, thereby forming a data catalog. The data uploaded by the data provider can form an exclusive data space, the authority of the data space can be controlled, and all operations of the data space are recorded in the blockchain and can be checked at any time.
And a data request step of generating a data use request according to the selection operation of the data directory by the data use party.
In order to ensure safe and reliable circulation of data, a data provider and a data consumer both provide data and use data through a data client established by a data community mechanism, see fig. 4, a data interaction channel adopts different encryption technologies according to data requirements to establish different data channels, including a fusion channel, a point-to-point channel, a block chain, privacy calculation and the like.
And a data protocol step of generating a data protocol according to the information of the data provider, the data consumer and the data use request. The generated data protocol refers to: and invoking a convention protocol matched with the identity information of the data provider and the data user and the target data of the data use request from a convention protocol library preset by the data community. The identity information of the data provider and the data consumer is used to confirm the data consumer's right to use the data of the data provider, the target data is pre-set with privacy/privacy levels matching with the respective convention protocols, and these information are autonomously configured in the data community system by the administrator.
The parties together adhere to an convention protocol according to which they each perform to form a data community that provides the government, business, organization and individual with the required data demand services. The data community data flow is supported by a convention protocol based on a platform, and has flexibility and scene suitability. The convention protocols of the convention protocol library comprise a data conditional use protocol, a multiparty secure computing protocol, a federal learning protocol or a data unconditional use protocol.
Data conditional use protocol: the transmission of authorization data from the data provider-specific data space to the data consumer-specific space can be achieved, but the data cannot be derived from the data community platform, only supporting the consumer to complete the construction of the model or service in the platform. The finished API service parameters also do not contain sensitive data.
Multiparty secure computing protocol: when the business scene requires a plurality of organization data to be completed together, the protocol can be used for realizing model training and service construction in the platform together and providing the model service mode for the application scene. The service provided does not contain party data. In the model construction process, related participants form a data community based on a usage scene, and data in the data community is isolated from other data communities. The participants can call other enterprises to participate in the construction of the model according to the data requirements.
Federal learning protocol: the data demand party adopting the protocol provides the model to be trained for the data provider based on the self requirement, and the data provider completes model training in the own data space and provides the model to the data demand party. The data provider may be one or more, and may be determined by the data demander. After training of the model is completed, the data demander can select whether to query the data provider service according to the protocol when the model is externally served so as to ensure the accuracy of the model. The externally provided service needs to be subjected to compliance examination to ensure that the data is not compromised.
Data unconditional use protocol: when the agreement is adopted among enterprises, the platform can run the data of the data provider to finish domain output through the exclusive space of the data demander, and the domain output process strictly audits whether the provided content is authorized or not.
And the third party confirmation step is also included, verification information is generated according to the data use request initiated by the data use party, the verification information is sent to one or more main bodies which are remained in the data community except the data provider and the data use party, and the data transaction is established after the verification information is verified by the third party.
In the third party confirmation step, verification information is specifically generated according to a data use request initiated by a data user: generating a plurality of key fragments through a preset threshold key sharing algorithm, wherein each key fragment is used as verification information to send the rest main body in the data community for verification. Generating a plurality of key fragments by a preset threshold key sharing algorithm, specifically: the data provider carries out confusion processing on the data use request information and the private key of the requested data to obtain a check code, the check code is segmented into a plurality of key fragments, the data provider stores two sections in an encrypted mode, the third party stores two sections in an encrypted mode, and one section of the two sections is overlapped. The data provider encrypts the data to be sent by using the public key of the certificate stored by the third party, the data user acquires the decoding key from the third party by using the data use request information to receive the data, decrypts the data encrypted by the public key of the certificate, and then decrypts the received data by using the decrypted private key. The safe transmission of data is realized.
The method for constructing the multi-subject data community based on the convention protocol in the embodiment aims to bring all subjects into the alliance to jointly construct a new mode of data circulation operation. The alliance body issues own data album to the data community data space through the exclusive client, and other bodies can view all the data catalogs in the platform and select the data catalogs according to the requirement. After determining the data requirement, the platform can negotiate the data protocol used together with the data provider, and the data can be used under the constraint of the protocol. The data uploaded by the data provider can form an exclusive data space, the authority of the data space can be controlled, and all operations of the data space are recorded in the blockchain and can be checked at any time. All data and services sent out from the platform are in compliance examination of the platform, so that the data is ensured not to be divulged.
Further, in the data supply step, the data provider further performs a key sharing step of: generating a plurality of key fragments from the published data album information through a preset threshold key sharing algorithm, and respectively transmitting each key fragment to other main bodies in the data community; in the third party confirmation step, generating verification information according to the data use request initiated by the data user refers to retrieving key fragments of the data provider and the data user, and the third party verification refers to recovering the key through the key fragments of the third party and the key fragments of the data provider and the data user, and if the recovery is successful, the verification result of the third party verification is verification passing.
The threshold key sharing algorithm generates n=8 key fragments, and k=5 key fragments can be collected to recover the key. The data supervisor must receive 1 key fragment and the data supervisor provides 1 key fragment with verification that the data consumer information is correct. The data provider reserves 3 key fragments, and the data provider provides corresponding number of key fragments according to the identity information of the data user and the data provider, such as authority level: the authority level of the data user is higher than that of the data provider, and the data provider provides 3 key fragments; the authority level of the data user is the same as that of the data provider, and the data provider provides 2 key fragments; the rights level of the data consumer is lower than the data provider, who provides 1 key fragment. And the rest 4-6 key fragments are sent to the main body associated with the data in the community in a mode of one part of each main body, the main body is provided with data sources, data application objects and data service objects, and when the main body number exceeds the key fragment number, the key fragments are distributed in a mode of importance degree sequence or random. The lower the authority level of the data user is, the more third parties are required to support, and the security and the credibility of the data circulation are realized.
According to the method for constructing the multi-subject data community based on the convention protocol, sharing circulation of multi-subject data can be achieved by introducing a data community mechanism based on the convention protocol, credibility and safety of the data can be guaranteed by establishing a data client, a data safety channel and the like, meanwhile, use of the data can be monitored, traceability and abuse prevention can be achieved, efficient circulation of data elements can be achieved, required data service is provided for governments, enterprises, organizations and individuals, and economic benefits are truly produced for the data.
The present embodiment implements the foregoing convention-based multi-body data community construction method by a computer program stored in a computer-readable storage medium for execution by a computer processor to implement the foregoing convention-based multi-body data community construction method. The embodiments of the convention-based multi-principal data community building system described above are illustrative only, in that the modules illustrated as separate components may or may not be physically separate, and the components shown as the modules may or may not be physical modules, i.e., may be located in one place, or may be distributed across multiple network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
Finally, it should be noted that: the disclosure of the method for constructing the multi-body data community based on the convention protocol in the embodiment of the invention is only a preferred embodiment of the invention, and is only used for illustrating the technical scheme of the invention, but not limiting the technical scheme; although the invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that; the technical scheme recorded in the various embodiments can be modified or part of technical features in the technical scheme can be replaced equivalently; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (9)

1. A method for constructing a multi-subject data community based on a convention protocol, the data community comprising three or more subjects, the method comprising the steps of:
a data supply step, wherein each data provider issues own data list to the data space of the data community, so as to form a data catalog;
in the data supply step, the data provider further performs a key sharing step of: generating n key fragments from the published data list information through a preset threshold key sharing algorithm, and respectively transmitting each key fragment to other main bodies in a data community; the data supervisor must receive 1 key fragment, and the data provider itself reserves a plurality of the remaining key fragments;
a data request step of generating a data use request according to the selection operation of the data directory by the data use party;
a data protocol step of generating a data protocol according to information of a data provider, a data consumer and a data use request, wherein the data protocol generation means that: invoking a convention protocol matched with the identity information of the data provider and the data user and the target data of the data use request from a convention protocol library preset by the data community;
a data circulation step, wherein the data provider provides data under the constraint of the data protocol, and the data user uses the data under the constraint of the data protocol;
the data circulation step further comprises a third party confirmation step executed before providing the data, wherein verification information is generated according to a data use request initiated by the data user, the verification information is sent to one or more main bodies in the data community except the data provider and the data user for third party verification, and if the verification result of the third party verification is verification passing, the data circulation step is executed;
in the third party confirmation step, generating verification information according to the data use request initiated by the data user refers to retrieving key fragments of the data provider and the data user, and the data provider specifically provides a corresponding number of key fragments according to the authority levels of the data user and the data provider, wherein the higher the authority level of the data user is, the more the number of key fragments the data provider provides; the third party verification means that the key is recovered through the key fragments of the third party and the key fragments of the data provider and the data consumer, wherein the key fragments of the third party comprise 1 key fragment provided by the data supervisor under the condition of verifying that the information of the data consumer is correct; and collecting k preset key fragments smaller than or equal to n, recovering the key, and if the key fragments are successfully recovered, verifying the third party by the third party, wherein the verification result is verification passing.
2. The method for constructing a multi-principal data community based on an convention protocol according to claim 1, wherein in the data protocol step, the convention protocol of the convention protocol library includes a data conditional use protocol, a multiparty secure computing protocol, a federal learning protocol or a data unconditional use protocol.
3. The method for constructing a multi-body data community based on a convention protocol according to claim 1, wherein in the third party confirmation step, verification information is specifically generated according to a data use request initiated by the data user: generating a plurality of key fragments through a preset threshold key sharing algorithm, wherein each key fragment is used as the main body remained in the verification information transmitting data community for verification.
4. The method for constructing a multi-body data community based on a convention protocol according to claim 3, wherein the generating of the plurality of key fragments by the preset threshold key sharing algorithm is specifically: the data provider carries out confusion processing on the data use request information and the private key of the requested data to obtain a check code, the check code is segmented into a plurality of key fragments, two sections are stored in an encrypted mode by the data provider, two sections are stored in an encrypted mode by the third party, and one section is overlapped with the other section.
5. The method of claim 4, wherein the data provider encrypts the data to be transmitted using a certificate public key stored by a third party, the data consumer obtains the decoding key from the third party using the data use request information to receive the data, decrypts the data encrypted by the certificate public key, and decrypts the received data using the decrypted private key.
6. The method of claim 1, wherein the third party comprises one or more of a data operator, a data service, and a data supervisor.
7. The method for constructing a multi-body data community based on an agreement according to claim 1, wherein the data uploaded by the data provider is stored in a proprietary data space, and the proprietary data space opens the data request authority according to the setting of the data provider.
8. A computer readable storage medium storing a computer program, wherein the computer program is capable of implementing the convention-based multi-body data community construction method of any one of claims 1 to 7 when executed by a processor.
9. The system is characterized by comprising a data request end, a data providing end and a processor; also included is a computer readable storage medium as claimed in claim 8, on which computer program is executable by the processor.
CN202310760222.2A 2023-06-27 2023-06-27 Multi-subject data community construction method, medium and system based on convention protocol Active CN116506123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310760222.2A CN116506123B (en) 2023-06-27 2023-06-27 Multi-subject data community construction method, medium and system based on convention protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310760222.2A CN116506123B (en) 2023-06-27 2023-06-27 Multi-subject data community construction method, medium and system based on convention protocol

Publications (2)

Publication Number Publication Date
CN116506123A CN116506123A (en) 2023-07-28
CN116506123B true CN116506123B (en) 2023-09-15

Family

ID=87325161

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310760222.2A Active CN116506123B (en) 2023-06-27 2023-06-27 Multi-subject data community construction method, medium and system based on convention protocol

Country Status (1)

Country Link
CN (1) CN116506123B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326337A (en) * 2018-09-06 2019-02-12 西安电子科技大学 Electronic medical record storage and shared model and method based on block chain
CN110071969A (en) * 2019-04-17 2019-07-30 杭州云象网络技术有限公司 A kind of data safety sharing method based on multichain framework
CN110740033A (en) * 2019-08-19 2020-01-31 杭州云象网络技术有限公司 block chain multi-party data sharing method based on secret sharing technology
US11057210B1 (en) * 2015-09-30 2021-07-06 Apple Inc. Distribution and recovery of a user secret
CN113656829A (en) * 2021-07-22 2021-11-16 北京理工大学 Medical data security sharing method based on lattice code and alliance chain
CN113783836A (en) * 2021-08-02 2021-12-10 南京邮电大学 Internet of things data access control method and system based on block chain and IBE algorithm
CN114422125A (en) * 2021-12-30 2022-04-29 张海滨 Secret data sharing method, secret key generating method and distributed system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10673626B2 (en) * 2018-03-30 2020-06-02 Spyrus, Inc. Threshold secret share authentication proof and secure blockchain voting with hardware security modules

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11057210B1 (en) * 2015-09-30 2021-07-06 Apple Inc. Distribution and recovery of a user secret
CN109326337A (en) * 2018-09-06 2019-02-12 西安电子科技大学 Electronic medical record storage and shared model and method based on block chain
CN110071969A (en) * 2019-04-17 2019-07-30 杭州云象网络技术有限公司 A kind of data safety sharing method based on multichain framework
CN110740033A (en) * 2019-08-19 2020-01-31 杭州云象网络技术有限公司 block chain multi-party data sharing method based on secret sharing technology
CN113656829A (en) * 2021-07-22 2021-11-16 北京理工大学 Medical data security sharing method based on lattice code and alliance chain
CN113783836A (en) * 2021-08-02 2021-12-10 南京邮电大学 Internet of things data access control method and system based on block chain and IBE algorithm
CN114422125A (en) * 2021-12-30 2022-04-29 张海滨 Secret data sharing method, secret key generating method and distributed system

Also Published As

Publication number Publication date
CN116506123A (en) 2023-07-28

Similar Documents

Publication Publication Date Title
EP3219049B1 (en) Account recovery protocol
CN106104562B (en) System and method for securely storing and recovering confidential data
CN102932136B (en) Systems and methods for managing cryptographic keys
CN101981889B (en) Secure communications in computer cluster systems
CN109462472A (en) The methods, devices and systems of data encryption and decryption
US9608813B1 (en) Key rotation techniques
CN101401341B (en) Secure data parser method and system
US10630486B2 (en) Multiparty computation for approving digital transaction by utilizing groups of key shares
EP3469761A1 (en) Secure data exchange
CN114730420A (en) System and method for generating signatures
US11057210B1 (en) Distribution and recovery of a user secret
CN113127916A (en) Data set processing method, data processing device and storage medium
US11367065B1 (en) Distributed ledger system for electronic transactions
CN113411187B (en) Identity authentication method and system, storage medium and processor
CN110910978A (en) Information processing method applied to block chain network and related device
CN113239403A (en) Data sharing method and device
CN112651049B (en) Privacy data sharing method and system based on block chain
WO2022240425A1 (en) Delegation method and delegation request managing method
CN106412087A (en) Method and system for sharing ownership proofs
CN116992458A (en) Programmable data processing method and system based on trusted execution environment
Parthasarathy et al. Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation
CN100459495C (en) Password dynamic enciphering inputmethod of public emipering mode
CN105471896B (en) Proxy Method, apparatus and system based on SSL
CN116502732B (en) Federal learning method and system based on trusted execution environment
CN116506123B (en) Multi-subject data community construction method, medium and system based on convention protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant