Data broadcasting distribution protection method based on proxy re-encryption and security chips
A proxy re-encryption and security chip technology, which is applied in the fields of data distribution protection and data broadcast distribution protection, can solve the problems of high implementation cost and insufficient protection, and achieve the effect of strong protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The present invention will be described in detail below through specific embodiments and in conjunction with the accompanying drawings.
[0034] figure 1 It is a schematic diagram of the participants and the implementation flow of the data broadcast distribution protection method based on proxy re-encryption and security chip of this embodiment. The sequence of each step is not marked in the figure, mainly because the sequence of some steps is not strictly limited. For example, a data user may download data first and then register, or may first register and then download data.
[0035] The data broadcast distribution protection method of this embodiment includes the following specific steps:
[0036] 1) The premise is that the data owner wants to distribute his own data d, and requires that only the platform configured to meet the specific integrity PI can get d, where PI represents the specific configuration that the data owner believes can supervise and restrict the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com