Spatial data safety system based on access mode protection
A technology for spatial data and security systems, applied in the field of information security, can solve problems such as lack of good solutions, and achieve the effect of reducing complexity and avoiding the risk of leaking secrets
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] Such as Figure 4 As shown, in this embodiment, when the client C obtains an id from the server S, it needs to be decrypted and re-encrypted when the client returns data from the server, specifically:
[0048] Step 1. The execution end judges whether v exists in the hierarchical list L
[0049] Step 2. When v exists in L:
[0050] 2.1) For each layer in L, client C sends a data item query command to server S to get a masquerade data number The corresponding data value, and ignore the data value when received.
[0051] 2.2) Send data item query command Get(PRP s (v)), and receive the result b returned by the server S.
[0052] 2.3) Execute encrypted transmission processing shelterInsert(v,b).
[0053] 2.4) will decrypt SK (b) Return to the user as a result.
[0054] Step 3. When v does not exist in L:
[0055] 3.1) Let l be the highest layer in the layer where the item with id v in L is located.
[0056] 3.2) For each layer i≠l in L, the client sends a requ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 