Unlock instant, AI-driven research and patent intelligence for your innovation.

A data sharing method and device

A data sharing and data technology, applied in the field of information security

Active Publication Date: 2019-04-12
CEC CYBERSPACE GREAT WALL
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a data sharing method and device for the above-mentioned defects in the prior art to solve the problem of how the data in the big data platform existing in the prior art can be changed safely and at any time Shared key, the problem of realizing data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data sharing method and device
  • A data sharing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] figure 1 A schematic flow chart of the data sharing method provided by the present invention, such as figure 1 The data sharing methods shown include:

[0033] Step S101, the first sharing module randomly generates a first random private key and a first random public key.

[0034]Specifically, the first random private key and the first random public key are keys randomly generated by the first sharing module and not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data sharing method. The method comprises following steps: a first sharing module randomly generates a first random private key and a first random public key, and sends the first random public key to a second sharing module such that the second sharing module adopts a pre-set key negotiation algorithm to calculate the first random public key and a second private key as well as identity information of the first sharing module and obtains a second median; the first sharing module receives the second median sent by the second sharing module and calculates a first median and compares the first median with the second median; the first sharing module calculates the first random public key and the second public key as well as the first median if the first median is the same as the second median in order to obtain a sharing key.The data sharing method and device have following beneficial effects: on the condition that data security of a big data platform is ensured, a safe and replaceable sharing key at any time can be provided.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data sharing method and device. Background technique [0002] With the continuous increase of data volume, structured data, semi-structured data and unstructured data are showing an exponential growth trend, and the existing storage methods can no longer meet the needs of users. Based on big data clusters, through the deployment of encryption modules and key centers, distributed storage and processing of massive data can be realized to ensure data security and prevent users' personal information from being mined through correlation analysis of massive data. [0003] Traditional storage and computing make the query and analysis of distributed stored big data slower and more difficult. Although the traditional encryption method based on public key algorithm can realize data encryption, decryption and digital signature, it consumes The time cost is high, the computin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/64H04L9/08
CPCG06F21/6218G06F21/6245G06F21/64H04L9/0838
Inventor 施光源张柯丽陈幼雷赵远杰
Owner CEC CYBERSPACE GREAT WALL