Privacy character information encryption inquiry method and system

A character information, encrypted query technology, applied in the field of private character information encrypted query methods and systems, can solve the problems of reducing the flexibility and security of the method, and achieve the effects of coordinating security and efficiency and improving data query efficiency.

Active Publication Date: 2017-06-13
上海静客网络科技有限公司
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the index generation scheme given by this work is too simple, which seriously reduces the flexibility and security of the method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy character information encryption inquiry method and system
  • Privacy character information encryption inquiry method and system
  • Privacy character information encryption inquiry method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] A private character information encryption query method, comprising the following steps:

[0118] (1) Data encryption: the plaintext tuple submitted by the trusted client is converted into a ciphertext tuple; the plaintext tuple contains a privacy field, and its value is preferably a character string; the ciphertext tuple includes ciphertext data and index data;

[0119] The conversion of the private character string in clear text form submitted by the trusted client into cipher text data is specifically:

[0120] For contact information in plain text R(A 1 ,A 2 ,...,A r ,…), where A r It is a mobile phone number in plain text, a string type, consisting of 11 characters, of which the first 2 characters can only be 13, 15, 17 or 18, and the remaining 9 characters can be any value from characters 0 to 9. The encrypted ciphertext tuple is where R E The new ciphertext field in Its type is preferably binary, used to store the ciphertext data encrypted by the entire...

Embodiment 2

[0166] An encrypted query of private character information, including a data encryption component, a query conversion component, a data decryption component, and a data screening component;

[0167] The data encryption component is used to convert the plaintext tuple submitted by the trusted client into a ciphertext tuple; the plaintext tuple contains a privacy field, and its value is preferably a character string; the ciphertext tuple includes a ciphertext data and index data;

[0168] The query conversion component is used to convert the original query condition into the index query condition, and use the tuple set composed of the ciphertext tuple whose index data satisfies the index query condition as the related ciphertext tuple set, so that the related ciphertext tuple set The text tuple set is a superset of the ciphertext tuple set converted from the original query result;

[0169] The query conversion component includes a precise query subcomponent, a fuzzy query subco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy character information encryption inquiry method and system. The privacy character information encryption inquiry method comprises the following steps: (1) data encryption: converting the plaintext tuples submitted by a trusted client to ciphertext tuples; wherein the plaintext tuple comprises privacy fields; and the ciphertext tuple comprises the ciphertext data and the index data; (2) query conversion: converting the raw query condition to an index query condition, and taking the tuple set composed of the ciphertext tuples whose index data satisfies the index query condition as the relevant ciphertext tuple set; (3) data decryption: decrypting the relevant ciphertext tuple set to obtain temporary results in plaintext form; (4) data screening: executing the raw query condition to obtain the target plaintext tuple set. The privacy character information encryption inquiry system comprises a data encryption component, a query conversion component, a data decryption component and a data screening component. Compared with the prior method, the privacy character information encryption inquiry method disclosed by the invention is more flexible and safer.

Description

technical field [0001] The invention belongs to the field of encryption, and more specifically relates to a method and system for encrypting and querying private character information. Background technique [0002] With the rapid development of Internet technology, cloud database service, as a new type of data service form, is more and more popular and widely used due to its advantages of high flexibility and low cost, such as in various enterprise information management systems . However, unlike traditional databases, because cloud databases are deployed on untrusted clouds, this poses a serious security threat to various user privacy information (such as personal phone numbers, ID numbers, etc.) in enterprise information management systems. More importantly, this security threat cannot be solved by traditional database security policies (such as identity authentication, authorized access, etc.), nor can it be solved by traditional data encryption technology (after encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06G06F17/30
CPCG06F16/134H04L9/0618H04L9/065H04L9/0819H04L63/0428
Inventor 吴宗大郑城仁江芳
Owner 上海静客网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products