Application-oriented ciphertext search method, apparatus and system, and agent server

An application-oriented and application-service-oriented technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of staying in the theoretical stage, poor security, and difficult implementation, so as to reduce software and hardware requirements and ensure security , to achieve the effect of transparency

Active Publication Date: 2017-12-12
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These ciphertext search methods mainly have the following problems: (1) In order to realize data search on ciphertext, many ciphertext search technologies adopt special encryption methods (general encryption algorithms with guaranteed strength are no longer applicable), and to a certain extent (2) The current ciphertext search technology only realizes the most basic search function, and the original advanced search ciphertext functions such as multi-keyword search and fuzzy search are only at the theoretical stage and cannot be practiced.
Moreover, academic research on ciphertext search at home and abroad generally has problems such as lack of functions, low search efficiency, or poor security, and even needs to change applications and user habits, which is difficult to implement in actual scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application-oriented ciphertext search method, apparatus and system, and agent server
  • Application-oriented ciphertext search method, apparatus and system, and agent server
  • Application-oriented ciphertext search method, apparatus and system, and agent server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0057] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0058] Refer to attached figure 1 Shown is a flow chart of an application-oriented ciphertext search method according to an embodiment of the present invention. In one embodiment of the present invention, the application-oriented ciphertext search method includes the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application-oriented ciphertext search method. The method comprises the steps of receiving an application data uploading request sent by a user end; analyzing the application data uploading request to obtain user application data, determining user sensitive data in the user application data and performing caching; encrypting the user sensitive data in the user application data to obtain ciphertext data, and sending the ciphertext data to an application service end; receiving response data returned by the application service end, extracting first metadata information in the response data, and according to the user sensitive data and the first metadata information, establishing a first search index; receiving a data search request sent by the user end; analyzing the data search request to obtain a keyword, and performing a search in the first search index by using the keyword to obtain a search result; and returning the search result to the user end. According to the method, a special encryption client does not need to be configured; full text search of a ciphertext is supported; transparent data encryption and ciphertext search are realized; and the functionality, efficiency and security of the ciphertext search are ensured.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to an application-oriented ciphertext search method, device, proxy server and system. Background technique [0002] With the continuous growth of data volume and the popularization of cloud computing models, more and more organizations, institutions and enterprises have begun to hand over data to specialized service providers for unified data management, or directly use application services operated by service providers. However, in this mode, the separation of user data ownership and management rights leads to frequent data privacy leakage incidents, and the issue of user privacy protection needs to be resolved urgently. Commonly used cloud services such as email applications, cloud storage applications, CRM applications, and ERP applications all have security risks of user data privacy leakage. [0003] At present, the way to deal with this kind of hidden danger gener...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/08H04L29/06
CPCG06F21/602H04L9/0861H04L63/08H04L63/10
Inventor 刘川意潘鹤中王春露王国峰韩培义林杰
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products