Encryption method, device, system, equipment and medium based on user identity

A technology of user identity and encryption method, applied in the field of data business, can solve problems such as hidden dangers of data security, and achieve the effect of ensuring security and improving the utilization rate of storage resources

Active Publication Date: 2021-02-26
北京中测安华科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] While cloud storage brings great convenience to users, it also creates some hidden dangers to data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, device, system, equipment and medium based on user identity
  • Encryption method, device, system, equipment and medium based on user identity
  • Encryption method, device, system, equipment and medium based on user identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0059] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method, apparatus, a system, a device and a medium based on a user identity. The method comprises the following steps of: generating a user's private key according to the user's identity attribute information, preset bilinear mapping parameters and preset encryption function; According to bilinear mapping parameter and encryption function, the user's plaintextdata is encrypted offline, and the offline ciphertext of plaintext data is obtained. Sending the offline ciphertext to the cloud server to enable the cloud server to encrypt the offline ciphertext online and obtain the final ciphertext; Download the final ciphertext and decrypt the final ciphertext according to the user's private key to obtain the decryption result. The encryption method, the device, the system, the equipment and the medium based on the user identity provided by the embodiment of the invention ensure the safety of the user data and improve the utilization rate of the storageresources of the cloud server.

Description

technical field [0001] The present invention relates to the field of data services, in particular to an encryption method, device, system, equipment and medium based on user identity. Background technique [0002] With the rapid development of computer technology, data transmission and computing capabilities have been greatly improved, and the amount of user data is also increasing day by day, so more and more users and enterprises tend to migrate large amounts of data to the cloud for storage. [0003] While cloud storage brings great convenience to users, it also creates some data security risks. For example, cloud service providers or other illegal intruders steal and misuse users' cloud data. Security technologies such as data encryption, access control, and digital authentication are widely used to protect cloud storage data. [0004] For the existing data encryption and decryption technologies, it is more reasonable to perform the encryption and decryption process on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 梁露露常文娟宋岩蔚
Owner 北京中测安华科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products