Unlock instant, AI-driven research and patent intelligence for your innovation.

A related method, system and related apparatus for accessing encrypted data

A technology for encrypting data and accessing systems, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problem of leakage of encrypted data and encryption keys, poor flexibility, timeliness and management, and inability to effectively protect encrypted data, etc. problems, to reduce the risk of leakage and improve flexibility

Inactive Publication Date: 2021-05-28
中航信托股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found through research that in the prior art, relevant nodes obtain encrypted data and encryption keys for private transactions in advance through P2P connection sharing, that is, relevant nodes have encrypted access authorization, and there is leakage of encrypted data and encryption keys Risks, unable to effectively protect encrypted data; and in the process of blockchain data broadcasting, whether the relevant nodes have encrypted access authorization has been fixed, once authorized, it cannot be withdrawn, poor flexibility, timeliness and management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A related method, system and related apparatus for accessing encrypted data
  • A related method, system and related apparatus for accessing encrypted data
  • A related method, system and related apparatus for accessing encrypted data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0070] Generally, the confidentiality of the on-chain business data of the consortium chain formed by the financial industry is extremely high, and it is necessary to control the access to encrypted data between the participants of the consortium chain. Business stakeholders can access the business data that is uploaded by multiple other business stakeholders. , no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a related method, system and related device for accessing encrypted data. The method includes: the first key management center receives the encrypted data access request including the encrypted ID and the first identity ID and sends it to the authorization center; if the authorization center According to the first identification, it is judged that the second client authorizes the encrypted access authority corresponding to the encrypted identification of the first client, and then sends it to the second key management center; the second key management center obtains the first encrypted data and the encrypted key according to the encrypted identification. Key, and decrypt to obtain the decrypted data, use the first public key to encrypt and decrypt the data to obtain the second encrypted data and send it to the first key management center; the first key management center decrypts the second encrypted data according to the first private key to obtain the decrypted data and send it to the first client. It can be seen that using the authorization judgment of the authorization center improves the flexibility, timeliness and management of encrypted access authorization, effectively protects the original encrypted data, and reduces the risk of leakage caused by the shared encryption key.

Description

technical field [0001] This application relates to the technical field of blockchain information security, in particular to a related method, system and related device for accessing encrypted data. Background technique [0002] At this stage, with the development of science and technology, based on the combination of modern cryptography, distributed consensus protocol, point-to-point network communication technology and smart contract programming language, the blockchain technology realizes data exchange, processing and storage among multiple participants. Its application is becoming more and more widespread, and it has the characteristics of distributed, open and transparent, non-tamperable, collective maintenance, and privacy protection. The mainstream blockchain is divided into three types: public chain, private chain and alliance chain. Among them, the alliance chain is formed through certain interest cooperation, and each participant in the alliance chain has strong dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L9/0861H04L63/0876H04L63/10
Inventor 潘云鹏
Owner 中航信托股份有限公司