A related method, system and related apparatus for accessing encrypted data
A technology for encrypting data and accessing systems, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problem of leakage of encrypted data and encryption keys, poor flexibility, timeliness and management, and inability to effectively protect encrypted data, etc. problems, to reduce the risk of leakage and improve flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0070] Generally, the confidentiality of the on-chain business data of the consortium chain formed by the financial industry is extremely high, and it is necessary to control the access to encrypted data between the participants of the consortium chain. Business stakeholders can access the business data that is uploaded by multiple other business stakeholders. , no...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


