List query method, query device, server device and storage medium

A query-side and service-side technology, applied in the field of information security, can solve the problems of large amount of processed data, high use cost, low query efficiency, etc., and achieve the effect of protecting private information, small data amount, and improving query efficiency

Active Publication Date: 2021-03-02
WELAB INFORMATION TECH SHENZHEN LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, a variety of encryption algorithms can be used to solve the above problems, but the common problem of these algorithms is: since all the data sets involved in the calculation are generally encrypted and exchanged with each other to complete the query, it is usually necessary for both parties to exchange a large amount of data. The amount of data is large; and the existing encryption algorithm takes a long time to calculate, which leads to low query efficiency, is not suitable for ordinary business systems, and has high usage costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • List query method, query device, server device and storage medium
  • List query method, query device, server device and storage medium
  • List query method, query device, server device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] It should be noted that the descriptions involving "first", "second", etc. in the present invention are only for descriptive purposes, and should not be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features . Thus, the features defined as "first" and "second" may explicitly or implicitly include at least one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method for querying a list, an inquiring device, a server device and a storage medium. The method includes: the inquiring device encrypts personal information to be queried based on a first private key and a predetermined exchangeable encryption algorithm to obtain a first encryption desensitization processing to obtain the desensitization information; the server device queries the list based on the plaintext part of the desensitization information, and obtains a subset of the list; Encrypt to obtain the first encrypted subset, and encrypt the first encrypted information based on the second private key and the exchangeable encryption algorithm to obtain the second encrypted information; the inquiring device based on the first private key and the exchangeable encryption algorithm Encrypt each piece of data in the set to obtain a second encrypted subset, and determine whether the personal information exists in the list based on the second encrypted subset and the second encrypted information. The invention can improve the efficiency of list query.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method for querying a list, an inquiring party device, a server device and a storage medium. Background technique [0002] With the development of the mobile Internet, more and more personal privacy information is collected, transmitted, calculated, and exchanged to improve service quality. However, this also raises a large number of problems about personal privacy being leaked. For example, an institution provides an inquiry interface to another institution to inquire whether the queried person is in the list. Such a list is composed of a class of individual groups with the same characteristics, such as members and blacklists. The conventional query interface needs to provide the personal identification information PII (Personally Identifiable Information) of the person being queried. Taking the blacklist as an example, the personal identification informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6227G06F21/6254
Inventor 吴焕明王文超林俊良
Owner WELAB INFORMATION TECH SHENZHEN LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products