A method and device for encryption, key information provision and data acquisition
An encryption method and key technology, applied in the field of information, to achieve the effect of reducing security risks, reducing the number of communications, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0169] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0170] The cloud platform provides various cloud services to network users, and network users who apply cloud services become cloud users. The cloud users in this embodiment of the application include: a data owner, a trusted server, a data requester, and a cloud server. Each cloud user has a unique identifier, which can be represented by an ID. In the embodiment of this application, UID 0 As the identifier of the data owner, UID u (u is a positive integer greater than 0) as the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


