Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for encryption, key information provision and data acquisition

An encryption method and key technology, applied in the field of information, to achieve the effect of reducing security risks, reducing the number of communications, and improving security

Active Publication Date: 2022-03-22
PENG CHENG LAB
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there is currently no technology to generate different keys based on an updatable password input by the user, thereby encrypting data of different periods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for encryption, key information provision and data acquisition
  • A method and device for encryption, key information provision and data acquisition
  • A method and device for encryption, key information provision and data acquisition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0169] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0170] The cloud platform provides various cloud services to network users, and network users who apply cloud services become cloud users. The cloud users in this embodiment of the application include: a data owner, a trusted server, a data requester, and a cloud server. Each cloud user has a unique identifier, which can be represented by an ID. In the embodiment of this application, UID 0 As the identifier of the data owner, UID u (u is a positive integer greater than 0) as the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides an encryption method, a method for providing key information, and a method for obtaining information, wherein the data owner executes the encryption method and generates a key for each unit of time based on a password, thereby encrypting and uploading the data according to time series to the cloud server. The trusted server executes the key information providing method to provide trapdoor information, key parameters and hash parameters for the data requester. The data requester executes the information acquisition method, uses the key information to obtain the key of each unit duration within the authorization period, and uses the key to decrypt the ciphertext sent by the server.

Description

technical field [0001] The present application relates to the field of information technology, and more specifically, to a method and device for encryption, key information provision, and data acquisition. Background technique [0002] With the development of Internet technology, various clouds provide network users with low-cost data storage and computing advantages. Among them, the cloud can provide customers with a variety of basic services, such as office applications, infrastructure and various software design platforms. It can be seen that cloud-based applications can reduce the trouble of network users maintaining various resources on local devices, and provide highly scalable and reliable storage resources for public third-party service providers. Therefore, more and more data owners outsource a large amount of data resources to the cloud to reduce their local investment costs. [0003] However, because the data resources in the outsourcing method are not physicall...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14H04L9/32H04L9/40H04L67/06H04L67/10
CPCH04L9/0861H04L9/0863H04L9/14H04L9/3236H04L63/083H04L67/06H04L67/10H04L9/50
Inventor 刘鹏辉张宾张伟哲刘旭辉卢霄晗霍鹏磊
Owner PENG CHENG LAB