Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted computing method and system

A technology of trusted computing and computing services, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as reduced computing performance, inability to apply large-scale applications, and large computing overhead, so as to reduce computing performance and improve reliability. Scalability, saving storage costs

Active Publication Date: 2020-02-28
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned trusted computing solution uses homomorphic encryption technology in the cloud, and calculates and analyzes data directly based on the ciphertext data sent by the data holder, so as to ensure the security of the data, but the calculation is complex and the amount of calculation is large , will generate large computing overhead, especially when the amount of data is large, it will seriously reduce the overall computing performance, which in turn will affect the generality of the scheme and cannot be applied on a large scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing method and system
  • Trusted computing method and system
  • Trusted computing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be further described in detail below with reference to the accompanying drawings and examples.

[0056] figure 1 It is a schematic flow chart of the method of the embodiment of the present invention. Such as figure 1 As shown, the trusted computing method implemented in this embodiment mainly includes the following steps:

[0057] Step 101: After passing the legality verification of the trusted computing environment of the cloud server and the trusted computing function library, the data user generates data calculations within the corresponding authorized scope according to the data access authorization information obtained from the third-party authorized authentication center. The task is sent to the computing service provider; the cloud server is provided by the computing service provider.

[0058] In this step, after the data user deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted computing method and system, and the method comprises the steps that a data user generates a data operation task in an authorization range after the validity verification of a trusted computing environment and a trusted computing function library of a cloud server is passed, and transmits the data operation task to a computing service provider; the computing service provider obtains the ciphertext of the required data and the ciphertext of the corresponding key according to the data operation task, and stores the ciphertext of the required data and the ciphertext of the corresponding key to the cloud server; a data user adopts a safe transmission mode to send a calculation private key for decrypting the ciphertext of the secret key to the cloud server, triggers the cloud server to obtain a plaintext of data required for task execution by using the calculation private key in the trusted computing environment, executes the data operation task by using the plaintext and the trusted computing function library, a corresponding execution result is encrypted and sent to the data user. According to the invention, the overall operation performance can be effectively improved.

Description

technical field [0001] The present application relates to the technical field of network computing security, in particular to a trusted computing method and system. Background technique [0002] Existing trusted computing schemes usually adopt multi-party computing, utilize cloud hardware-level trusted execution environment, and use hybrid computing based on partial homomorphic encryption technology and hardware-level trusted execution environment in the cloud to complete multi-party computing. Data analysis and computing tasks. [0003] During the process of implementing the present invention, the applicant found that the above-mentioned trusted computing solution has problems of poor performance and versatility. The specific reasons are analyzed as follows: [0004] The above-mentioned trusted computing solution uses homomorphic encryption technology in the cloud, and calculates and analyzes data directly based on the ciphertext data sent by the data holder, so as to ens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/00
CPCH04L63/10H04L63/20H04L63/0428H04L9/008H04L63/0823H04L2463/062H04L63/0442H04L9/088H04L9/321H04L9/0825
Inventor 吴初锚刘光磊
Owner SAMSUNG ELECTRONICS CHINA R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products