Data storage method and device for private data, and data reading method and device for private data

A privacy data, data storage technology, applied in the field of data security

Active Publication Date: 2020-04-07
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data viewer can read the private data in the highly available storage device, and there may be a need for multiple reads

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage method and device for private data, and data reading method and device for private data
  • Data storage method and device for private data, and data reading method and device for private data
  • Data storage method and device for private data, and data reading method and device for private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0108] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. It includes a first trusted computing unit 100 , a data manager 200 , a data viewer 300 and a data storage platform 400 . although figure 1 Only one trusted computing unit is shown in , but there are often multiple trusted computing units in actual scenarios. For data viewers, although figure 1 Only one data viewer is shown in , and there may be multiple data viewers in the actual scene.

[0109] The first trusted computing unit 100 can be used for data computing, wherein computing tasks can be executed. The hash value of the program code corresponding to the computing task running in the first trusted computing unit 100 may be called a code hash. The code hash can be used to identify computing tasks running in the trusted compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data storage method and device for private data, and a data reading method and device for private data. In the private data storage stage, a trusted execution environment TEE unit uses the determined key information to encrypt private data and stores the private data to a data storage platform; in the decryption key registration stage, the TEE unit uses the public key of the data management party to encrypt the decryption key of the private data and stores the decryption key to the data management party, and the data management party manages the decryption key; in the decryption key acquisition stage, the data viewer acquires a decryption key encrypted by adopting a public key of the data manager from the data manager, and decrypts the decryptionkey by adopting a corresponding private key to obtain a decryption key; and in the private data acquisition stage, the data viewer acquires the encrypted data from the data storage platform, and decrypts the encrypted data by using the obtained decryption key to obtain the private data.

Description

technical field [0001] One or more embodiments of this specification relate to the field of data security, and in particular to data storage and data reading methods and devices for private data. Background technique [0002] A trusted computing cluster is a computing cluster composed of multiple trusted computing units running in a trusted execution environment (Trusted Execution Environment, TEE). Trusted computing clusters can provide data computing services. The trusted computing unit has a certain isolation capability, thereby ensuring the security of data computing. After the trusted computing unit completes the calculation of the data, the private data generated during the calculation can be encrypted and stored in the highly available storage device. The data viewer can read the private data in the highly available storage device, and there may be a need for multiple reads. The trusted computing unit needs to provide the decryption key of the private data to the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/901G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06F2221/2141G06F16/901
Inventor 张宁王磊余超凡周爱辉
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products