Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data storage, data reading method and device for private data

A privacy data, data storage technology, applied in the field of data security

Active Publication Date: 2021-07-06
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data viewer can read the private data in the highly available storage device, and there may be a need for multiple reads

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage, data reading method and device for private data
  • Data storage, data reading method and device for private data
  • Data storage, data reading method and device for private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0108] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. It includes a first trusted computing unit 100 , a data manager 200 , a data viewer 300 and a data storage platform 400 . although figure 1 Only one trusted computing unit is shown in , but there are often multiple trusted computing units in actual scenarios. For data viewers, although figure 1 Only one data viewer is shown in , and there may be multiple data viewers in the actual scene.

[0109] The first trusted computing unit 100 can be used for data computing, wherein computing tasks can be executed. The hash value of the program code corresponding to the computing task running in the first trusted computing unit 100 may be called a code hash. The code hash can be used to identify computing tasks running in the trusted compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification provides a data storage and data reading method and device for private data. In the private data storage stage, the Trusted Execution Environment TEE unit uses the determined key information to encrypt the private data and stores it on the data storage platform; in the decryption key registration stage, the TEE unit uses the public key of the data manager to encrypt the decryption key of the private data. key and store it in the data management party, and the data management party manages the decryption key; in the decryption key acquisition stage, the data viewer obtains the decryption key encrypted with the data management party’s public key from the data management party, and uses the corresponding The private key is decrypted to obtain the decryption key; in the private data acquisition stage, the data viewer obtains the encrypted data from the data storage platform, and uses the obtained decryption key to decrypt the encrypted data to obtain the private data.

Description

technical field [0001] One or more embodiments of this specification relate to the field of data security, and in particular to data storage and data reading methods and devices for private data. Background technique [0002] A trusted computing cluster is a computing cluster composed of multiple trusted computing units running in a trusted execution environment (Trusted Execution Environment, TEE). Trusted computing clusters can provide data computing services. The trusted computing unit has a certain isolation capability, thereby ensuring the security of data computing. After the trusted computing unit completes the calculation of the data, the private data generated during the calculation can be encrypted and stored in the highly available storage device. The data viewer can read the private data in the highly available storage device, and there may be a need for multiple reads. The trusted computing unit needs to provide the decryption key of the private data to the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/901G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06F2221/2141G06F16/901
Inventor 张宁王磊余超凡周爱辉
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products