System and method for data hidden query security sharing based on multi-party secure computing

A security and data technology, applied in the field of big data technology and cryptography, to achieve the effect of ensuring security

Active Publication Date: 2021-08-24
SICHUAN XW BANK CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the deficiencies in the above-mentioned prior art, the purpose of the present invention is to provide a data hidden query security sharing system and method based on multi-party secure computing, aiming to solve the problem of security of key user information and user attribute information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for data hidden query security sharing based on multi-party secure computing
  • System and method for data hidden query security sharing based on multi-party secure computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] Assume that institution A is the main institution, institution B is the data asset institution, the main institution is the data query initiator, and the data asset institution is the data provider.

[0058] Step 1: Through two-two handshakes between system institutions, the sharing of public key information between institutions and the two-two privacy interaction of private keys are realized. The detailed steps are as follows:

[0059] Step 1.1: Subject institution A generates a dynamic public key. The public key information of one inter-organization is randomly and dynamically generated by the main institution A. In order to improve the security of the data sharing system, the public key meets the requirement of 256 bytes, and the public key information changes dynamically. The change period is generated by a random number, such as 5 minutes Change once. Assume that the public key information between the main institution A and the data asset institution B is p.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the fields of big data technology and cryptography technology, in particular to a data hidden query security sharing system and method based on multi-party secure computing. The present invention proposes a data concealment query security sharing system and method based on multi-party secure computing, including a DH key interaction module, a user key information concealment interaction module, a user core data concealment interaction module and a user core data security sharing module; the present invention Breaking the current inter-agency data barriers provides a new idea, and provides a new solution for inter-agency data security sharing. Through key dynamic double encryption technology and secret sharing algorithm, it ensures that user identity information cannot be decrypted by other third parties, and the core data of the organization cannot be released. The security sharing of information in the library not only ensures the security of user information, but also ensures the security of data assets of financial institutions.

Description

technical field [0001] The present invention relates to the fields of big data technology and cryptography technology, in particular to a data hidden query security sharing system and method based on multi-party secure computing. Background technique [0002] With the popularity of Internet applications and people's dependence on the Internet, Internet security issues have become increasingly prominent. At present, the Internet finance industry mainly carries out information sharing through the API interface. Generally, the three elements of the user's ID card number, mobile phone number, and name are used as the primary key of the user's identity information to query and interact with user attribute information. Usually, the three-element information of the user's primary key is transmitted in the form of plain text or MD5 encryption, and the user attribute information is directly interacted in plain text. This kind of information sharing has great security risks. MD5 enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0841H04L9/085
Inventor 贾坤王萍徐志华
Owner SICHUAN XW BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products