Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure hidden three-element query method

A query method and three-element technology, which is applied in the field of safe and hidden three-element query, can solve problems such as exposure of user privacy, data leakage, and easy leakage of query data, and achieve the effect of protecting user privacy and avoiding data leakage

Active Publication Date: 2021-08-13
蓝象智联(杭州)科技有限公司
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technologies are all three-element queries through plain text, and the query data is easy to leak. Since the queried party can obtain and record the query information of the queried party, when the query information of the queried party is not in the queried party’s database, the data will be lost. Leaked to the queried party, thus exposing user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure hidden three-element query method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1: A kind of security hidden three-element query method of this embodiment, such as figure 1 As shown, including the preprocessing stage and the online processing stage;

[0053] The preprocessing phase includes the following steps:

[0054] M1: The inquired party reads the three-element data in the database. Each set of three-element data includes the name, ID number, and mobile phone number belonging to the same person. The inquired party processes each set of three-element data as follows: The element data generates three corresponding sub-data, the three sub-data are mobile phone number, (name, mobile phone number), (ID card number, mobile phone number), and these three sub-data are hashed to obtain the corresponding three lengths of The string data of β, store the obtained string data;

[0055] The method of performing hash processing on the three data of mobile phone number, (name, mobile phone number), (ID card number, mobile phone number) to obtain...

Embodiment 2

[0093] Embodiment 2: the method of this embodiment is basically the same as embodiment 1, the difference is:

[0094] Step M3 comprises the following steps:

[0095] M31: The queried party generates a parameter g p and send it to the querying party, g is an integer, p is a prime number, and the querying party generates a vector S, , convert the vector S into a vector L as follows: if the jth bit of the vector S is 0, then the jth bit of the vector L , if the jth bit of the vector S is 1, then the jth bit of the vector L , q is an integer, ;

[0096] M32: The querying party sends the vector L to the queried party, and the queried party generates a corresponding intermediate parameter group for each string data according to the vector L, the i-th string data b i The corresponding intermediate parameter group is C i , the intermediate parameter group C i The generation method of is as follows: According to each bit of the vector L, two corresponding parameters are gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure hidden three-element query method. The method comprises the following steps: a preprocessing stage: a queried party reads stored three-element data, splits the three-element data into three sub-data, performs hash processing to obtain three character string data, allocates a corresponding secret key to each character string data, calculates a first-level encryption string corresponding to each character string data, the query party encrypts the first-level encrypted string under the cooperation of the queried party to obtain a second-level encrypted string; the online processing stage comprises the following steps of: the query party reads input three-element data, generates three pieces of query data, rperforms hash processing to obtain three pieces of corresponding query character string data, calculating a decryption key corresponding to each piece of query character string data, sends the decryption key to a queried party, and sends a query result to the query party after the queried party queries. When three-element query is carried out, query conditions are hidden, data leakage is avoided, a queried party cannot record query information which is not in a database of the queried party, and user privacy is protected.

Description

technical field [0001] The invention relates to the technical field of data query, in particular to a security concealment three-element query method. Background technique [0002] In the risk control scenario, the user's name, ID number, and mobile phone number need to be used as three elements to verify the user's real identity. Under normal circumstances, the inquired party has this kind of data, and the inquiring party needs to send the three elements to the inquired party, and the inquired party verifies whether the user's name, ID number, and mobile phone number are true and correct. Existing technologies are all three-element queries through plain text, and the query data is easy to leak. Since the queried party can obtain and record the query information of the queried party, when the query information of the queried party is not in the queried party’s database, the data will be lost. Leaked to the queried party, thereby exposing user privacy. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6245
Inventor 马煜翔毛仁歆刘洋邢冰谷胜才
Owner 蓝象智联(杭州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products