Unlock instant, AI-driven research and patent intelligence for your innovation.
A threshold-based homomorphic encryption privacy protection device and method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of homomorphic encryption and privacy protection, applied in the field of threshold-based homomorphic encryption privacy protection devices, to achieve the effect of improving security
Active Publication Date: 2022-03-25
BEIJING ZHONGKE JINCAI TECH
View PDF9 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
But if you want to operate on the data again, you must decrypt it
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0029] Such as figure 1 As shown, the present application provides a threshold-based homomorphic encryption privacy protection method, which includes the following steps:
[0030] Step S0, generating private data in advance.
[0031] The user terminal generates the user's private data, and indicates the date of generation of the private data.
[0032] Step S1, according to the pre-built classification model of sentence secrecy level, divide the private data into multiple data fragment groups according to different secrecy levels, and mark the sequence number of each data fragment.
[0033] Wherein, the data fragment group includes a plurality of data fragments with the same confidentiality level, and the sequence numbers of the data fragments indicate the position order of the data fragments in the private data, and the private data can be recovered by sorting the disordered multiple data fragments by the sequence numbers.
[0034] Such as figure 2 As shown, step S1 includ...
Embodiment 2
[0091] Such as Figure 6 As shown, the present application provides a threshold-based homomorphic encryption privacy protection device 100, which device includes:
[0092] The data segment division unit 10 is used to divide the private data into a plurality of data segment groups according to the different confidentiality levels according to the pre-built sentence secrecy level division model;
[0093] An encryption processor 20, configured to perform separate encryption processing on each data segment group;
[0094] A verification data acquisition unit 30, configured to acquire verification data corresponding to each data segment group in response to an instruction to acquire private data;
[0095] A verification processor 40, configured to verify the acquired verification data;
[0096] The collection module 50 is used to collect intrusion attribute characteristic data in the verification data verification process in real time;
[0097] A data processor 60, configured to...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The present application provides a threshold-based homomorphic encryption privacy protection device and method. The method includes the following steps: according to the pre-built sentence secrecy level division model, the private data is divided into multiple data fragment groups according to the different secrecy levels; Each data segment group is encrypted separately; in response to the instruction to obtain private data, the verification data corresponding to each data segment group is obtained; the obtained verification data is verified; the intrusion attribute in the verification process of the verification data is collected in real time Characteristic data; based on the intrusion attribute data, calculate the intrusion risk value; compare the intrusion risk value and the preset intrusion tolerance limit value, if the intrusion risk value is greater than the preset intrusion tolerance limit value, prohibit the acquisition of data fragment group data, otherwise, allow Get data fragment group data. This application improves the security of private data and prevents private data from being stolen by intruders.
Description
technical field [0001] The present application relates to the technical field of data processing, in particular to a threshold-based homomorphic encryption privacy protection device and method. Background technique [0002] Homomorphic Encryption (HE) refers to an encryption algorithm that satisfies the properties of cryptographic homomorphic operations, that is, after data undergoes homomorphic encryption, a specific calculation is performed on the password, and the obtained password calculation result is obtained after corresponding homomorphic decryption. The plaintext is equivalent to directly performing the same calculation on the plaintext data, realizing the "computable and invisible" of the data. [0003] It is common to encrypt stored data and ensure that only encrypted data is transferred to cloud storage devices. But if you want to manipulate the data again, you must decrypt it. This provides an opportunity for intruders lurking in the network to steal decrypted...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.