Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A threshold-based homomorphic encryption privacy protection device and method

A technology of homomorphic encryption and privacy protection, applied in the field of threshold-based homomorphic encryption privacy protection devices, to achieve the effect of improving security

Active Publication Date: 2022-03-25
BEIJING ZHONGKE JINCAI TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But if you want to operate on the data again, you must decrypt it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A threshold-based homomorphic encryption privacy protection device and method
  • A threshold-based homomorphic encryption privacy protection device and method
  • A threshold-based homomorphic encryption privacy protection device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Such as figure 1 As shown, the present application provides a threshold-based homomorphic encryption privacy protection method, which includes the following steps:

[0030] Step S0, generating private data in advance.

[0031] The user terminal generates the user's private data, and indicates the date of generation of the private data.

[0032] Step S1, according to the pre-built classification model of sentence secrecy level, divide the private data into multiple data fragment groups according to different secrecy levels, and mark the sequence number of each data fragment.

[0033] Wherein, the data fragment group includes a plurality of data fragments with the same confidentiality level, and the sequence numbers of the data fragments indicate the position order of the data fragments in the private data, and the private data can be recovered by sorting the disordered multiple data fragments by the sequence numbers.

[0034] Such as figure 2 As shown, step S1 includ...

Embodiment 2

[0091] Such as Figure 6 As shown, the present application provides a threshold-based homomorphic encryption privacy protection device 100, which device includes:

[0092] The data segment division unit 10 is used to divide the private data into a plurality of data segment groups according to the different confidentiality levels according to the pre-built sentence secrecy level division model;

[0093] An encryption processor 20, configured to perform separate encryption processing on each data segment group;

[0094] A verification data acquisition unit 30, configured to acquire verification data corresponding to each data segment group in response to an instruction to acquire private data;

[0095] A verification processor 40, configured to verify the acquired verification data;

[0096] The collection module 50 is used to collect intrusion attribute characteristic data in the verification data verification process in real time;

[0097] A data processor 60, configured to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a threshold-based homomorphic encryption privacy protection device and method. The method includes the following steps: according to the pre-built sentence secrecy level division model, the private data is divided into multiple data fragment groups according to the different secrecy levels; Each data segment group is encrypted separately; in response to the instruction to obtain private data, the verification data corresponding to each data segment group is obtained; the obtained verification data is verified; the intrusion attribute in the verification process of the verification data is collected in real time Characteristic data; based on the intrusion attribute data, calculate the intrusion risk value; compare the intrusion risk value and the preset intrusion tolerance limit value, if the intrusion risk value is greater than the preset intrusion tolerance limit value, prohibit the acquisition of data fragment group data, otherwise, allow Get data fragment group data. This application improves the security of private data and prevents private data from being stolen by intruders.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a threshold-based homomorphic encryption privacy protection device and method. Background technique [0002] Homomorphic Encryption (HE) refers to an encryption algorithm that satisfies the properties of cryptographic homomorphic operations, that is, after data undergoes homomorphic encryption, a specific calculation is performed on the password, and the obtained password calculation result is obtained after corresponding homomorphic decryption. The plaintext is equivalent to directly performing the same calculation on the plaintext data, realizing the "computable and invisible" of the data. [0003] It is common to encrypt stored data and ensure that only encrypted data is transferred to cloud storage devices. But if you want to manipulate the data again, you must decrypt it. This provides an opportunity for intruders lurking in the network to steal decrypted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 王姣杰
Owner BEIJING ZHONGKE JINCAI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products