Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for obtaining data authorization

A technology for data acquisition and data storage, which is applied in the security field and can solve problems such as the inability of the data provider to control the calculation logic

Active Publication Date: 2022-04-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In current dense-state hosting computing schemes, data providers usually have no control over the computing logic used by the center
However, the data provider may only want the data to be used for less leaky logic such as machine learning training, rather than for more leaky logic such as quantiles and segmented statistics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for obtaining data authorization
  • Method, device and system for obtaining data authorization
  • Method, device and system for obtaining data authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0059] The scheme provided by the embodiment of this specification proposes a scheme in which the center constrains the calculation logic used by the center when it calculates the data of the data provider through Trusted Cryptographic Computing (TECC for short).

[0060] TECC is a safe and efficient secret-state computing method, which can calculate a common result for multiple data providers without disclosing any party's data. Trusted secret-state computing combines two technologies of system security and cryptography, which balances security and performance better than using only one technology, and finally achieves the ideal state of "adequate security and very fast performance".

[0061] Mathematically provably secure schemes can be constructed using cryptography, but the computational performance of such schemes is poor. Because of the inherent n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide a method, device and system for obtaining data authorization. In the method for obtaining data authorization, any first computing node in the trusted computing center receives an authentication request from the first provider. Authentication information is returned to the first provider, including at least a first code hash of the first computing logic running in the first computing node. Receive the channel establishment request sent by the first provider after determining that the first computing node has passed the trusted authentication and the first code hash has passed the correctness verification. Establish a first trusted channel with the first provider according to the channel establishment request. Through the first trusted channel, the target encryption key among the encryption keys of several encrypted slices obtained based on the privacy data of the data provider is received, so as to obtain the target encryption key corresponding to the target encryption key based on the first calculation logic. Permission to perform calculations on shards. Thus, the security of the private data of the data provider can be ensured.

Description

technical field [0001] One or more embodiments of this specification relate to the field of security technology, and in particular to a method, device and system for obtaining data authorization. Background technique [0002] The dense-state hosting calculation refers to that the data provider uploads the data to a certain center, and the center performs dense-state calculation on the data, and the data provider does not need to participate in the calculation process. Encrypted escrow computing can be applied to multiple scenarios. For example, the data provider provides the data to the trading center in the form of encrypted state, and the trading center calculates valuable results in the form of encrypted state, and then sells the results to the data requester , so that the data provider and the transaction center can share the revenue obtained. [0003] In the current secret-hosted computing solution, the data provider usually cannot control the computing logic used by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F21/602G06F21/6245G06F21/44G06F21/50G06F21/64H04L9/0825H04L9/40H04L9/0894H04L9/3226
Inventor 潘无穷韦韬李婷婷钱中天李天一卫振强
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products