Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hidden trace query method and device and medium

A query method and a query device technology, applied in the field of data interaction, can solve the problems of data security relying on third-party security, data leakage, etc., and achieve the effect of reducing the risk of data leakage

Pending Publication Date: 2022-03-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional stealth query often relies on a trusted third party to generate keys or interact with the trusted third party. The data security of this method largely depends on the security of the third party, and there is a certain risk of data leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden trace query method and device and medium
  • Hidden trace query method and device and medium
  • Hidden trace query method and device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.

[0054] The core of this application is to provide a method, device and medium for anonymous tracking that does not rely on a third party to reduce the risk of data leakage.

[0055] In order to enable those skilled in the art to better understand the solution of the present application, the present application will be further described in detail below in conjunction with the drawings and specific implementation methods.

[0056] With the rapid development of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hidden trace query method, which relates to the field of data interaction, and is characterized in that under the condition that attribute data does not go out of a database of a data owning party, a target query feature signature received by a query party encrypts a query feature through a private key generated by the data owning party; and the data query party signs the target blind query feature sent by the query party, and the query party can decrypt the target attribute data through the signature of the target query feature to obtain the target attribute data. Therefore, the hidden trace query method provided by the invention does not depend on a third party to generate a secret key or carry out interaction, and the risk of data leakage is reduced. The invention further provides a hidden trace query device and a computer readable storage medium, which correspond to the method and have the same effects.

Description

technical field [0001] The present application relates to the field of data interaction, and in particular to a method, device and medium for stealthy inquiry. Background technique [0002] With the rapid development of big data and artificial intelligence in recent years, the increasingly strict protection of user data privacy and security management will become a global trend. For data query and interaction between enterprises, the data owner provides data to the query party for query. How to protect the privacy of the entire query process, so that the data owner cannot know the query target of the query party, but can return smoothly The query results are given to the query party, and the query party cannot obtain data content other than the data information it queried. This is an industry pain point and problem that needs to be solved. [0003] The traditional stealth query is mainly realized by the technology of inadvertent transmission. The data owner sends multiple ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6227G06F21/602
Inventor 徐东德刘飞范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products