Hidden trace query method and device and medium

A query method and a query device technology, applied in the field of data interaction, can solve the problems of data security relying on third-party security, data leakage, etc., and achieve the effect of reducing the risk of data leakage

Pending Publication Date: 2022-03-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional stealth query often relies on a trusted third party to generate keys or interact with the trusted third party. T

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden trace query method and device and medium
  • Hidden trace query method and device and medium
  • Hidden trace query method and device and medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0053] In conjunction with the following drawings of the present application example embodiments, the technical solutions in the embodiments of the present application will be clearly and completely described, obviously, the described embodiments are merely part of embodiments of the present application, but not all embodiments. Based on the embodiments in the present application, those of ordinary skill in the art without creative efforts shall, all other embodiments obtained are within the scope of protection of the present application.

[0054] The core of this application is to provide a third party does not rely on stealth query methods, devices and media, reducing the risk of data exposure.

[0055] In order to better understand the present application, the present application will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0056] With the rapid development of large Internet data, in certain cases, the data must provi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hidden trace query method, which relates to the field of data interaction, and is characterized in that under the condition that attribute data does not go out of a database of a data owning party, a target query feature signature received by a query party encrypts a query feature through a private key generated by the data owning party; and the data query party signs the target blind query feature sent by the query party, and the query party can decrypt the target attribute data through the signature of the target query feature to obtain the target attribute data. Therefore, the hidden trace query method provided by the invention does not depend on a third party to generate a secret key or carry out interaction, and the risk of data leakage is reduced. The invention further provides a hidden trace query device and a computer readable storage medium, which correspond to the method and have the same effects.

Description

technical field [0001] The present application relates to the field of data interaction, and in particular to a method, device and medium for stealthy inquiry. Background technique [0002] With the rapid development of big data and artificial intelligence in recent years, the increasingly strict protection of user data privacy and security management will become a global trend. For data query and interaction between enterprises, the data owner provides data to the query party for query. How to protect the privacy of the entire query process, so that the data owner cannot know the query target of the query party, but can return smoothly The query results are given to the query party, and the query party cannot obtain data content other than the data information it queried. This is an industry pain point and problem that needs to be solved. [0003] The traditional stealth query is mainly realized by the technology of inadvertent transmission. The data owner sends multiple ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6227G06F21/602
Inventor 徐东德刘飞范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products