Cross-domain identity verification method and server in secure multi-party computing
A technology for secure multi-party computing and authentication methods, applied in computing, computer security devices, instruments, etc., can solve problems such as privacy data leakage, and achieve the effect of avoiding privacy data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0066] refer to figure 1 As shown in FIG. 1 , it is an implementation flow chart of a method for cross-domain authentication in secure multi-party computing provided by Embodiment 1 of the present application. The method can be applied to a first server in a first domain, such as a gateway server in the current domain. For example, if figure 2 As shown in , multiple computing entities that implement secure multi-party computing come from multiple domains, and the computing entitie...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


