Power data privacy protection system, implementation method thereof and encryption attribute revocation method

A privacy protection system and power data technology, applied in the field of power data privacy protection system, to achieve the effect of protecting private data, protecting privacy, and preventing malicious access

Pending Publication Date: 2022-03-25
SHANGHAI INST OF TECH +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while the Internet provides convenience for life, there are also various hidden dangers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power data privacy protection system, implementation method thereof and encryption attribute revocation method
  • Power data privacy protection system, implementation method thereof and encryption attribute revocation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0026] Such as figure 1 The model diagram of the power data privacy protection system shown includes six entities: attribute authorization center, power data owner, power data user, cloud storage server, proxy decryption server, user verification center, and the six entities communicate through the Internet;

[0027] Attribute authorization center AA: used to generate system master key MK, system public key PK, user identity key VK u , user private key SK and set version PK for user attributes x , and PK, PK x public in the system, the VK u , SK is distributed to corresponding use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a power data privacy protection system, an implementation method thereof and an encryption attribute revocation method. The power data privacy protection system comprises six entities: an attribute authorization center, a power data owner, a power data user, a cloud storage server, a proxy decryption server and a user verification center, and the six entities communicate with one another through the Internet; an attribute encryption technology is introduced, a private key revocation scheme is given, the fine-grained decryption permission of a user is realized through an attribute-based encryption mode, whether the user has the decryption permission or not is judged through user attributes, and the privacy of the electricity user is protected. The method is used for protecting user privacy data and preventing malicious access.

Description

technical field [0001] The invention relates to a personal data security technology, in particular to a power data privacy protection system and its implementation method, and an encryption attribute revocation method. Background technique [0002] With the development of Internet technology, all walks of life are merging with the network at an accelerated rate and prompting these industries to reform. The "Internet +" in the early years provided strong policy support for the development of the Internet. After several years of development, my country's Internet technology has been at the forefront of the world. Unknowingly, the Internet has become an indispensable part of life. part. However, while the Internet provides convenience for life, there are also various hidden dangers. Nowadays, the world is under the wave of information revolution. People's various behaviors are expressed in the form of data on the Internet. The online world is like a digital mapping of the real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40H04L67/1097
CPCH04L9/0825H04L9/0891H04L63/06H04L63/0471H04L63/20H04L63/08H04L67/1097
Inventor 薛庆水时雪磊薛震王晨阳王俊华马海峰单志勇纵卫东
Owner SHANGHAI INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products