Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data use authorization method and device for hidden trace query, and storage medium

A technology for data to be queried, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as inability to obtain authorization and inability to provide data, and achieve the effects of facilitating audit and query, preventing denial, and avoiding tampering

Pending Publication Date: 2022-05-13
山东数据交易有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a contradiction here: the data provider needs to authorize the queried person before providing the data, and the data user does not want the provider to know who the queried person is, but the data provider does not know the queried object and cannot have the person's authorization to not provide the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data use authorization method and device for hidden trace query, and storage medium
  • Data use authorization method and device for hidden trace query, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present application clearer, the following will give a clear and complete description of the present application in conjunction with specific embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0048] Under the situation that data has become a new factor of production, strengthening data circulation and promoting data development and utilization are important means to give full play to the value of data. Security, personal privacy, etc. provide a legal basis. These laws and regulations require the data provider to obtain the authorization and consent of the individual before prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data use authorization method and device for hidden trace query, and a storage medium. The method comprises the following steps: a data user sends n identities (IDs) including a to-be-queried identity to an authorization center; the authorization center applies for authorization to the inquired object; the authorization center generates keys for the n IDs, an effective key is encrypted to form an encryption key, the effective key is replaced by the encryption key, and then the n IDs and the keys thereof are sent to a data user after digital signature; the data user sends the data returned by the authorization center to the data provider; after verifying the authenticity of the data, the data provider decrypts n keys including encryption keys, then queries information corresponding to n IDs, encrypts n query results, and then sends the encrypted n query results to the data user; and the data user decrypts the query result of the to-be-queried identity ID by using the effective key to obtain the query result.

Description

technical field [0001] The present application relates to the technical field of computer security, and in particular to a data usage authorization method, device and storage medium for anonymous inquiry. Background technique [0002] Under the situation that data has become a new factor of production, strengthening data circulation and promoting data development and utilization are important means to give full play to the value of data. Security, personal privacy, etc. provide a legal basis. These laws and regulations require the data provider to obtain the authorization and consent of the individual before providing the personal data. [0003] In the process of data circulation, when the data user inquires personal data from the data provider, due to the need to protect its own business secrets, the data provider does not want the data provider to know who is being queried. Therefore, it is necessary to hide the real query target from the data provider when querying. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 彭勇牛文强刘心田刘晓霞
Owner 山东数据交易有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products