Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

57 results about "Data outsourcing" patented technology

Data Outsourcing is all about maintaining the data of business that they have collected such as customer address, e-mail, telephone number, reviews, etc, in the proper format by converting into digitized form.

Safe data-outsourcing machine learning and data analysis method

The invention discloses a safe data-outsourcing machine learning and data analysis method. A random tree is transformed in a homoenergetic mode into properties of a binary tree; a trained decision tree prediction model is transformed into the binary tree, the binary tree is induced into a special polynomial of which a shape is a sum of an infinite number of multiplier items, and each piece of data in the model is encrypted by an RSA and is uploaded to a cloud platform; then data which needs to be decided is also encrypted by the RSA and is uploaded to the cloud platform; the encrypted data of the model and the encrypted data which needs to be decided are correspondingly computed by utilizing the multiplication homomorphic encryption property of the RSA to obtain a ciphertext result of each multiplier item; and the results are returned to a data user for decryption so as to obtain a decision result. By transforming the binary tree into the polynomial, a decision tree which originally can be implemented by various computations is transformed into the decision tree which can be implemented by one computation, so that the machine learning process of the decision tree can be rapidly completed by using a multiplication homomorphic algorithm, a complex degree of carrying out such decision tree machine learning algorithm on a ciphertext is greatly reduced, and computing efficiency is promoted.
Owner:XIDIAN UNIV

Cloud storage service-oriented dynamic data integrity auditing program

InactiveCN104902027AOvercoming Insufficient Support for Dynamic OperationsHonest updateTransmissionData integrityCloud data
The invention discloses a cloud storage service-oriented dynamic data integrity auditing program, and aims to overcome the deficiency of an existing data integrity examination program of the cloud storage service in supporting the user dynamic operation. The cloud storage service-oriented dynamic data integrity auditing program includes a key generation phase in which a user generates a pair of public and private keys and transmits the public key to a cloud service supplier and an auditor; a data outsourcing phase in which the user transmits data blocks and labels to the cloud service supplier, and the cloud service supplier verifies the correctness of the labels; a cloud data integrity auditing phase in which the auditor transmits an audit request to the cloud service supplier, and a cloud server computes an evidence and returns the evidence to the auditor, and finally the auditor verifies the correctness of the evidence; and a cloud data dynamic updating phase in which the user transmits the data blocks and the labels to the cloud service supplier, and the cloud service supplier performs update operation and informs the user of an updated result. The cloud storage service-oriented dynamic data integrity auditing program can not only effectively satisfy a safety requirement of the data integrity auditing program of the cloud storage service but also effectively support dynamic operations of users.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Multiple users-based outsourcing database audit method

The present invention discloses a multiple users-based outsourcing database audit method, aiming to solve problems of low signature verification efficiency and complex decryption in the prior art. The method comprises a first step that a data owner encrypts data by using a proxy re-encryption method so as to form a second-level ciphertext, generates a re-encryption secret key by inquiring a public key of a user, generates a searching label by using an Evdokimov encryption manner, and generates hash tree root signature by using aggregate signature; and the signature, second-level ciphertext, re-encryption secret key and the searching label are transmitted to a cloud server; a second step that the cloud server encrypts the second-level ciphertext so as to generate a first-level ciphertext; a third step that a user sends a search request to the cloud server, and the cloud server searches and returns a corresponding first-level ciphertext; and a fourth step that the user decrypts the first-level ciphertext so as to form a plaintext, and performs aggregate verification on the plaintext. Through adoption of the method, the burden on the data owner is greatly reduced, interaction is reduced for one time, data privacy protection is improved, and the method can be applied to safe data outsourcing in a cloud calculation environment.
Owner:XIDIAN UNIV

Method for realizing and using MRS tree data structure under multi-user space query

The invention discloses a data structure. The data structure comprises a property dimension set. Through the data structure, a readable storage medium storing a data structure program can respond to multi-user space query, a multi-dimension query request is processed quickly and efficiently, the extendibility of the readable storage medium is enhanced, and memory resource expenditure is reduced for a service provider and users. The invention furthermore discloses a method for processing an external multi-user query request based on the data structure. Through the method, diversified query demands of a large number of users can be correctly reflected, the blank of multi-user space query processing in a data outsourcing scene is filled up, and the query processing efficiency and service quality of the service provider are improved. The invention furthermore discloses a verification method. Through the verification method, the authenticity, correctness and integrity of multi-user space query can be verified at the same time, and the reliability of data, used by the users, of the service provider is ensured. In the data outsourcing scene, the invention furthermore provides a multi-user space query verification method according to user preferences, an application device and a query verification system.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Data management implementation method based on data management platform, and data management platform

The embodiment of the invention relates to the technical field of data processing, and discloses a data management implementation method based on a data management platform, and the data management platform. The method comprises the following steps: receiving task distribution information sent by a task distribution terminal by the data management platform; distributing to-be-processed tasks to task receiving terminal users according to user information; allowing the task receiving terminal users to obtain the to-be-processed tasks; receiving task processing results returned by the task receiving terminals corresponding to the task receiving terminal users; sending the task processing results to a task distribution terminal user corresponding to the task distribution terminal for auditing, and receiving auditing results of the task processing results returned by the task distribution terminal; and when it is determined that the auditing results of the task processing results are qualified, recording the task processing results in a database for storage. By implementation of the data management implementation method provided by the embodiment of the invention, unified and transparent management and monitoring of data outsourcing are realized, and the security and stability in a data delivery process are improved.
Owner:GUANGDONG XIAOTIANCAI TECH CO LTD

A cloud data outsourcing and integrity verification method and device supporting preprocessing

The invention provides a cloud data outsourcing and integrity verification method supporting preprocessing, which comprises the following steps that: a data outsourcer selects a security parameter andan anti-collision hash function to generate a public key and a private key; The data outsourcer executes a first pre-calculation process according to the public key to generate offline data processing parameters; The data outsourcer executes a data processing process according to the private key and the offline data processing parameters, generates processed data and data labels and uploads the processed data and data labels to the cloud storage server; The data verifier executes a second pre-calculation process according to the public key and the data label to generate an offline data verification parameter; The data verifier verifies the data label of the outsourced data according to the public key of the data outsourcer and the offline data verification parameter, and generates a challenge if the data label of the outsourced data is legal; The cloud storage server responds to the received challenge calculation according to the stored outsourcing data; And the data verifier verifiesthe received response according to the public key and the offline data verification parameters so as to judge the integrity of the corresponding outsourcing data.
Owner:GUILIN UNIV OF ELECTRONIC TECH

Hierarchical security multi-party calculation method and device based on Chinese remainder theorem

ActiveCN112700152AAchieve the purpose of computingDigital data protectionResourcesCiphertextChinese remainder theorem
The invention relates to a hierarchical security multi-party computing method and device based on the Chinese remainder theorem, and the method comprises the steps: enabling a computing task to be divided into an outer package subtask and an autonomous subtask through a computing father node, and distributing a writing subkey and a reading subkey for each outer package subtask; sending each outer packet sub-task and the corresponding write-in sub-key to each computing sub-node in a safe mode; enabling the computing father node and the computing child nodes to obtain data of respective child tasks through computing, and storing outsourcing computing data in a public result ciphertext through writing of child keys and sharing and transmitting the outsourcing computing data in the public result ciphertext; enabling the computing father node to obtain outsourcing computing data calculated by each computing child node from the public result ciphertext by reading the child key, and calculating a final result of the calculation task. According to the method, the computing sub-nodes can assist each other to complete the computing task together, but the computing data of other computing sub-nodes and the final computing data of the computing task cannot be obtained, so that secure multi-party computing is realized.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Efficient and Verifiable Fuzzy Keyword Search Method Based on Cloud Data Outsourcing System

Provided is an efficient verified fuzzy key word searching method based on a cloud data subcontract system. The efficient verified fuzzy key word searching method includes: by constructing the cloud data subcontract system, data owners operate a key generation module to generate index generated keys and encryption keys and operate an index building module to build indexes, authorized users operate a trap door generation module to generate a trap door set of all fuzzy key words, wherein fuzzy key words corresponding to accurate key words in concentrated mode are concentrated in the trap door set, the authorized users transmit the trap door set to a cloud server which starts a searching module to perform search on an index tree and return address sets and proof sets of all files containing all given fuzzy key words, finally the authorized user operate a verification module to check whether the cloud server is honest, wherein the fuzzy key words are successfully searched and the cloud server is honest if the verification passes, otherwise, the fuzzy key words are failed in search and the server is not honest. The efficient verified fuzzy key word searching method supports fuzzy key word searching and can verify the searching results.
Owner:陕西矩阵风云数据安全有限责任公司

Multivariate identity authentication method and system for power grid data outsourcing calculation

PendingCN113468596AAlleviate the pressure of network securityTrue and valid identityDigital data protectionDigital data authenticationIp addressEngineering
The invention discloses a multivariate identity authentication method and system for power grid data outsourcing calculation, and the method comprises the steps: collecting various biological information of a user at the same time through a biological information collection device, transmitting the biological information to an identity authentication server, and carrying out the identity authentication of the user through the identity authentication server; enabling a calculation entrusting party and a calculation party of the power grid data to generate a session key in a mode of continuously exchanging intermediate values through a PAKE protocol, and encrypting and decrypting transmission data by using the session key to complete identity authentication between the calculation entrusting party and the calculation party; performing authentication verification on the power grid data needing to be subjected to outsourcing calculation, and performing authentication verification on a calculation result by a calculation entrusting party when a calculation party returns the calculation result; and enabling the encryption machine to write the IP address of the privacy computing server into the IP white list, and completing authentication of the privacy computing server. The method is compatible with various authentication requirements of personnel, equipment, systems, data and the like, and ensures the safety of power consumption data outsourcing calculation.
Owner:SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products