Method and system for protecting data object subject identification based on cryptographic operations

A data object, cryptography technology, used in digital transmission systems, transmission systems, key distribution, and can solve problems such as identification matching

Active Publication Date: 2020-10-02
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the current technologies use encryption to hide the original logo, but it is difficult for both parties to match their encrypted logos, that is, it is impossible to safely convert the encrypted logo of one party into a logo that can be recognized by the other party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting data object subject identification based on cryptographic operations
  • Method and system for protecting data object subject identification based on cryptographic operations
  • Method and system for protecting data object subject identification based on cryptographic operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0051] Said generating the anonymous encoding of the data object subject identification includes the following steps:

[0052] (A1) The key management server generates a key K and generates an encryption and decryption key ENCDECn of a symmetric cryptographic algorithm for each data owner, where n is any positive integer;

[0053] (A2) using the key K to generate an anonymous identifier for the data object subject identifier after processing the data subject identifier;

[0054] (A3) Using the ENCDECi key, the i-th data owner encrypts the anonymous identifier identified by the data object subject to generate an anonymous ciphertext Ci of the data object subject identifier, where i≤n;

[0055] (A4) Encoding the Ci to generate an anonymous code Xi for the subject identifier of the data object;

[0056] The anonymous encoding of the converted data object subject identifier includes the following steps:

[0057] (B1) The key management server generates a key K and generates an e...

Embodiment approach 2

[0105] Said generating the anonymous encoding of the data object subject identification includes the following steps:

[0106] (A1) The key management server generates a key K and generates an encryption key ENCn for each data owner, where n is any positive integer;

[0107] (A2) using the key K to generate an anonymous identifier for the data object subject identifier after processing the data subject identifier;

[0108] (A3) Using the ENCi key, the data owner i encrypts the anonymous identifier identified by the data object subject to generate the anonymous ciphertext Ci of the data object subject identifier, where i is any positive integer and i≤n;

[0109] (A4) Encoding the Ci to generate an anonymous code Xi for the subject identifier of the data object;

[0110] The anonymous encoding of the converted data object subject identifier includes the following steps:

[0111] (B1) The key management server generates a key K and generates a key pair of asymmetric cryptographic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for protecting a data object subject identifier based on a cryptographic operation. The method comprises two parallel processing steps of generating an anonymous code of a data object subject identifier and converting the anonymous code of the data object identifier. By adopting the method and the system for protecting the data object subject identifier based on the cryptographic operation, different results of anonymous processing on the subject identifier information of the same data object by different processors can be obtained, so that attackers are prevented from aggregating and analyzing the data with the same anonymous value according to the anonymous value of the subject identifier information of the data object, only the authorized processor can convert the anonymous value of the subject identifier information of a data object into another anonymous value of the subject identifier information of the data object to achieve matching between different anonymous values of the subject identifier information of the same data object, and the data transaction and aggregation of the same data object subject are completed accordingly without exposing the data object subject identifier.

Description

technical field [0001] The present invention relates to the intersecting technical field of network data circulation and information security, and specifically refers to a protection method and system for realizing data object subject identification based on cryptographic operations. Background technique [0002] With the maturity and development of big data technology, the application of big data in business is more and more extensive, and the examples of interaction, integration, exchange and transaction of big data are also increasing. At present, most of the data sources are relatively independent from the data demand side: on the one hand, the data owner cannot effectively use the data due to the lack of application scenarios for business functions, and cannot fully explore the value of the data; on the other hand, the data application side suffers from lack of data , The development of big data business is difficult. This phenomenon thus gave birth to the emergence of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0861H04L9/0866H04L63/0421
Inventor 胡永涛胥怡心黄俊
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products