Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection query method and device supporting outsourcing calculation and related equipment

A privacy protection and query method technology, applied in computer security devices, computing, digital data protection, etc., can solve the problem of low efficiency of invisible query, achieve friendliness, reduce the number of parameter generation and synchronization, and improve query efficiency Effect

Pending Publication Date: 2022-05-03
深圳市洞见智慧科技有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The stealth query protocol can be considered as a specific application of the secure multi-party computing protocol in a specific scenario. At present, the efficiency of the stealth query is low. Therefore, how to improve the efficiency of the stealth query needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection query method and device supporting outsourcing calculation and related equipment
  • Privacy protection query method and device supporting outsourcing calculation and related equipment
  • Privacy protection query method and device supporting outsourcing calculation and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0046] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a privacy protection query method and device supporting outsourcing computing and related equipment, and the method comprises the steps: receiving P keywords, classifying the P keywords to obtain Q types of keywords, and enabling each type of keywords to correspond to a bucket ID; sorting the Q-class keywords according to the bucket ID; public parameters of each type of keywords in the Q types of keywords after sorting are determined, Q groups of public parameters are obtained, and each group of public parameters corresponds to one bucket; the Q groups of public parameters are sent to the server side, corresponding buckets are called for query through the server side according to the Q groups of public parameters and the corresponding sequence, a first query result is obtained, and each bucket is used for storing a mapping relation between a preset keyword and local data; and receiving a first query result fed back by the server, performing decryption operation according to the first query result to obtain a second query result, and feeding back the second query result to the client. By adopting the embodiment of the invention, the hidden trace query efficiency can be improved.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a privacy protection query method, device and related equipment supporting outsourced computing. Background technique [0002] In practical applications, the stealth query technology mainly refers to protecting the data privacy of the inquiring party when performing data retrieval based on keywords, that is, initiating a query to the inquired party without revealing the content of the keywords to be queried by the inquiring party. Data query, at the same time, the queried party should return the correct query result without knowing the content of the keyword. During the process of anonymous inquiry, the inquiring party should not obtain other relevant information except the content of the data to be queried. The stealth query protocol can be considered as a specific application of the secure multi-party computing protocol in a specific scenario. At present, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60G06F16/2455
CPCG06F21/6245G06F21/602G06F16/24568
Inventor 冯新宇王湾湾何浩姚明
Owner 深圳市洞见智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products