Data controllable use method
The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
05.03.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security domain. And although the data is visible, the data cannot be written out of the security domain, that is, the data in the security domain can only be read by the process but cannot be written into a file outside the security domain, so that the possibility that the original data is leaked by a data user is avoided. Moreover, the data controllable use method is realized based on the existing TPM, LSM and asymmetric encryption technologies, and high efficiency and high compatibility of the method are ensured. A traditional data processing application can achieve a privacy protection effect without changing any source code.
本发明实施例公开了一种数据可控使用方法,该方法运行于数据使用方,实施本发明实施例提供的方法,数据使用方只能在预设的安全域中对数据提供方交付的非对称加密后的数据进行加工处理。数据虽然可见,但不 |
---|---|
Bibliography: | Application Number: CN202311241074 |