Data controllable use method

The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security...

Full description

Saved in:
Bibliographic Details
Main Authors TANG ZAIYANG, FAN XUEPENG, ZHANG JINBO, WANG CHENMIN, ZENG YULONG
Format Patent
LanguageChinese
English
Published 05.03.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security domain. And although the data is visible, the data cannot be written out of the security domain, that is, the data in the security domain can only be read by the process but cannot be written into a file outside the security domain, so that the possibility that the original data is leaked by a data user is avoided. Moreover, the data controllable use method is realized based on the existing TPM, LSM and asymmetric encryption technologies, and high efficiency and high compatibility of the method are ensured. A traditional data processing application can achieve a privacy protection effect without changing any source code. 本发明实施例公开了一种数据可控使用方法,该方法运行于数据使用方,实施本发明实施例提供的方法,数据使用方只能在预设的安全域中对数据提供方交付的非对称加密后的数据进行加工处理。数据虽然可见,但不
Bibliography:Application Number: CN202311241074