Data controllable use method

The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security...

Full description

Saved in:
Bibliographic Details
Main Authors TANG ZAIYANG, FAN XUEPENG, ZHANG JINBO, WANG CHENMIN, ZENG YULONG
Format Patent
LanguageChinese
English
Published 05.03.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security domain. And although the data is visible, the data cannot be written out of the security domain, that is, the data in the security domain can only be read by the process but cannot be written into a file outside the security domain, so that the possibility that the original data is leaked by a data user is avoided. Moreover, the data controllable use method is realized based on the existing TPM, LSM and asymmetric encryption technologies, and high efficiency and high compatibility of the method are ensured. A traditional data processing application can achieve a privacy protection effect without changing any source code. 本发明实施例公开了一种数据可控使用方法,该方法运行于数据使用方,实施本发明实施例提供的方法,数据使用方只能在预设的安全域中对数据提供方交付的非对称加密后的数据进行加工处理。数据虽然可见,但不
AbstractList The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the embodiment of the invention, the data user can only process asymmetrically encrypted data delivered by a data provider in a preset security domain. And although the data is visible, the data cannot be written out of the security domain, that is, the data in the security domain can only be read by the process but cannot be written into a file outside the security domain, so that the possibility that the original data is leaked by a data user is avoided. Moreover, the data controllable use method is realized based on the existing TPM, LSM and asymmetric encryption technologies, and high efficiency and high compatibility of the method are ensured. A traditional data processing application can achieve a privacy protection effect without changing any source code. 本发明实施例公开了一种数据可控使用方法,该方法运行于数据使用方,实施本发明实施例提供的方法,数据使用方只能在预设的安全域中对数据提供方交付的非对称加密后的数据进行加工处理。数据虽然可见,但不
Author ZENG YULONG
WANG CHENMIN
FAN XUEPENG
ZHANG JINBO
TANG ZAIYANG
Author_xml – fullname: TANG ZAIYANG
– fullname: FAN XUEPENG
– fullname: ZHANG JINBO
– fullname: WANG CHENMIN
– fullname: ZENG YULONG
BookMark eNrjYmDJy89L5WSQcUksSVRIzs8rKcrPyUlMyklVKC1OVchNLcnIT-FhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoaG5mYmFuYGxo7GxKgBAGymJXQ
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
DocumentTitleAlternate 一种数据可控使用方法
ExternalDocumentID CN117648703A
GroupedDBID EVB
ID FETCH-epo_espacenet_CN117648703A3
IEDL.DBID EVB
IngestDate Fri Aug 02 08:58:49 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language Chinese
English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_CN117648703A3
Notes Application Number: CN202311241074
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240305&DB=EPODOC&CC=CN&NR=117648703A
ParticipantIDs epo_espacenet_CN117648703A
PublicationCentury 2000
PublicationDate 20240305
PublicationDateYYYYMMDD 2024-03-05
PublicationDate_xml – month: 03
  year: 2024
  text: 20240305
  day: 05
PublicationDecade 2020
PublicationYear 2024
RelatedCompanies BEIJING YEEZTECH CO., LTD
RelatedCompanies_xml – name: BEIJING YEEZTECH CO., LTD
Score 3.6639407
Snippet The embodiment of the invention discloses a data controllable use method, the method is operated on a data user, and by implementing the method provided by the...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
Title Data controllable use method
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240305&DB=EPODOC&locale=&CC=CN&NR=117648703A
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_m_HzTquicUkH6Vmxp0o-HIi5tGcK6IVP2NpI0ZYpsw3YI_vUmsXO-6OsFLsmRy90ld78DuAmZW3q4lIeXFtxG0qTYIXWRHRSUOSUXRcRVNfIg9_tP6GGCJy14XdfCaJzQDw2OKDWKS32v9X293DxiJTq3srplL5K0uMvGcWI10bECl3OwlfTidDRMhsQiJCa5lT_Grhv40jd3vPst2FZutMLZT597qipl-dukZIewM5Lc5vURtD5nBuyTdec1A_YGzYe3Abs6Q5NXkthoYXUM3YTW1GySzN9U7ZO5qoT53Qz6BK6zdEz6tpxw-rO7Kck3a_NOoS2jfnEGJg9RyBDyWMQxohiHkSgCx2eBArjHojiHzt98Ov8NXsCBkpROpMJdaNfvK3EpLWvNrrRIvgA8rHv0
link.rule.ids 230,309,786,891,25594,76906
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_m_JhvWh06p1aQvhVbmvTjoYhLV6qu3ZAqextN2qIiOmyH4F9vEjvni75e4JIcudxdcvc7gHOXmqWFS354s5zpiJsU3c1MpDt5Ro2SFbnHRDVynNjRPbqZ4mkLnpe1MBIn9EOCI3KNYlzfa3lfz1ePWIHMrawu6BMnvV2GqR9oTXQswOUMrAUDfzgZB2OiEeKTREvufNN0bO6bG9bVGqw7Ap1XuE4PA1GVMv9tUsId2Jhwbq_1LrQ-HxXokGXnNQW24ubDW4FNmaHJKk5stLDag36Q1ZnaJJm_iNondVEV6ncz6H04C4cpiXQ-4exndzOSrNZmdaHNo_7iAFTmIpciZFGPYZRh7HpF7hg2dQTAPS7yQ-j9zaf33-ApdKI0Hs1G18ntEWwLqcmkKtyHdv2-KI65la3piRTPFzDEfuE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Data+controllable+use+method&rft.inventor=TANG+ZAIYANG&rft.inventor=FAN+XUEPENG&rft.inventor=ZHANG+JINBO&rft.inventor=WANG+CHENMIN&rft.inventor=ZENG+YULONG&rft.date=2024-03-05&rft.externalDBID=A&rft.externalDocID=CN117648703A