Movatterモバイル変換


[0]ホーム

URL:


CN118568755A - Trusted multi-party data transmission method and device, electronic equipment and storage medium - Google Patents

Trusted multi-party data transmission method and device, electronic equipment and storage medium
Download PDF

Info

Publication number
CN118568755A
CN118568755ACN202411047402.7ACN202411047402ACN118568755ACN 118568755 ACN118568755 ACN 118568755ACN 202411047402 ACN202411047402 ACN 202411047402ACN 118568755 ACN118568755 ACN 118568755A
Authority
CN
China
Prior art keywords
data
user
holder
feature
extraction rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411047402.7A
Other languages
Chinese (zh)
Other versions
CN118568755B (en
Inventor
杨士弘
杨华卫
黄玉杰
易流平
陈红
李磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lingyun Technology Co ltd
Original Assignee
Beijing Lingyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lingyun Technology Co ltdfiledCriticalBeijing Lingyun Technology Co ltd
Priority to CN202411047402.7ApriorityCriticalpatent/CN118568755B/en
Publication of CN118568755ApublicationCriticalpatent/CN118568755A/en
Application grantedgrantedCritical
Publication of CN118568755BpublicationCriticalpatent/CN118568755B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本申请涉及可信空间数据处理技术领域,尤其涉及一种可信多方数据传输方法、装置、电子设备和存储介质。包括:接收至少一个数据持有方发送的特征数据集,特征数据集为:数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取得到的;第一数据提取规则为:数据使用方基于元数据标识和对应的数据需求,通过第一特征计算引擎生成的;对至少一个特征数据集进行处理生成数据产品,并将数据产品传输至数据使用方。本申请基于目标原始数据生成特征数据集并传输特征数据集,降低了,目标原始数据在数据传输过程中的泄露风险及数据传输的网络压力。

The present application relates to the technical field of trusted space data processing, and in particular to a trusted multi-party data transmission method, device, electronic device and storage medium. It includes: receiving a feature data set sent by at least one data holder, the feature data set is: after the data holder receives the metadata identifier and the first data extraction rule sent by the data user, based on the first data extraction rule, the target original data corresponding to the metadata identifier is extracted by the second feature calculation engine; the first data extraction rule is: generated by the data user through the first feature calculation engine based on the metadata identifier and the corresponding data requirements; at least one feature data set is processed to generate a data product, and the data product is transmitted to the data user. The present application generates a feature data set based on the target original data and transmits the feature data set, which reduces the risk of leakage of the target original data during data transmission and the network pressure of data transmission.

Description

Translated fromChinese
一种可信多方数据传输方法、装置、电子设备和存储介质A trusted multi-party data transmission method, device, electronic device and storage medium

技术领域Technical Field

本申请涉及可信空间数据处理技术领域,尤其涉及一种可信多方数据传输方法、装置、电子设备和存储介质。The present application relates to the technical field of trusted space data processing, and in particular to a trusted multi-party data transmission method, device, electronic device and storage medium.

背景技术Background Art

随着信息技术的不断进步,数据已经成为新的关键生产要素,与土地、劳动力、资本、技术等传统要素并列为推动经济社会发展的重要驱动力。以汽车领域为例,汽车数据流通对于企业具有很大的意义。它可以帮助企业实现高效协作、提高决策效率、优化服务体验等。然而,汽车数据流通也面临着一些问题,如数据分布不均衡、数据质量参差不齐、数据安全问题等,探索既能保护数据隐私,又能使数据发挥最大作用,符合多方利益的解决方法,已成为迫切需要解决的问题。With the continuous advancement of information technology, data has become a new key production factor, and is listed as an important driving force for promoting economic and social development alongside traditional factors such as land, labor, capital, and technology. Taking the automotive field as an example, the circulation of automotive data is of great significance to enterprises. It can help enterprises achieve efficient collaboration, improve decision-making efficiency, and optimize service experience. However, the circulation of automotive data also faces some problems, such as uneven data distribution, uneven data quality, and data security issues. Exploring solutions that can protect data privacy and maximize the role of data and meet the interests of multiple parties has become an urgent problem to be solved.

为解决上述问题,相关技术大多在数据传输过程中,辅助以安全手段的方式促进数据要素流动。如通过数据胶囊封装数据的形式来保证数据安全,并结合可信执行环境,在可信执行环境中对数据胶囊进行解封,再对数据进行计算来管理数据的流通过程,但是,可信执行环境一旦出现安全漏洞,那么原始数据也就会存在被泄露的风险,同时,携带原始数据的数据胶囊可能会很大,在传输过程中很容易受网络影响,容易造成数据丢失。To solve the above problems, most of the related technologies promote the flow of data elements by means of security measures during the data transmission process. For example, data security is ensured by encapsulating data in data capsules, and combined with a trusted execution environment, the data capsules are unsealed in the trusted execution environment, and the data is calculated to manage the flow of data. However, once a security vulnerability occurs in the trusted execution environment, the original data will also be at risk of being leaked. At the same time, the data capsules carrying the original data may be very large, and are easily affected by the network during the transmission process, which may easily cause data loss.

综上,如何降低数据传输过程中的泄露风险是亟待解决的。In summary, how to reduce the risk of leakage during data transmission is an urgent issue to be solved.

发明内容Summary of the invention

本申请实施例提供一种可信多方数据传输方法、装置、电子设备和存储介质,用以降低数据传输过程中的泄露风险。The embodiments of the present application provide a trusted multi-party data transmission method, device, electronic device and storage medium to reduce the risk of leakage during data transmission.

本申请实施例提供的一种可信多方数据传输方法,应用于数据服务平台,所述方法包括:A trusted multi-party data transmission method provided in an embodiment of the present application is applied to a data service platform, and the method includes:

接收至少一个数据持有方发送的特征数据集,所述特征数据集为:所述数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取得到的;所述元数据标识是所述数据使用方根据数据需求从所述数据持有方确认授权后发送的数据目录信息中获取的,所述第一数据提取规则为:所述数据使用方基于所述元数据标识和对应的数据需求,通过第一特征计算引擎生成的;Receive a feature data set sent by at least one data holder, the feature data set being obtained by extracting features of target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule after the data holder receives the metadata identifier and the first data extraction rule sent by the data user; the metadata identifier is obtained by the data user from the data directory information sent by the data holder after confirming the authorization according to data requirements, and the first data extraction rule is generated by the data user through the first feature calculation engine based on the metadata identifier and the corresponding data requirements;

对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方。At least one of the feature data sets is processed to generate a data product, and the data product is transmitted to the data user.

本申请实施例提供的另一种可信多方数据传输方法,应用于数据使用方,所述方法包括:Another trusted multi-party data transmission method provided in an embodiment of the present application is applied to a data user, and the method includes:

向至少一个数据持有方分别发送数据授权请求;Sending a data authorization request to at least one data holder respectively;

对于每个所述数据持有方,接收所述数据持有方确认授权后发送的数据目录信息,并根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;For each of the data holders, receiving the data directory information sent by the data holder after confirming the authorization, and obtaining the metadata identifier corresponding to the target original data from the data directory information according to the data demand;

对于每个所述元数据标识,基于所述元数据标识和对应的所述数据需求,通过第一特征计算引擎生成对应所述目标原始数据的第一数据提取规则,并将所述元数据标识和所述第一数据提取规则发送至对应的所述数据持有方,以使所述数据持有方基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台;For each metadata identifier, based on the metadata identifier and the corresponding data demand, a first data extraction rule corresponding to the target original data is generated through a first feature calculation engine, and the metadata identifier and the first data extraction rule are sent to the corresponding data holder, so that the data holder performs feature extraction on the target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule, and sends the feature extraction to the data service platform;

接收所述数据服务平台发送的数据产品;所述数据产品为:所述数据服务平台对至少一个所述特征数据集进行处理生成的。Receive a data product sent by the data service platform; the data product is generated by the data service platform by processing at least one of the feature data sets.

本申请实施例提供的又一种可信多方数据传输方法,应用于数据持有方,所述方法包括:Another trusted multi-party data transmission method provided in an embodiment of the present application is applied to a data holder, and the method includes:

接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至所述数据使用方,以使所述数据使用方根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;Receive a data authorization request sent by a data user, and after confirming the authorization, send the data directory information to the data user, so that the data user can obtain the metadata identifier corresponding to the target original data from the data directory information according to the data demand;

接收到所述数据使用方发送的元数据标识和所述第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,获取特征数据集;After receiving the metadata identifier and the first data extraction rule sent by the data user, based on the first data extraction rule, a second feature calculation engine is used to extract features of the target original data corresponding to the metadata identifier to obtain a feature data set;

将所述特征数据集发送至数据服务平台,以使所述数据服务平台对所述特征数据集进行处理生成数据产品,并发送给所述数据使用方。The feature data set is sent to a data service platform, so that the data service platform processes the feature data set to generate a data product, and sends the data product to the data user.

本申请实施例提供的一种可信多方数据传输装置,应用于数据服务平台,所述装置包括:An embodiment of the present application provides a trusted multi-party data transmission device, which is applied to a data service platform, and the device includes:

第一接收单元,用于接收至少一个数据持有方发送的特征数据集,所述特征数据集为:所述数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取得到的;所述元数据标识是所述数据使用方根据数据需求从所述数据持有方确认授权后发送的数据目录信息中获取的,所述第一数据提取规则为:所述数据使用方基于所述元数据标识和对应的数据需求,通过第一特征计算引擎生成的;A first receiving unit is used to receive a feature data set sent by at least one data holder, wherein the feature data set is obtained by extracting features of target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule after the data holder receives the metadata identifier and the first data extraction rule sent by the data user; the metadata identifier is obtained by the data user from the data directory information sent by the data holder after confirming the authorization according to data requirements, and the first data extraction rule is generated by the data user through the first feature calculation engine based on the metadata identifier and the corresponding data requirements;

处理单元,用于对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方。A processing unit is used to process at least one of the feature data sets to generate a data product, and transmit the data product to the data user.

可选的,所述第一接收单元具体用于:Optionally, the first receiving unit is specifically configured to:

接收所述数据使用方发送的所述元数据标识和所述第一数据提取规则,以及,接收至少一个所述数据持有方发送的所述特征数据集和第二数据提取规则,所述第二数据提取规则为:所述数据持有方接收到所述数据使用方发送的所述第一数据提取规则后,转发给所述数据服务平台的;Receiving the metadata identifier and the first data extraction rule sent by the data user, and receiving the feature data set and the second data extraction rule sent by at least one of the data holders, wherein the second data extraction rule is: after the data holder receives the first data extraction rule sent by the data user, it forwards it to the data service platform;

所述处理单元具体用于:The processing unit is specifically used for:

基于所述元数据标识,对所述第一数据提取规则和所述第二数据提取规则进行比较,若确定所述第一数据提取规则和所述第二数据提取规则相同,则对至少一个所述特征数据集进行处理生成数据产品。Based on the metadata identifier, the first data extraction rule and the second data extraction rule are compared, and if it is determined that the first data extraction rule and the second data extraction rule are the same, at least one of the feature data sets is processed to generate a data product.

可选的,所述第一接收单元具体用于:Optionally, the first receiving unit is specifically configured to:

生成使用方公钥和使用方私钥;Generate the user's public key and the user's private key;

将所述使用方公钥发送至所述数据使用方,以使所述数据使用方通过所述使用方公钥,对所述元数据标识和所述第一数据提取规则进行加密;Sending the user public key to the data user, so that the data user encrypts the metadata identifier and the first data extraction rule by using the user public key;

接收所述数据使用方发送的加密的所述元数据标识和加密的所述第一数据提取规则,并通过所述使用方私钥进行解密;receiving the encrypted metadata identifier and the encrypted first data extraction rule sent by the data user, and decrypting them using the user's private key;

所述处理单元具体用于:The processing unit is specifically used for:

接收所述数据使用方发送的平台公钥;所述平台公钥为所述数据使用方通过第一特征计算引擎生成并发送的;Receiving a platform public key sent by the data user; the platform public key is generated and sent by the data user through the first feature calculation engine;

对至少一个所述特征数据集进行处理生成数据产品,并通过所述平台公钥将所述数据产品进行加密后,传输至所述数据使用方,以使所述数据使用方接收所述数据产品后,通过所述平台私钥对所述数据产品进行解密;所述平台私钥为所述数据使用方通过所述第一特征计算引擎生成。At least one of the feature data sets is processed to generate a data product, and the data product is encrypted by the platform public key and transmitted to the data user, so that after the data user receives the data product, the data product can be decrypted by the platform private key; the platform private key is generated by the data user through the first feature calculation engine.

可选的,在所述接收至少一个数据持有方发送的特征数据集之前,所述装置还包括:Optionally, before receiving the feature data set sent by at least one data holder, the device further includes:

建立单元,用于接收所述数据使用方发送的环境建立请求后,建立针对本次数据处理的可信执行环境;An establishing unit, configured to establish a trusted execution environment for the current data processing after receiving an environment establishment request sent by the data user;

以及,处理单元具体用于:And, the processing unit is specifically used for:

在所述可信执行环境对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方;Processing at least one of the feature data sets in the trusted execution environment to generate a data product, and transmitting the data product to the data user;

确定所述数据产品传输完成后,对所述可信执行环境进行资源释放。After determining that the data product transmission is completed, the resources of the trusted execution environment are released.

可选的,所述第一接收单元具体用于:Optionally, the first receiving unit is specifically configured to:

通过所述可信执行环境生成至少一个持有方公钥和至少一个持有方私钥;所述持有方公钥与所述持有方私钥一一对应;Generate at least one holder public key and at least one holder private key through the trusted execution environment; the holder public key corresponds to the holder private key one by one;

对于每个所述数据持有方,通过所述可信执行环境将所述持有方公钥发送给所述数据持有方,以使所述数据持有方通过所述持有方公钥,对所述特征数据集和所述第二数据提取规则进行加密;For each of the data holders, sending the holder public key to the data holder through the trusted execution environment, so that the data holder encrypts the feature data set and the second data extraction rule through the holder public key;

通过所述可信执行环境接收至少一个所述数据持有方发送的加密的所述特征数据集和加密的所述第二数据提取规则,并通过对应的所述持有方私钥进行解密。The encrypted feature data set and the encrypted second data extraction rule sent by at least one of the data holders are received through the trusted execution environment, and are decrypted through the corresponding holder private key.

本申请实施例提供的另一种可信多方数据传输装置,应用于数据使用方,所述装置包括:Another trusted multi-party data transmission device provided in an embodiment of the present application is applied to a data user, and the device includes:

第一请求单元,用于向至少一个数据持有方分别发送数据授权请求;A first request unit, configured to send a data authorization request to at least one data holder;

获取单元,用于对于每个所述数据持有方,接收所述数据持有方确认授权后发送的数据目录信息,并根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;An acquisition unit, configured to receive, for each of the data holders, data directory information sent by the data holder after the data holder confirms the authorization, and acquire metadata identifiers corresponding to target original data from the data directory information according to data requirements;

生成单元,用于对于每个所述元数据标识,基于所述元数据标识和对应的所述数据需求,通过第一特征计算引擎生成对应所述目标原始数据的第一数据提取规则,并将所述元数据标识和所述第一数据提取规则发送至对应的所述数据持有方,以使所述数据持有方基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台;A generating unit is used to generate, for each metadata identifier, a first data extraction rule corresponding to the target original data through a first feature calculation engine based on the metadata identifier and the corresponding data demand, and send the metadata identifier and the first data extraction rule to the corresponding data holder, so that the data holder performs feature extraction on the target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule, and sends the feature extraction to the data service platform;

第二接收单元,用于接收所述数据服务平台发送的数据产品;所述数据产品为:所述数据服务平台对至少一个所述特征数据集进行处理生成的。The second receiving unit is used to receive a data product sent by the data service platform; the data product is generated by the data service platform by processing at least one of the feature data sets.

可选的,在所述通过第一特征计算引擎生成对应所述目标原始数据的第一数据提取规则之后,所述装置还包括:Optionally, after generating the first data extraction rule corresponding to the target original data by the first feature calculation engine, the device further includes:

第三接收单元,用于接收所述数据服务平台发送的所述使用方公钥,并通过所述使用方公钥对所述元数据标识和所述第一数据提取规则进行加密。The third receiving unit is used to receive the user public key sent by the data service platform, and encrypt the metadata identifier and the first data extraction rule through the user public key.

可选的,在通过所述使用方公钥对所述元数据标识和所述第一数据提取规则进行加密之后,所述装置还包括:Optionally, after encrypting the metadata identifier and the first data extraction rule by using the user public key, the device further includes:

第二发送单元,用于将加密的所述元数据标识和加密的所述第一数据提取规则发送至所述数据服务平台,以使所述数据服务平台接收加密的所述元数据标识和加密的所述第一数据提取规则,并通过所述使用方私钥进行解密后,基于所述元数据标识,对所述第一数据提取规则和第二数据提取规则进行比较;所述第二数据提取规则为:所述数据持有方接收到所述数据使用方发送的所述第一数据提取规则后,转发给所述数据服务平台的。The second sending unit is used to send the encrypted metadata identifier and the encrypted first data extraction rule to the data service platform, so that the data service platform receives the encrypted metadata identifier and the encrypted first data extraction rule, and after decrypting them through the user's private key, compares the first data extraction rule and the second data extraction rule based on the metadata identifier; the second data extraction rule is: after the data holder receives the first data extraction rule sent by the data user, it forwards it to the data service platform.

可选的,在所述向至少一个数据持有方发送数据授权请求之前,所述装置还包括:Optionally, before sending the data authorization request to at least one data holder, the device further includes:

第一注册单元,用于在所述数据服务平台进行注册后,通过所述第一特征计算引擎生成至少一个第一通信密钥;每个所述第一通信密钥对应一个数据持有方;A first registration unit, configured to generate at least one first communication key through the first feature calculation engine after registering on the data service platform; each first communication key corresponds to a data holder;

所述第一请求单元,用于通过所述数据服务平台向所述数据持有方发送数据授权请求;The first request unit is used to send a data authorization request to the data holder through the data service platform;

确定所述数据持有方确认授权后,基于所述第一特征计算引擎和所述数据持有方的所述第二特征计算引擎共同建立密文通道;After determining that the data holder confirms the authorization, jointly establishing a ciphertext channel based on the first feature calculation engine and the second feature calculation engine of the data holder;

通过所述密文通道接收所述数据持有方发送的加密的所述数据目录信息,并通过对应的所述第一通信密钥进行解密。The encrypted data directory information sent by the data holder is received through the ciphertext channel, and is decrypted using the corresponding first communication key.

可选的,所述生成单元具体用于:Optionally, the generating unit is specifically used for:

通过所述第一通信密钥将所述元数据标识和所述第一数据提取规则进行加密;encrypting the metadata identifier and the first data extraction rule by using the first communication key;

通过所述密文通道,将加密的所述元数据标识和所述第一数据提取规则发送至对应的所述数据持有方。The encrypted metadata identifier and the first data extraction rule are sent to the corresponding data holder through the ciphertext channel.

可选的,所述第二接收单元具体用于:Optionally, the second receiving unit is specifically configured to:

通过所述第一特征计算引擎生成平台私钥和平台公钥;Generate a platform private key and a platform public key through the first feature computing engine;

将所述平台公钥发送给所述数据服务平台,以使所述数据服务平台通过所述平台公钥将所述数据产品进行加密;Sending the platform public key to the data service platform, so that the data service platform encrypts the data product by using the platform public key;

接收所述数据服务平台发送的加密的所述数据产品,并通过所述平台私钥进行解密。The encrypted data product sent by the data service platform is received, and decrypted using the platform private key.

可选的,在所述接收所述数据持有方确认授权后发送的数据目录信息之后,所述装置还包括:Optionally, after receiving the data directory information sent by the data holder after confirming the authorization, the device further includes:

第二请求单元,用于向所述数据服务平台发送可信环境建立请求,以使所述数据服务平台建立针对本次数据传输的可信执行环境。The second request unit is used to send a trusted environment establishment request to the data service platform, so that the data service platform establishes a trusted execution environment for this data transmission.

本申请实施例提供的又一种可信多方数据传输装置,应用于数据持有方,所述装置包括:Another trusted multi-party data transmission device provided in an embodiment of the present application is applied to a data holder, and the device includes:

授权单元,用于接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至所述数据使用方,以使所述数据使用方根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;The authorization unit is used to receive a data authorization request sent by a data user, and after confirming the authorization, send the data directory information to the data user, so that the data user can obtain the metadata identifier corresponding to the target original data from the data directory information according to the data demand;

特征提取单元,用于接收到所述数据使用方发送的元数据标识和所述第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,获取特征数据集;A feature extraction unit, configured to extract features of target original data corresponding to the metadata identifier by a second feature calculation engine based on the first data extraction rule after receiving the metadata identifier and the first data extraction rule sent by the data user, so as to obtain a feature data set;

第一发送单元,用于将所述特征数据集发送至数据服务平台,以使所述数据服务平台对所述特征数据集进行处理生成数据产品,并发送给所述数据使用方。The first sending unit is used to send the feature data set to a data service platform, so that the data service platform processes the feature data set to generate a data product, and sends the data product to the data user.

可选的,在所述将所述特征数据集发送至数据服务平台之前,所述装置还包括:Optionally, before sending the feature data set to the data service platform, the device further includes:

第四接收单元,用于接收所述数据服务平台的可信执行环境发送的持有方公钥,并通过所述持有方公钥对所述特征数据集和第二数据提取规则进行加密;所述可信执行环境为:所述数据服务平台接收所述数据使用方发送的可信环境建立请求后建立的;A fourth receiving unit is used to receive a holder public key sent by a trusted execution environment of the data service platform, and encrypt the feature data set and the second data extraction rule by means of the holder public key; the trusted execution environment is established after the data service platform receives a trusted environment establishment request sent by the data user;

将加密的所述特征数据集和加密的所述第二数据提取规则发送至所述可信执行环境,以使所述可信执行环境接收加密的所述特征数据集和加密的所述第二数据提取规则,并通过持有方私钥进行解密后,基于所述元数据标识,对所述第一数据提取规则和第二数据提取规则进行比较。The encrypted feature data set and the encrypted second data extraction rule are sent to the trusted execution environment, so that the trusted execution environment receives the encrypted feature data set and the encrypted second data extraction rule, and after decrypting them through the holder's private key, the first data extraction rule and the second data extraction rule are compared based on the metadata identifier.

可选的,在所述接收数据使用方发送的数据授权请求之前,所述装置还包括:Optionally, before receiving the data authorization request sent by the data user, the device further includes:

第二注册单元,用于在所述数据服务平台进行注册后,通过所述第二特征计算引擎生成第二通信密钥;A second registration unit, configured to generate a second communication key through the second feature calculation engine after registering on the data service platform;

所述授权单元具体用于:The authorization unit is specifically used for:

通过所述数据服务平台接收所述数据使用方发送的所述数据授权请求;Receiving the data authorization request sent by the data user through the data service platform;

确认授权后,通过所述第二通信密钥对所述数据目录信息进行加密,并基于所述第二特征计算引擎和所述数据使用方的所述第一特征计算引擎共同建立密文通道;After confirming the authorization, encrypt the data directory information by using the second communication key, and jointly establish a ciphertext channel based on the second feature calculation engine and the first feature calculation engine of the data user;

通过所述密文通道,将加密的所述数据目录信息发送至所述数据使用方,以使所述数据使用方通过所述密文通道接收加密的所述数据目录信息,并通过第一通信密钥进行解密。The encrypted data directory information is sent to the data user through the ciphertext channel, so that the data user receives the encrypted data directory information through the ciphertext channel and decrypts it using the first communication key.

可选的,所述特征提取单元具体用于:Optionally, the feature extraction unit is specifically used for:

通过所述密文通道,接收加密的所述元数据标识和加密的所述第一数据提取规则,并通过所述第二通信密钥进行解密;所述元数据标识和所述第一数据提取规则为所述数据使用方通过第一通信密钥加密的。The encrypted metadata identifier and the encrypted first data extraction rule are received through the ciphertext channel and decrypted using the second communication key; the metadata identifier and the first data extraction rule are encrypted by the data user using the first communication key.

本申请实施例提供一种计算机可读存储介质,其包括计算机程序,当所述计算机程序在电子设备上运行时,所述计算机程序用于使所述电子设备执行上述任意一种可信多方数据传输方法的步骤。An embodiment of the present application provides a computer-readable storage medium, which includes a computer program. When the computer program is executed on an electronic device, the computer program is used to enable the electronic device to execute the steps of any one of the above-mentioned trusted multi-party data transmission methods.

本申请实施例提供一种计算机程序产品,所述计算机程序产品包括计算机程序,所述计算机程序存储在计算机可读存储介质中;当电子设备的处理器从计算机可读存储介质读取所述计算机程序时,所述处理器执行所述计算机程序,使得所述电子设备执行上述任意一种可信多方数据传输方法的步骤。An embodiment of the present application provides a computer program product, which includes a computer program, and the computer program is stored in a computer-readable storage medium; when a processor of an electronic device reads the computer program from the computer-readable storage medium, the processor executes the computer program, so that the electronic device performs the steps of any one of the above-mentioned trusted multi-party data transmission methods.

本申请有益效果如下:The beneficial effects of this application are as follows:

本申请实施例提供了一种可信多方数据传输方法、装置、电子设备和存储介质。在本申请实施例中,通过设置数据服务平台,接收至少一个数据持有方对目标原始数据进行特征提取得到的特征数据集,避免了数据服务平台直接接收到数据持有方的目标原始数据,使得目标原始数据不会在多端进行数据传输时被泄露,同时,特征数据集具备高压缩特性,大大减少了数据包大小,降低了网络传输压力。进而,数据服务平台对至少一个特征数据集进行处理生成数据产品,并将数据产品传输给数据使用方,这样一来,在数据传输过程中,数据使用方也只能接受到最终生成的数据产品,无法直接接收到目标原始数据,避免了目标原始数据的泄露。The embodiments of the present application provide a trusted multi-party data transmission method, device, electronic device and storage medium. In the embodiments of the present application, by setting up a data service platform, a feature data set obtained by extracting features from target original data by at least one data holder is received, thereby avoiding the data service platform from directly receiving the target original data of the data holder, so that the target original data will not be leaked during data transmission between multiple terminals. At the same time, the feature data set has a high compression characteristic, which greatly reduces the size of the data packet and reduces the pressure of network transmission. Furthermore, the data service platform processes at least one feature data set to generate a data product, and transmits the data product to the data user. In this way, during the data transmission process, the data user can only receive the final generated data product and cannot directly receive the target original data, thereby avoiding the leakage of the target original data.

综上,本申请实施例通过不直接在数据传输过程中传输目标原始数据,降低了数据传输过程中的泄露风险,从而降低了数据价值流失风险及数据传输的网络压力。In summary, the embodiments of the present application reduce the risk of leakage during data transmission by not directly transmitting the target original data during the data transmission process, thereby reducing the risk of data value loss and the network pressure of data transmission.

本申请的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点可通过在所写的说明书、权利要求书、以及附图中所特别指出的结构来实现和获得。Other features and advantages of the present application will be described in the subsequent description, and partly become apparent from the description, or understood by practicing the present application. The purpose and other advantages of the present application can be realized and obtained by the structures specifically pointed out in the written description, claims, and drawings.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described herein are used to provide a further understanding of the present application and constitute a part of the present application. The illustrative embodiments of the present application and their descriptions are used to explain the present application and do not constitute an improper limitation on the present application. In the drawings:

图1为本申请实施例提供的一种可信多方数据传输方法的应用场景示意图;FIG1 is a schematic diagram of an application scenario of a trusted multi-party data transmission method provided in an embodiment of the present application;

图2为本申请实施例提供的一种可信多方数据传输方法的实施流程图;FIG2 is a flowchart of an implementation of a trusted multi-party data transmission method provided in an embodiment of the present application;

图3为本申请实施例提供的另一种可信多方数据传输方法的实施流程图;FIG3 is a flowchart of another implementation method of a trusted multi-party data transmission method provided in an embodiment of the present application;

图4为本申请实施例提供的又一种可信多方数据传输方法的实施流程图;FIG4 is a flowchart of another implementation method of a trusted multi-party data transmission method provided in an embodiment of the present application;

图5为本申请实施例提供的一种可信多方数据传输方法的交互示意图;FIG5 is an interactive schematic diagram of a trusted multi-party data transmission method provided in an embodiment of the present application;

图6为本申请实施例提供的一种可信多方数据传输方法的流程图;FIG6 is a flow chart of a trusted multi-party data transmission method provided in an embodiment of the present application;

图7A为本申请实施例中的一种可信多方数据传输装置的结构示意图;FIG7A is a schematic diagram of the structure of a trusted multi-party data transmission device in an embodiment of the present application;

图7B为本申请实施例中的另一种可信多方数据传输装置的结构示意图;FIG7B is a schematic diagram of the structure of another trusted multi-party data transmission device in an embodiment of the present application;

图7C为本申请实施例中的又一种可信多方数据传输装置的结构示意图;FIG7C is a schematic diagram of the structure of another trusted multi-party data transmission device in an embodiment of the present application;

图8为应用本申请实施例的一种电子设备的一个硬件组成结构示意图;FIG8 is a schematic diagram of a hardware structure of an electronic device using an embodiment of the present application;

图9为应用本申请实施例的一种计算装置的一个硬件组成结构示意图。FIG. 9 is a schematic diagram of a hardware structure of a computing device using an embodiment of the present application.

具体实施方式DETAILED DESCRIPTION

为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请技术方案的一部分实施例,而不是全部的实施例。基于本申请文件中记载的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请技术方案保护的范围。In order to make the purpose, technical solution and advantages of the embodiments of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the technical solution of the present application, rather than all of the embodiments. Based on the embodiments recorded in the application documents, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the technical solution of the present application.

下面对本申请实施例中涉及的部分概念进行介绍。Some concepts involved in the embodiments of the present application are introduced below.

目标原始数据:指数据持有方所持有的原始数据中可以被数据使用方进行加工、使用的数据。原始数据为收集或产生时,未经修改、清晰和分析的最初始状态的数据。以汽车领域为例,数据持有方可以是主机厂,则原始数据可以包含汽车中各结构件的数据、汽车的碰撞数据等等。Target raw data: refers to the raw data held by the data holder that can be processed and used by the data user. Raw data is the data in its most initial state when it is collected or generated, without modification, clarity, and analysis. Taking the automotive field as an example, the data holder can be the OEM, and the raw data can include data on various structural parts in the car, collision data of the car, etc.

第一特征提取规则和第二特征提取规则:第一特征提取规则为数据使用方针对目标原始数据生成的规则,符合数据使用方的数据需求,可以约束目标原始数据的数据需求、数据使用方等等。第二特征提取规则为数据持有方接收到数据使用方发送的第一特征提取规则后,转发给数据服务平台的,第二特征提取规则与第一特征提取规则可能相同也可能不同,当第一特征提取规则在发送给数据持有方的过程中发生泄漏时,则第二特征提取规则与第一特征提取规则不同;当第一特征提取规则在发送给数据持有方的过程中未发生泄漏时,则第二特征提取规则与第一特征提取规则相同。The first feature extraction rule and the second feature extraction rule: The first feature extraction rule is a rule generated by the data user for the target original data, which meets the data requirements of the data user and can constrain the data requirements of the target original data, the data user, etc. The second feature extraction rule is forwarded to the data service platform by the data holder after receiving the first feature extraction rule sent by the data user. The second feature extraction rule may be the same as or different from the first feature extraction rule. When the first feature extraction rule is leaked during the process of being sent to the data holder, the second feature extraction rule is different from the first feature extraction rule; when the first feature extraction rule is not leaked during the process of being sent to the data holder, the second feature extraction rule is the same as the first feature extraction rule.

可信执行环境(Trusted Execution Environment, TEE):是一种在现代处理器中实现的安全计算环境,其为敏感数据和应用程序提供了一个隔离且安全的运行空间。通常配备有安全的存储空间,用于存放密钥、敏感数据等,具备强大的加密和解密能力,可以进行安全的数据处理和通信。广泛应用于移动设备、物联网、云计算、支付系统和身份验证等领域,是实现设备安全、数据保护和隐私安全的重要手段。Trusted Execution Environment (TEE): is a secure computing environment implemented in modern processors, which provides an isolated and secure operating space for sensitive data and applications. It is usually equipped with a secure storage space for storing keys, sensitive data, etc., and has strong encryption and decryption capabilities, allowing for secure data processing and communication. It is widely used in mobile devices, the Internet of Things, cloud computing, payment systems, and identity authentication, and is an important means to achieve device security, data protection, and privacy security.

考虑到相关技术中在进行数据传输以及多方数据融合时,其基于多方数据融合构建数据产品时是基于彼此间的强信任,在弱可信情况下则无法进行数据传输和数据融合,阻止了数据要素的流转;并且,相关技术的技术方案在进行数据传输时仍是基于原始数据拷贝,一旦该技术存在安全风险,很容易致使原始数据被复制,从而导致数据价值流失及滥用;此外,当原始数据容量大时,其传输过程容易受网络影响。Considering that in the relevant technologies, when data transmission and multi-party data fusion are carried out, the data products built based on multi-party data fusion are based on strong trust between each other. In the case of weak trust, data transmission and data fusion cannot be carried out, which prevents the flow of data elements. Moreover, the technical solutions of the relevant technologies are still based on the copy of original data when transmitting data. Once there are security risks in this technology, it is easy to cause the original data to be copied, thereby leading to the loss and abuse of data value. In addition, when the original data capacity is large, its transmission process is easily affected by the network.

针对上述技术问题及缺陷,本申请实施例提供一种可信多方数据传输方法、装置、电子设备和存储介质。创新性的提出通过特征数据集作为交换媒介来降低目标原始数据出域风险,在弱可信第三方环境下实现多方数据融合开发。在多源数据持有方提供目标原始数据时,将各数据持有方的目标原始数据的特征根据数据使用方的第一数据提取规则提取出来,形成特征数据集,将特征数据集进行有效压缩后,通过加密方式传输给可信执行环境。在可信执行环境中通过对比第一数据提取规则和第二数据提取规则进行传输安全验证,验证通过后通过特征数据集进行融合计算,生成数据产品。In response to the above-mentioned technical problems and defects, the embodiments of the present application provide a trusted multi-party data transmission method, device, electronic device and storage medium. It innovatively proposes to use feature data sets as exchange media to reduce the risk of target original data going out of the domain, and realize multi-party data fusion development in a weakly trusted third-party environment. When the multi-source data holders provide the target original data, the characteristics of the target original data of each data holder are extracted according to the first data extraction rule of the data user to form a feature data set. After the feature data set is effectively compressed, it is transmitted to the trusted execution environment in an encrypted manner. In the trusted execution environment, transmission security verification is performed by comparing the first data extraction rule and the second data extraction rule. After the verification is passed, the feature data set is used for fusion calculation to generate a data product.

综上,本申请实施例在垂直产业链多方参与的情形下利用目标原始数据共同开发融合形成价值数据产品,同时保持数据权属不变,在目标原始数据不出域的情况下,在弱可信第三方环境下提升数据价值变现,加速数据要素流通。In summary, the embodiments of the present application utilize target original data to jointly develop and integrate valuable data products with the participation of multiple parties in the vertical industrial chain, while keeping the data ownership unchanged. In the case where the target original data does not leave the domain, the data value realization is improved in a weakly trusted third-party environment, and the circulation of data elements is accelerated.

以下结合说明书附图对本申请的优选实施例进行说明,应当理解,此处所描述的优选实施例仅用于说明和解释本申请,并不用于限定本申请,并且在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The preferred embodiments of the present application are described below in conjunction with the drawings in the specification. It should be understood that the preferred embodiments described herein are only used to illustrate and explain the present application, and are not used to limit the present application. In addition, the embodiments and features in the embodiments of the present application may be combined with each other if there is no conflict.

如图1所示,其为本申请实施例的应用场景示意图。该应用场景图中包括两个终端设备110和一个服务器120。As shown in Fig. 1, it is a schematic diagram of an application scenario of an embodiment of the present application. The application scenario diagram includes two terminal devices 110 and a server 120.

其中,数据使用方登录的终端设备110可以记作使用方终端设备110,数据持有方登录的终端设备110可以记作持有方终端设备110,数据服务平台部署在服务器120上。Among them, the terminal device 110 logged in by the data user can be recorded as the user terminal device 110, the terminal device 110 logged in by the data holder can be recorded as the holder terminal device 110, and the data service platform is deployed on the server 120.

本申请实施例提供的数据传输方法可以由使用方终端设备110、持有方终端设备110以及服务器120共同执行,数据使用方在使用方终端设备110上,向至少一个数据持有方发送数据授权请求,数据持有方在持有方终端设备110上接收到数据授权请求后,若确认授权,则在持有方终端设备110上将数据目录信息发送给使用方终端设备110,数据使用方在使用方终端设备110上接收到数据目录信息后,根据数据需求从数据目录信息中获取目标原始数据对应的元数据标识,并基于元数据标识和对应的数据需求,通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则,并将元数据标识和第一数据提取规则发送至对应的数据持有方,数据持有方在持有方终端设备110上接收到元数据标识和第一数据提取规则后,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台;数据服务平台通过服务器120接收至少一个数据持有方发送的特征数据集后,对至少一个特征数据集进行处理生成数据产品,并将数据产品传输至数据使用方。The data transmission method provided in the embodiment of the present application can be jointly executed by the user terminal device 110, the holder terminal device 110 and the server 120. The data user sends a data authorization request to at least one data holder on the user terminal device 110. After the data holder receives the data authorization request on the holder terminal device 110, if the authorization is confirmed, the holder terminal device 110 sends the data directory information to the user terminal device 110. After the data user receives the data directory information on the user terminal device 110, the data user obtains the metadata identifier corresponding to the target original data from the data directory information according to the data demand, and based on the metadata identifier and the corresponding metadata, obtains the metadata identifier corresponding to the target original data from the data directory information. In response to data needs, a first data extraction rule corresponding to the target original data is generated through the first feature calculation engine, and the metadata identifier and the first data extraction rule are sent to the corresponding data holder. After the data holder receives the metadata identifier and the first data extraction rule on the holder's terminal device 110, based on the first data extraction rule, the second feature calculation engine is used to extract features of the target original data corresponding to the metadata identifier, and the extracted features are sent to the data service platform. After the data service platform receives the feature data set sent by at least one data holder through the server 120, it processes the at least one feature data set to generate a data product, and transmits the data product to the data user.

在一种可选的实施方式中,两个终端设备110之间,以及任意终端设备110与服务器120之间可以通过通信网络进行通信。In an optional implementation, two terminal devices 110 , as well as any terminal device 110 and the server 120 , can communicate via a communication network.

在一种可选的实施方式中,通信网络是有线网络或无线网络。In an optional implementation, the communication network is a wired network or a wireless network.

需要说明的是,图1所示只是举例说明,实际上终端设备和服务器的数量不受限制,在本申请实施例中不做具体限定。It should be noted that what is shown in FIG. 1 is only an example. In fact, the number of terminal devices and servers is not limited and is not specifically limited in the embodiments of the present application.

下面结合上述描述的应用场景,参考附图来描述本申请示例性实施方式提供的数据传输方法,需要注意的是,上述应用场景仅是为了便于理解本申请的精神和原理而示出,本申请的实施方式在此方面不受任何限制。The following describes the data transmission method provided by the exemplary embodiment of the present application in combination with the application scenario described above and with reference to the accompanying drawings. It should be noted that the above application scenario is only shown to facilitate understanding of the spirit and principles of the present application, and the implementation of the present application is not limited in this regard.

参阅图2所示,其为本申请实施例提供的一种可信多方数据传输方法的实施流程图,应用于数据服务平台,该方法的具体实施流程包括S21~S22:Refer to FIG. 2 , which is a flowchart of an implementation of a trusted multi-party data transmission method provided in an embodiment of the present application, which is applied to a data service platform. The specific implementation process of the method includes S21 to S22:

S21:数据服务平台接收至少一个数据持有方发送的特征数据集;S21: The data service platform receives a feature data set sent by at least one data holder;

其中,特征数据集为:数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取得到的。Among them, the feature data set is: after the data holder receives the metadata identifier and the first data extraction rule sent by the data user, based on the first data extraction rule, the feature calculation engine extracts the target original data corresponding to the metadata identifier.

元数据标识是数据使用方根据数据需求从数据持有方确认授权后发送的数据目录信息中获取的,第一数据提取规则为:数据使用方基于元数据标识和对应的数据需求,通过第一特征计算引擎生成的。The metadata identifier is obtained by the data user according to data requirements from the data directory information sent by the data holder after confirming the authorization. The first data extraction rule is: the data user generates it through the first feature calculation engine based on the metadata identifier and the corresponding data requirements.

其中,数据目录信息为数据持有方持有的目标原始数据的目录,可以使数据使用方通过该数据目录信息确定自己需要的目标原始数据,其包括但不限于:该数据目录的唯一标识、该数据目录信息的大小、该数据目录的介绍、该数据目录包含的元数据字段标识、元数据字段含义。Among them, the data directory information is the directory of the target original data held by the data holder, which enables the data user to determine the target original data he needs through the data directory information, which includes but is not limited to: the unique identifier of the data directory, the size of the data directory information, the introduction of the data directory, the metadata field identifier contained in the data directory, and the meaning of the metadata field.

在本申请实施例中,每个数据持有方均向数据服务平台发送一个特征数据集,该特征数据集的大小远小于用于生成该特征数据集的目标原始数据的大小,且特征数据集相比于目标原始数据更容易被压缩,因此,在数据持有方向数据服务平台传输数据特征集时,由于数据较小,不容易受到网络波动的影响,同时,大大降低了网络传输压力以及传输时间。In an embodiment of the present application, each data holder sends a feature data set to the data service platform. The size of the feature data set is much smaller than the size of the target original data used to generate the feature data set, and the feature data set is easier to compress than the target original data. Therefore, when the data holder transmits the data feature set to the data service platform, the data is less susceptible to network fluctuations due to its small size. At the same time, the network transmission pressure and transmission time are greatly reduced.

其中,数据持有方指的是持有原始数据的一端,目标原始数据为数据持有方的原始数据中可以由数据使用方或数据服务平台进行数据处理的数据。以汽车领域为例,数据持有方可以是主机厂,其持有的原始数据可以为结构件数据、碰撞数据和测试数据等。数据使用方指的是需要原始数据进行分析、计算建模等操作后的数据产品的一端,仍以汽车领域为例,数据使用方可以是各个汽车零售商、汽车经销商以及汽车售后方等等。The data holder refers to the end that holds the original data, and the target original data refers to the data in the original data of the data holder that can be processed by the data user or data service platform. Taking the automotive field as an example, the data holder can be the OEM, and the original data it holds can be structural parts data, collision data, and test data, etc. The data user refers to the end of the data product that needs to be analyzed, calculated, modeled, and other operations on the original data. Still taking the automotive field as an example, the data users can be various automobile retailers, automobile dealers, and automobile after-sales parties, etc.

在本申请实施例,由于数据使用方和数据持有方之间也需要传输数据目录信息、元数据标识、第一数据提取规则等等,为保证数据传输安全,本申请实施例在数据使用方和数据持有方进行数据传输时,一种可选的实施方式如下:In the embodiment of the present application, since data directory information, metadata identifier, first data extraction rule, etc. need to be transmitted between the data user and the data holder, in order to ensure data transmission security, in the embodiment of the present application, when the data user and the data holder perform data transmission, an optional implementation method is as follows:

对于数据使用方,确定数据使用方进行注册后,数据使用方通过第一特征计算引擎生成至少一个第一通信密钥,以使数据使用方通过第一通信密钥对加密的数据目录信息进行解密;每个第一通信密钥对应一个数据持有方。For the data user, after it is determined that the data user has registered, the data user generates at least one first communication key through the first feature calculation engine, so that the data user can decrypt the encrypted data directory information through the first communication key; each first communication key corresponds to a data holder.

具体的,数据使用方在数据服务平台进行注册后,数据使用方通过第一特征计算引擎生成至少一个第一通信密钥。由于数据持有方可能有多个,对于每个数据持有方,数据使用方均会接收到数据服务平台分配的一个第一通信密钥。Specifically, after the data user registers on the data service platform, the data user generates at least one first communication key through the first feature calculation engine. Since there may be multiple data holders, for each data holder, the data user will receive a first communication key assigned by the data service platform.

对于每个数据持有方,确定数据持有方进行注册后,通过第二特征计算引擎生成第二通信密钥。For each data holder, after it is determined that the data holder is registered, a second communication key is generated by a second feature calculation engine.

具体的,数据持有方在数据服务平台注册后,数据持有方通过第二特征计算引擎生成的第二通信密钥,该第二通信密钥与数据使用方的一个第一通信密钥对应。Specifically, after the data holder registers on the data service platform, the data holder generates a second communication key through the second feature calculation engine, and the second communication key corresponds to a first communication key of the data user.

例如,若存在3个数据持有方:数据持有方1、数据持有方2和数据持有方3,则数据持有方通过第一特征计算引擎生成3个第一通信密钥:第一通信密钥1、第一通信密钥2和第一通信密钥3,第一通信密钥1用于与数据持有方1进行数据传输,第一通信密钥2用于与数据持有方2进行数据传输,第一通信密钥3用于与数据持有方3进行数据传输。For example, if there are three data holders: data holder 1, data holder 2 and data holder 3, the data holders generate three first communication keys through the first feature calculation engine: first communication key 1, first communication key 2 and first communication key 3. The first communication key 1 is used for data transmission with data holder 1, the first communication key 2 is used for data transmission with data holder 2, and the first communication key 3 is used for data transmission with data holder 3.

在上述实施方式中,数据使用方和数据持有方通过各自特征计算引擎生成互相对应的通信密钥,保证了数据使用方和数据持有方之间的数据传输安全。In the above implementation, the data user and the data holder generate corresponding communication keys through their respective feature calculation engines, thereby ensuring the security of data transmission between the data user and the data holder.

通过如上方式使数据使用方和数据持有方各自生成通信密钥后,本申请实施例中通过如下方式实现数据使用方与数据持有方之间的数据传输:After the data user and the data holder each generate a communication key in the above manner, the data transmission between the data user and the data holder is realized in the following manner in the embodiment of the present application:

对于数据使用方,数据使用方通过数据服务平台向数据持有方发送数据授权请求;数据使用方确定数据持有方确认授权后,基于第一特征计算引擎和数据持有方的第二特征计算引擎共同建立密文通道;通过密文通道接收数据持有方发送的加密的数据目录信息,并通过对应的第一通信密钥进行解密。For data users, the data users send data authorization requests to the data holders through the data service platform; after the data user determines that the data holder confirms the authorization, a ciphertext channel is jointly established based on the first feature calculation engine and the data holder's second feature calculation engine; the encrypted data directory information sent by the data holder is received through the ciphertext channel, and decrypted using the corresponding first communication key.

对于每个数据持有方,数据持有方通过数据服务平台接收数据使用方发送的数据授权请求;确认授权后,通过第二通信密钥对数据目录信息进行加密,并基于第二特征计算引擎和数据使用方的第一特征计算引擎共同建立密文通道;通过密文通道,将加密的数据目录信息发送至数据使用方,以使数据使用方通过密文通道接收加密的数据目录信息,并通过第一通信密钥进行解密。For each data holder, the data holder receives the data authorization request sent by the data user through the data service platform; after confirming the authorization, the data directory information is encrypted by the second communication key, and a ciphertext channel is jointly established based on the second feature calculation engine and the first feature calculation engine of the data user; the encrypted data directory information is sent to the data user through the ciphertext channel, so that the data user receives the encrypted data directory information through the ciphertext channel and decrypts it through the first communication key.

具体的,在数据使用发获取数据持有方的授权后,数据使用方和数据持有方通过各自的特征计算引擎,共同建立密文通道,如密文对等网络(Peer-to-Peer,P2P)通道。Specifically, after the data user obtains the authorization of the data holder, the data user and the data holder jointly establish a ciphertext channel, such as a ciphertext peer-to-peer (P2P) channel, through their respective feature calculation engines.

在建立密文通道后,每个确认授权给数据使用方的数据持有方,均会通过各自的第二通信密钥对各自的数据目录信息进行加密,进而,将加密后的数据目录信息通过各自的密文通道发送给数据使用方,数据使用方通过每个密文通道接收到加密的至少一个数据目录信息后,通过对应的第一通信密钥对每个数据目录信息进行解密,并进行以下操作:After the ciphertext channel is established, each data holder who confirms the authorization to the data user will encrypt their own data directory information with their own second communication key, and then send the encrypted data directory information to the data user through their own ciphertext channel. After the data user receives at least one encrypted data directory information through each ciphertext channel, it decrypts each data directory information with the corresponding first communication key and performs the following operations:

操作1:根据数据需求从每个数据目录信息中获取其需要的目标原始数据的元数据标识;并且,对于每个元数据标识,基于元数据标识和对应的数据需求,通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则。Operation 1: Obtain the metadata identifier of the target original data required from each data directory information according to data requirements; and, for each metadata identifier, generate a first data extraction rule corresponding to the target original data through a first feature calculation engine based on the metadata identifier and the corresponding data requirements.

其中,第一数据提取规则可以约束目标原始数据的数据属性、数据使用方式等,使根据第一数据提取规则对目标原始数据进行处理后,符合数据使用方的数据需求。Among them, the first data extraction rule can constrain the data attributes, data usage methods, etc. of the target original data, so that after the target original data is processed according to the first data extraction rule, it meets the data needs of the data user.

具体的,由于数据目录信息中包含元数据(字段)标识以及元数据字段含义,数据使用方通过元数据字段含义即可确定该元数据字段对应的元数据是否符合自己的数据需求,在确定自己需要的目标原始数据后,即可在数据目录信息中确定该目标原始数据对应的元数据(字段)标识。Specifically, since the data directory information contains metadata (field) identifiers and metadata field meanings, data users can determine whether the metadata corresponding to the metadata field meets their data needs through the metadata field meanings. After determining the target original data they need, they can determine the metadata (field) identifier corresponding to the target original data in the data directory information.

进而,根据数据需求即可基于元数据(字段)标识,生成针对该目标原始数据的第一数据提取规则,该第一数据提取规则可以使数据持有方对该目标原始数据进行符合数据使用方数据需求的处理。Furthermore, according to data requirements, a first data extraction rule for the target original data can be generated based on metadata (field) identification. The first data extraction rule can enable the data holder to process the target original data in accordance with the data requirements of the data user.

在上述实施方式中,本申请实施例通过数据使用方在数据目录信息中获取原始数据标识的方式,避免了数据持有方直接将原始数据发送给数据使用方的过程中造成的数据泄露,大大降低了泄露风险。In the above implementation manner, the embodiment of the present application avoids data leakage caused by the data holder directly sending the original data to the data user by allowing the data user to obtain the original data identifier in the data directory information, thereby greatly reducing the risk of leakage.

操作2:向数据服务平台发送环境建立请求,以使数据服务平台建立针对本次数据传输的可信执行环境。Operation 2: Send an environment establishment request to the data service platform so that the data service platform can establish a trusted execution environment for this data transmission.

具体的,为了降低数据服务平台处的泄露风险,本申请实施例在数据服务平台中创建可信执行环境,用于进行本次数据传输。Specifically, in order to reduce the risk of leakage at the data service platform, the embodiment of the present application creates a trusted execution environment in the data service platform for performing this data transmission.

在本申请实施例建立可信执行环境时,一种可选的执行方式如下:When establishing a trusted execution environment in the embodiment of the present application, an optional execution method is as follows:

接收数据使用方发送的环境建立请求后,建立针对本次数据处理的可信执行环境。After receiving the environment establishment request sent by the data user, a trusted execution environment for this data processing is established.

具体的,数据服务平台包括任务管理模块,数据服务平台在接收到环境建立请求,即数据使用方通过使用方终端设备调用数据服务平台的任务管理模块建立针对本次数据处理的可信执行环境。Specifically, the data service platform includes a task management module. When the data service platform receives an environment establishment request, the data user calls the task management module of the data service platform through the user terminal device to establish a trusted execution environment for this data processing.

在上述实施方式中,本申请实施例通过在数据服务平台中建立可信执行环境,有利于降低后续数据服务平台与数据使用方或数据持有方进行数据交互时的泄露风险。In the above implementation manner, the embodiment of the present application establishes a trusted execution environment in the data service platform, which is conducive to reducing the risk of leakage when the data service platform interacts with data users or data holders in the subsequent data service platform.

操作3:通过第一通信密钥将元数据标识和第一数据提取规则进行加密;通过密文通道,将加密的元数据标识和第一数据提取规则发送至对应的数据持有方。Operation 3: Encrypt the metadata identifier and the first data extraction rule by using the first communication key; and send the encrypted metadata identifier and the first data extraction rule to the corresponding data holder through the ciphertext channel.

具体的,对于数据持有方,通过密文通道,接收加密的元数据标识和加密的第一数据提取规则,并通过第二通信密钥进行解密。Specifically, the data holder receives the encrypted metadata identifier and the encrypted first data extraction rule through the ciphertext channel, and decrypts them through the second communication key.

在上述实施方式中,本申请实施例中数据持有方所持有的原始数据始终未被传输给数据使用方和数据服务平台,而是通过数据使用方发送元数据标识和第一数据提取规则,有利于后续在数据持有方处进行数据提取,因此原始数据无需拷贝出域,降低了数据价值流失风险。In the above implementation mode, the original data held by the data holder in the embodiment of the present application is never transmitted to the data user and the data service platform. Instead, the metadata identifier and the first data extraction rule are sent by the data user, which is conducive to the subsequent data extraction at the data holder. Therefore, the original data does not need to be copied out of the domain, reducing the risk of data value loss.

通过上述方式,使得数据持有方顺利接收到了数据使用方的元数据标识和第一数据提取规则,进而,即可通过如下方式,使得数据持有方将目标原始数据加工成符合数据使用方数据需求的结果:Through the above method, the data holder successfully receives the metadata identifier and the first data extraction rule of the data user. Then, the data holder can process the target original data into a result that meets the data requirements of the data user through the following method:

对于数据持有方,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,获取特征数据集。For the data holder, based on the first data extraction rule, the second feature calculation engine performs feature extraction on the target original data corresponding to the metadata identifier to obtain a feature data set.

具体的,数据持有方根据接收到的元数据标识,确定对应的目标原始数据,进而,通过第二特征计算引擎对本地的目标原始数据进行特征提取,包括但不限于矩阵特征计算、向量特征计算等,生成特征数据集。Specifically, the data holder determines the corresponding target original data based on the received metadata identifier, and then uses the second feature calculation engine to extract features from the local target original data, including but not limited to matrix feature calculation, vector feature calculation, etc., to generate a feature data set.

在上述实施方式中,本申请实施例通过在数据持有方处对目标原始数据进行特征提取,因此数据持有方中的目标原始数据无需拷贝出域,降低了数据价值流失风险。In the above implementation manner, the embodiment of the present application extracts features from the target original data at the data holder, so the target original data in the data holder does not need to be copied out of the domain, thereby reducing the risk of data value loss.

在本申请实施例中,除了数据使用方和数据持有方之间具有通信密钥,为降低数据服务平台和数据使用方在数据传输时额泄露风险,在本申请实施例中的数据服务平台与数据使用方进行交互时,一种可选的实施方式如下:In the embodiment of the present application, in addition to the communication key between the data user and the data holder, in order to reduce the risk of data leakage between the data service platform and the data user during data transmission, when the data service platform in the embodiment of the present application interacts with the data user, an optional implementation method is as follows:

生成使用方公钥和使用方私钥;将使用方公钥发送至数据使用方,以使数据使用方通过使用方公钥,对元数据标识和第一数据提取规则进行加密;接收数据使用方发送的加密的元数据标识和加密的第一数据提取规则,并通过使用方私钥进行解密;Generate a user public key and a user private key; send the user public key to the data user, so that the data user encrypts the metadata identifier and the first data extraction rule by using the user public key; receive the encrypted metadata identifier and the encrypted first data extraction rule sent by the data user, and decrypt them by using the user private key;

具体的,数据服务平台还包括访问控制模块,其通过访问控制模块为数据使用方生成一个使用方公私钥对,其中包括一个使用方公钥和一个使用方私钥。数据服务平台将使用方公钥发送给数据使用方,数据使用方接收数据服务平台发送的使用方公钥,并通过使用方公钥对元数据标识和第一数据提取规则进行加密,将加密的元数据标识和加密的第一数据提取规则发送至数据服务平台;数据服务平台的可信执行环境包括数据加解密服务,用于在数据服务平台接收到的加密的元数据标识和第一数据提取规则后,通过对应的使用方私钥对其进行解密。Specifically, the data service platform also includes an access control module, which generates a user public-private key pair for the data user through the access control module, including a user public key and a user private key. The data service platform sends the user public key to the data user, and the data user receives the user public key sent by the data service platform, and encrypts the metadata identifier and the first data extraction rule by using the user public key, and sends the encrypted metadata identifier and the encrypted first data extraction rule to the data service platform; the trusted execution environment of the data service platform includes a data encryption and decryption service, which is used to decrypt the encrypted metadata identifier and the first data extraction rule received by the data service platform by using the corresponding user private key.

在上述实施方式中,通过数据服务平台为数据使用方生成使用方公钥,并生成对应的使用方私钥保存在数据服务平台,通过这对公私钥实现了数据服务平台和数据使用方之间的加密数据传输,有效较低了数据传输在该环节时的泄露风险。In the above implementation, a public key is generated for the data user by the data service platform, and a corresponding private key is generated and stored in the data service platform. This pair of public and private keys enables encrypted data transmission between the data service platform and the data user, effectively reducing the risk of data leakage at this stage.

同理,为降低数据服务平台和数据持有方在数据传输时额泄露风险,在本申请实施例中的数据服务平台与数据持有方进行交互时,一种可选的实施方式如下:Similarly, in order to reduce the risk of data leakage between the data service platform and the data holder during data transmission, when the data service platform in the embodiment of the present application interacts with the data holder, an optional implementation method is as follows:

通过可信执行环境生成至少一个持有方公钥和至少一个持有方私钥;持有方公钥与持有方私钥一一对应;对于每个数据持有方,通过可信执行环境将持有方公钥发送给数据持有方,以使数据持有方通过持有方公钥,对特征数据集和第二数据提取规则进行加密;通过可信执行环境接收至少一个数据持有方发送的加密的特征数据集和加密的第二数据提取规则,并通过对应的持有方私钥进行解密。At least one data holder public key and at least one data holder private key are generated through a trusted execution environment; the data holder public key corresponds to the data holder private key one by one; for each data holder, the data holder public key is sent to the data holder through the trusted execution environment, so that the data holder encrypts the feature data set and the second data extraction rule through the data holder public key; the encrypted feature data set and the encrypted second data extraction rule sent by at least one data holder are received through the trusted execution environment, and decrypted through the corresponding data holder private key.

其中,第二数据提取规则为数据持有方接收到数据使用方发送的第一数据提取规则后,转发给可信执行环境的。The second data extraction rule is forwarded to the trusted execution environment by the data holder after receiving the first data extraction rule sent by the data user.

具体的,可信执行环境中的访问控制模块服务为每个数据持有方生成一个持有方公私钥对,其中包括一个持有方公钥和一个持有方私钥。可信执行环境将持有方公钥发送给数据持有方,数据持有方接收可信执行环境发送的持有方公钥,并通过持有方公钥对特征数据集和第二数据提取规则进行加密,并将加密的特征数据集和加密的第二数据提取规则发送至可信执行环境;可信执行环境包括数据加解密服务,用于接收到加密的特征数据集和第二数据提取规则后,通过对应的持有方私钥对其进行解密。Specifically, the access control module service in the trusted execution environment generates a holder public-private key pair for each data holder, including a holder public key and a holder private key. The trusted execution environment sends the holder public key to the data holder, and the data holder receives the holder public key sent by the trusted execution environment, and encrypts the feature data set and the second data extraction rule by using the holder public key, and sends the encrypted feature data set and the encrypted second data extraction rule to the trusted execution environment; the trusted execution environment includes a data encryption and decryption service, which is used to decrypt the encrypted feature data set and the second data extraction rule by using the corresponding holder private key after receiving the encrypted feature data set and the second data extraction rule.

在上述实施方式中,通过可信执行环境为数据持有方生成持有方公钥,并生成对应的持有方私钥保存在可信执行环境,通过这堆公私钥实现了可信执行环境和数据持有方之间的加密数据传输,有效较低了数据传输在该环节时的泄露风险。In the above implementation, a public key of the data holder is generated for the data holder through a trusted execution environment, and a corresponding private key of the data holder is generated and stored in the trusted execution environment. This pile of public and private keys enables encrypted data transmission between the trusted execution environment and the data holder, effectively reducing the risk of data leakage at this stage.

通过上述实施方式,可信执行环境接收到了数据持有方生成的特征数据集,进而,可信执行环境即可通过如下方式生成数据使用方最终需要的数据产品:Through the above implementation, the trusted execution environment receives the feature data set generated by the data holder, and then the trusted execution environment can generate the data product ultimately required by the data user in the following manner:

S22:数据服务平台对至少一个特征数据集进行处理生成数据产品,并将数据产品传输至数据使用方。S22: The data service platform processes at least one feature data set to generate a data product, and transmits the data product to a data user.

由于特征数据集是数据持有方基于接收到的数据使用方发送的第一数据提取规则,对目标原始数据进行特征提取获得的,因此,若第一提取规则在传输过程中没有数据泄漏和数据偏差,则数据使用方发送的第一数据提取规则与数据持有方发送的第二数据提取规则相同;若第一提取规则在传输过程中存在数据泄漏和数据偏差,则数据使用方发送的第一数据提取规则与数据持有方发送的第二数据提取规则不同;为避免出现第一数据提取规则由于传输导致的数据丢失等问题,本申请实施例令数据持有方将其接收到的第二数据提取规则发送到数据服务平台进行审核。Since the feature data set is obtained by the data holder by performing feature extraction on the target original data based on the first data extraction rule sent by the data user, if the first extraction rule has no data leakage and data deviation during the transmission process, the first data extraction rule sent by the data user is the same as the second data extraction rule sent by the data holder; if the first extraction rule has data leakage and data deviation during the transmission process, the first data extraction rule sent by the data user is different from the second data extraction rule sent by the data holder; in order to avoid problems such as data loss caused by the transmission of the first data extraction rule, the embodiment of the present application requires the data holder to send the second data extraction rule it receives to the data service platform for review.

在本申请实施例对第二数据提取规则进行审核时,一种可选的实施方式如下:When reviewing the second data extraction rule in the embodiment of the present application, an optional implementation method is as follows:

接收数据使用方发送的元数据标识和第一数据提取规则,以及,接收至少一个数据持有方发送的特征数据集和第二数据提取规则。A metadata identifier and a first data extraction rule sent by a data user are received, and a feature data set and a second data extraction rule sent by at least one data holder are received.

其中,第二数据提取规则为:数据持有方接收到数据使用方发送的第一数据提取规则后,转发给数据服务平台的。Among them, the second data extraction rule is: after the data holder receives the first data extraction rule sent by the data user, it forwards it to the data service platform.

具体的,数据服务平台的可信执行环境中包括规则引擎服务,该规则引擎服务用于加载接收到的第一数据提取规则和第二数据提取规则,并对两者进行比较,若两者相同,则可以进行后续的数据处理操作,若两者不同,则不进行数据处理,并将比较结果返回给数据持有方和数据使用方。Specifically, the trusted execution environment of the data service platform includes a rule engine service, which is used to load the received first data extraction rule and the second data extraction rule and compare the two. If the two are the same, subsequent data processing operations can be performed. If the two are different, no data processing is performed and the comparison results are returned to the data holder and the data user.

在上述实施方式中,通过数据服务平台将数据持有方和数据使用方发送的数据提取规则进行对比,可以快速有效的确定特征数据集是否是按照数据使用方的第一数据提取规则生成的,避免了根据错误的特征数据集生成错误的数据产品,间接提高了数据产品的有效性。In the above implementation, by comparing the data extraction rules sent by the data holder and the data user through the data service platform, it is possible to quickly and effectively determine whether the feature data set is generated in accordance with the first data extraction rule of the data user, thereby avoiding the generation of erroneous data products based on erroneous feature data sets, and indirectly improving the effectiveness of data products.

通过删除方式确定特征数据集是符合数据使用方的数据需求后,即可通过如下方式对数据特征集进行最后的处理:After confirming that the feature data set meets the data needs of the data user through deletion, the data feature set can be finally processed in the following ways:

在本申请实施例中对数据特征集进行处理时,一种可选的实施方式如下:When processing the data feature set in the embodiment of the present application, an optional implementation method is as follows:

接收数据使用方发送的平台公钥;平台公钥为数据使用方通过第一特征计算引擎生成并发送的;Receive the platform public key sent by the data user; the platform public key is generated and sent by the data user through the first feature calculation engine;

通过可信执行环境对至少一个特征数据集进行处理生成数据产品,并通过平台公钥将数据产品进行加密后,传输至数据使用方,以使数据使用方接收数据产品后,通过平台私钥对数据产品进行解密。At least one feature data set is processed through a trusted execution environment to generate a data product, and the data product is encrypted by the platform public key and transmitted to the data user, so that the data user can decrypt the data product by the platform private key after receiving the data product.

其中,数据产品的形式包括但不限于数据报告,数据结果集,数据模型,数据接口等。The forms of data products include but are not limited to data reports, data result sets, data models, data interfaces, etc.

具体的,可信执行环境中还包括数据特征计算服务,在经过上述方式对各个第二数据提取规则进行审核后,对于符合数据计算条件的各个数据特征集,则通过数据特征计算服务加载各个数据特征集,进行融合计算,生成数据产品;通过数据加解密服务,使用使用方公钥对打包后的数据产品进行加密后,发送给数据使用方,数据使用方接收数据产品后,通过使用方私钥对数据产品进行解密。Specifically, the trusted execution environment also includes a data feature calculation service. After each second data extraction rule is reviewed in the above manner, for each data feature set that meets the data calculation conditions, each data feature set is loaded through the data feature calculation service, and fusion calculation is performed to generate a data product. Through the data encryption and decryption service, the packaged data product is encrypted using the user's public key and sent to the data user. After the data user receives the data product, the data user decrypts the data product using the user's private key.

此外,在本次数据传输完成后,为避免该可信执行环境在后续会泄露特征数据集等数据,本申请实施例还通过如下方式对可信执行环境进行销毁:In addition, after the data transmission is completed, in order to prevent the trusted execution environment from leaking data such as the feature data set in the future, the embodiment of the present application also destroys the trusted execution environment in the following manner:

数据服务平台确定数据产品传输完成后,对可信执行环境进行资源释放。After the data service platform determines that the data product transmission is completed, it releases the resources of the trusted execution environment.

其中,可信执行环境中还包括销毁服务。Among them, the trusted execution environment also includes destruction services.

具体的,在将数据产品发送给数据使用方的同时,向销毁服务处发送销毁消息,销毁服务接收到销毁信息后,检测数据产品的传输进度,确定数据产品传输完成后,销毁服务调用指令对可信执行环境进行销毁,释放所有资源。Specifically, when the data product is sent to the data user, a destruction message is sent to the destruction service. After receiving the destruction message, the destruction service detects the transmission progress of the data product. After determining that the data product transmission is completed, the destruction service calls instructions to destroy the trusted execution environment and release all resources.

在上述实施方式中,本申请实施例通过对完成数据传输的可信执行环境进行销毁,避免了该可信执行环境在数据传输完成后泄露特征数据集等相关数据,有效降低了数据传输的泄露风险。In the above implementation, the embodiment of the present application destroys the trusted execution environment that completes the data transmission, thereby avoiding the trusted execution environment from leaking related data such as the feature data set after the data transmission is completed, thereby effectively reducing the risk of data transmission leakage.

上述内容对从数据服务平台的角度对本申请实施例提供的数据传输方法进行了详细介绍,下面从数据使用方和数据持有方的角度各自对数据传输方法进行简单介绍:The above content introduces in detail the data transmission method provided in the embodiment of the present application from the perspective of the data service platform. The following briefly introduces the data transmission method from the perspectives of the data user and the data holder:

参阅图3所示,其为本申请实施例提供的另一种可信多方数据传输方法的实施流程图,应用于数据使用方,该方法的具体实施流程包括S31~S34:Refer to FIG. 3 , which is a flowchart of another implementation method of a trusted multi-party data transmission method provided in an embodiment of the present application, which is applied to a data user. The specific implementation process of the method includes S31 to S34:

S31:数据使用方向至少一个数据持有方分别发送数据授权请求。S31: The data user sends a data authorization request to at least one data holder.

具体的,在数据传输过程中,在向至少一个数据持有方分别发送数据授权请求之前,首先,数据使用方在数据服务平台进行注册,获取与至少一个数据持有方进行通信的至少一个第一通信密钥,并在本地部署第一特征计算引擎,进而,通过数据服务平台向至少一个数据持有方发送数据授权请求。Specifically, during the data transmission process, before sending a data authorization request to at least one data holder respectively, the data user first registers on the data service platform, obtains at least one first communication key for communicating with at least one data holder, and locally deploys a first feature calculation engine, and then sends a data authorization request to at least one data holder through the data service platform.

S32:对于每个数据持有方,数据使用方接收数据持有方确认授权后发送的数据目录信息,并根据数据需求从数据目录信息中获取目标原始数据对应的元数据标识。S32: For each data holder, the data user receives the data directory information sent by the data holder after confirming the authorization, and obtains the metadata identifier corresponding to the target original data from the data directory information according to the data demand.

具体的,在数据持有方确认授权后,通过数据使用方的第一特征计算引擎和数据持有方的第二特征计算引擎共同建立密文通道,通过密文通道接收至少一个数据持有方发送的加密的数据目录信息,数据使用方通过对应的第一通信密钥对各个数据目录信息进行解密,并在各个数据目录信息中获取目标原始数据对应的元数据标识。Specifically, after the data holder confirms the authorization, a ciphertext channel is jointly established through the first feature computing engine of the data user and the second feature computing engine of the data holder, and encrypted data directory information sent by at least one data holder is received through the ciphertext channel. The data user decrypts each data directory information using the corresponding first communication key, and obtains the metadata identifier corresponding to the target original data in each data directory information.

S33:对于每个元数据标识,数据使用方基于元数据标识和对应的数据需求,通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则,并将元数据标识和第一数据提取规则发送至对应的数据持有方,以使数据持有方基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台。S33: For each metadata identifier, the data user generates a first data extraction rule for the corresponding target original data through a first feature calculation engine based on the metadata identifier and the corresponding data demand, and sends the metadata identifier and the first data extraction rule to the corresponding data holder, so that the data holder can perform feature extraction on the target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule, and send it to the data service platform.

具体的,基于元数据标识和对应的数据需求,数据使用方通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则,并通过第一通信密钥将元数据标识和第一数据提取规则进行加密后发送至对应的数据持有方。此外,数据使用方还接收到数据服务平台发送的接收方公钥,并通过接收方公钥及使用方公钥将元数据标识和第一数据提取规则进行加密后,发送至数据服务平台及数据持有方。Specifically, based on the metadata identifier and the corresponding data requirements, the data user generates the first data extraction rule corresponding to the target original data through the first feature calculation engine, and encrypts the metadata identifier and the first data extraction rule through the first communication key and sends them to the corresponding data holder. In addition, the data user also receives the receiver's public key sent by the data service platform, and encrypts the metadata identifier and the first data extraction rule through the receiver's public key and the user's public key, and sends them to the data service platform and the data holder.

S34:数据使用方接收数据服务平台发送的数据产品。S34: The data user receives the data products sent by the data service platform.

具体的,数据使用方接收到数据服务平台发送的加密的数据产品后,通过平台私钥对其进行解密。Specifically, after the data user receives the encrypted data product sent by the data service platform, it decrypts it using the platform private key.

参阅图4所示,其为本申请实施例提供的又一种可信多方数据传输方法的实施流程图,应用于数据持有方,该方法的具体实施流程包括S41~S43:Referring to FIG. 4 , it is a flowchart of another implementation method of a trusted multi-party data transmission method provided in an embodiment of the present application, which is applied to the data holder. The specific implementation process of the method includes S41 to S43:

S41:数据持有方接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至数据使用方,以使数据使用方根据数据需求从数据目录信息中获取目标原始数据对应的元数据标识。S41: The data holder receives the data authorization request sent by the data user, and after confirming the authorization, sends the data directory information to the data user, so that the data user can obtain the metadata identifier corresponding to the target original data from the data directory information according to the data demand.

具体的,对于每个数据持有方,在接收数据使用方发送的数据授权请求之前,数据持有方在数据服务平台进行注册,获取与数据使用方进行通信的第二通信密钥,并在本地部署第二特征计算引擎,进而,通过数据服务平台接收数据使用方发送的数据授权请求,确认授权后,通过第二通信密钥对数据目录信息进行加密,发送给数据使用方。Specifically, for each data holder, before receiving the data authorization request sent by the data user, the data holder registers on the data service platform, obtains the second communication key for communicating with the data user, and locally deploys the second feature calculation engine. Then, the data service platform receives the data authorization request sent by the data user, and after confirming the authorization, the data directory information is encrypting by the second communication key and sending it to the data user.

S42:数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,获取特征数据集。S42: After receiving the metadata identifier and the first data extraction rule sent by the data user, the data holder performs feature extraction on the target original data corresponding to the metadata identifier through the second feature calculation engine based on the first data extraction rule to obtain a feature data set.

具体的,数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,通过第二通信密钥进行解密,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,获取特征数据集。Specifically, after the data holder receives the metadata identifier and the first data extraction rule sent by the data user, it decrypts them using the second communication key, and based on the first data extraction rule, uses the second feature calculation engine to extract features of the target original data corresponding to the metadata identifier to obtain a feature data set.

S43:数据持有方将特征数据集发送至数据服务平台,以使数据服务平台对特征数据集进行处理生成数据产品,并发送给数据使用方。S43: The data holder sends the feature data set to the data service platform, so that the data service platform processes the feature data set to generate data products and sends them to the data user.

具体的,数据使用方接收到数据服务平台的可信执行环境发送的持有方公钥后,通过持有方公钥对特征数据集以及第二数据提取规则进行加密,并将加密后的特征数据集以及第二数据提取规则发送给可信执行环境。Specifically, after the data user receives the holder's public key sent by the trusted execution environment of the data service platform, the data user encrypts the feature data set and the second data extraction rules through the holder's public key, and sends the encrypted feature data set and the second data extraction rules to the trusted execution environment.

本申请实施例通过对数据持有方的原始数据进行特征提取,形成特征数据集,以特征数据集方式进行传输,数据持有方的原始数据不再需要拷贝出域,降低了数据价值流失风险。因此,如果因可信执行环境硬件漏洞出现数据泄露问题,泄露的数据也是特征数据集,其价值远小于原始数据的价值,同样降低了数据价值流失。此外,在原始数据容量大的情况,对原始数据进行特征提取后,特征数据集比原始数据更易进行压缩,对于大数据集类的融合计算任务,大大降低了网络传输压力及传输时间,提升了整体系统的性能。The embodiment of the present application extracts features from the original data of the data holder to form a feature data set, which is transmitted in the form of a feature data set. The original data of the data holder no longer needs to be copied out of the domain, reducing the risk of data value loss. Therefore, if a data leakage problem occurs due to a hardware vulnerability in the trusted execution environment, the leaked data is also a feature data set, and its value is far less than the value of the original data, which also reduces the loss of data value. In addition, in the case of a large capacity of original data, after feature extraction of the original data, the feature data set is easier to compress than the original data. For fusion computing tasks such as large data sets, the network transmission pressure and transmission time are greatly reduced, and the performance of the overall system is improved.

如图5所示,其为本申请实施例提供的一种可信多方数据传输方法的交互示意图。As shown in FIG. 5 , it is an interactive schematic diagram of a trusted multi-party data transmission method provided in an embodiment of the present application.

图5中包括数据使用方,三个数据持有方和数据服务平台。每个数据持有方包含持有方终端设备、第二特征计算引擎和原始数据,数据使用方包括使用方终端设备、第一特征计算引擎和数据产品。数据服务平台包括可信执行环境、访问控制模块、密钥管理模块、任务管理模块和基础服务。其中可信执行环境还包括数据特征计算服务、访问控制服务、数据加解密服务、规则引擎服务和销毁服务。其中,密钥管理模块用于管理数据服务平台和可信执行环境的密钥,对其进行加密处理,例如使用方公钥、使用方私钥、持有方公钥、持有方私钥。Figure 5 includes data users, three data holders and a data service platform. Each data holder includes a holder terminal device, a second feature calculation engine and original data, and the data user includes a user terminal device, a first feature calculation engine and data products. The data service platform includes a trusted execution environment, an access control module, a key management module, a task management module and basic services. The trusted execution environment also includes data feature calculation services, access control services, data encryption and decryption services, rule engine services and destruction services. Among them, the key management module is used to manage the keys of the data service platform and the trusted execution environment, and encrypt them, such as the user's public key, the user's private key, the holder's public key, and the holder's private key.

如图6所示,其为本申请实施例提供的一种可信多方数据传输方法的流程图,具体包括S601~S608:As shown in FIG. 6 , it is a flow chart of a trusted multi-party data transmission method provided in an embodiment of the present application, which specifically includes S601 to S608:

S601:数据使用方和数据持有方在数据服务平台进行注册,获取通信密钥,部署特征计算引擎;S601: Data users and data holders register on the data service platform, obtain communication keys, and deploy feature calculation engines;

具体的,数据使用方在本地部署第一特征计算引擎,并通过第一特征计算引擎生成至少一个第一通信密钥;对于每个所述数据持有方,在本地部署第一特征计算引擎,并通过第二特征引擎生成第二通信密钥。Specifically, the data user locally deploys a first feature calculation engine and generates at least one first communication key through the first feature calculation engine; for each of the data holders, the first feature calculation engine is locally deployed and a second communication key is generated through a second feature engine.

S602:数据使用方向数据持有方发送数据授权请求;S602: The data user sends a data authorization request to the data holder;

S603:数据持有方确认授权后向数据使用方发送数据目录信息;S603: After the data holder confirms the authorization, it sends the data directory information to the data user;

具体的,通过数据服务平台接收数据使用方发送的数据授权请求;确认授权后,通过第二通信密钥对数据目录信息进行加密,并基于第二特征计算引擎和数据使用方的第一特征计算引擎共同建立密文通道;通过密文通道,将加密的数据目录信息发送至数据使用方。Specifically, a data authorization request sent by a data user is received through a data service platform; after confirming the authorization, the data directory information is encrypted through a second communication key, and a ciphertext channel is jointly established based on a second feature calculation engine and a first feature calculation engine of the data user; the encrypted data directory information is sent to the data user through the ciphertext channel.

S604:数据使用方在数据目录信息获取元数据标识,并生成第一数据提取规则,数据使用平台建立可信执行环境;S604: The data user obtains a metadata identifier from the data directory information and generates a first data extraction rule, and the data usage platform establishes a trusted execution environment;

具体的,确定数据持有方确认授权后,基于第一特征计算引擎和数据持有方的第二特征计算引擎共同建立密文通道;通过密文通道接收数据持有方发送的加密的数据目录信息,并通过对应的第一通信密钥进行解密。根据数据需求从数据目录信息中获取目标原始数据对应的元数据标识;对于每个元数据标识,基于元数据标识和对应的数据需求,通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则。向数据服务平台发送环境建立请求,以使数据服务平台建立针对本次数据处理的可信执行环境。接收数据服务平台发送的使用方公钥,并通过使用方公钥对元数据标识和第一数据提取规则进行加密。将加密的元数据标识和加密的第一数据提取规则发送至数据服务平台。Specifically, after determining that the data holder confirms the authorization, a ciphertext channel is jointly established based on the first feature computing engine and the second feature computing engine of the data holder; the encrypted data directory information sent by the data holder is received through the ciphertext channel, and decrypted through the corresponding first communication key. The metadata identifier corresponding to the target original data is obtained from the data directory information according to the data requirements; for each metadata identifier, based on the metadata identifier and the corresponding data requirements, the first data extraction rule corresponding to the target original data is generated through the first feature computing engine. An environment establishment request is sent to the data service platform so that the data service platform establishes a trusted execution environment for this data processing. The user public key sent by the data service platform is received, and the metadata identifier and the first data extraction rule are encrypte d by the user public key. The encrypted metadata identifier and the encrypted first data extraction rule are sent to the data service platform.

S605:数据持有方对目标原始数据进行特征提取,生成特征数据集,并发送至数据服务平台;S605: The data holder extracts features from the target original data, generates a feature data set, and sends it to the data service platform;

具体的,通过密文通道,接收加密的元数据标识和加密的第一数据提取规则,并通过第二通信密钥进行解密。基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,获取特征数据集;接收可信执行环境发送的持有方公钥,并通过持有方公钥对特征数据集和第二数据提取规则进行加密;将加密的特征数据集和加密的第二数据提取规则发送至可信执行环境。Specifically, the encrypted metadata identifier and the encrypted first data extraction rule are received through the ciphertext channel, and are decrypted through the second communication key. Based on the first data extraction rule, the target original data corresponding to the metadata identifier is extracted through the second feature calculation engine to obtain a feature data set; the holder's public key sent by the trusted execution environment is received, and the feature data set and the second data extraction rule are encrypted through the holder's public key; the encrypted feature data set and the encrypted second data extraction rule are sent to the trusted execution environment.

S606:数据服务平台在可信执行环境对第二数据提取规则进行审核;S606: The data service platform reviews the second data extraction rule in the trusted execution environment;

具体的,接收数据使用方发送的加密的元数据标识和加密的第一数据提取规则,并通过使用方私钥进行解密;接收至少一个数据持有方发送的加密的特征数据集和加密的第二数据提取规则,并通过对应的持有方私钥进行解密。基于元数据标识,对第一数据提取规则和第二数据提取规则进行比较。Specifically, the encrypted metadata identifier and the encrypted first data extraction rule sent by the data user are received, and the encrypted data set and the encrypted second data extraction rule are received from at least one data holder, and the encrypted data set and the encrypted second data extraction rule are decrypted by the corresponding holder's private key. Based on the metadata identifier, the first data extraction rule and the second data extraction rule are compared.

S607:数据服务平台在可信执行环境中对特征数据集进行处理,生成数据产品,并发送给数据使用方;S607: The data service platform processes the feature data set in the trusted execution environment, generates data products, and sends them to the data user;

具体的,若确定第一数据提取规则和第二数据提取规则相同,则对至少一个特征数据集进行处理生成数据产品,并通过平台公钥将数据产品进行加密后,传输至数据使用方。Specifically, if it is determined that the first data extraction rule and the second data extraction rule are the same, at least one feature data set is processed to generate a data product, and the data product is encrypted using a platform public key and then transmitted to a data user.

S608:数据服务平台确定数据产品传输完成后,销毁可信执行环境,释放资源。S608: After the data service platform determines that the data product transmission is complete, it destroys the trusted execution environment and releases resources.

本申请实施例提供了一种可信多方数据传输方法、装置、电子设备和存储介质。在本申请实施例中,通过设置数据服务平台,接收至少一个数据持有方对目标原始数据进行特征提取得到的特征数据集,避免了数据服务平台直接接收到数据持有方的目标原始数据,使得目标原始数据不会在多端进行数据传输时被泄露。进而,数据服务平台对至少一个特征数据集进行处理生成数据产品,并将数据产品传输给数据使用方,这样一来,在数据传输过程中,数据使用方也只能接受到最终生成的数据产品,无法直接接收到目标原始数据,避免了目标原始数据的泄露,并且降低了数据传输的网络压力。The embodiments of the present application provide a trusted multi-party data transmission method, device, electronic device and storage medium. In the embodiments of the present application, by setting up a data service platform, a feature data set is received by at least one data holder performing feature extraction on the target original data, thereby avoiding the data service platform from directly receiving the target original data of the data holder, so that the target original data will not be leaked when data is transmitted between multiple terminals. Furthermore, the data service platform processes at least one feature data set to generate a data product, and transmits the data product to the data user. In this way, during the data transmission process, the data user can only receive the final generated data product and cannot directly receive the target original data, thereby avoiding the leakage of the target original data and reducing the network pressure of data transmission.

综上,本申请实施例通过不直接在数据传输过程中传输目标原始数据,降低了数据传输过程中的泄露风险,从而降低了数据价值流失风险。In summary, the embodiments of the present application reduce the risk of leakage during data transmission by not directly transmitting the target original data during the data transmission process, thereby reducing the risk of data value loss.

基于同一发明构思,本申请实施例中还提供了一种可信多方数据传输装置,如图7A所示,该数据传输装置700A包括:Based on the same inventive concept, an embodiment of the present application further provides a trusted multi-party data transmission device, as shown in FIG. 7A , the data transmission device 700A includes:

第一接收单元701,用于接收至少一个数据持有方发送的特征数据集,特征数据集为:数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取得到的;元数据标识是数据使用方根据数据需求从数据持有方确认授权后发送的数据目录信息中获取的,第一数据提取规则为:数据使用方基于元数据标识和对应的数据需求,通过第一特征计算引擎生成的;The first receiving unit 701 is used to receive a feature data set sent by at least one data holder, where the feature data set is obtained by extracting features of target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule after the data holder receives the metadata identifier and the first data extraction rule sent by the data user; the metadata identifier is obtained by the data user from the data directory information sent by the data holder after the data holder confirms the authorization according to the data demand, and the first data extraction rule is generated by the data user through the first feature calculation engine based on the metadata identifier and the corresponding data demand;

处理单元702,用于对至少一个特征数据集进行处理生成数据产品,并将数据产品传输至数据使用方。The processing unit 702 is used to process at least one feature data set to generate a data product, and transmit the data product to a data user.

可选的,第一接收单元701具体用于:Optionally, the first receiving unit 701 is specifically configured to:

接收数据使用方发送的元数据标识和第一数据提取规则,以及,接收至少一个数据持有方发送的特征数据集和第二数据提取规则,第二数据提取规则为:数据持有方接收到数据使用方发送的第一数据提取规则后,转发给数据服务平台的;Receiving a metadata identifier and a first data extraction rule sent by a data user, and receiving a feature data set and a second data extraction rule sent by at least one data holder, wherein the second data extraction rule is: after receiving the first data extraction rule sent by the data user, the data holder forwards it to the data service platform;

处理单元702具体用于:The processing unit 702 is specifically used for:

基于元数据标识,对第一数据提取规则和第二数据提取规则进行比较,若确定第一数据提取规则和第二数据提取规则相同,则对至少一个特征数据集进行处理生成数据产品。Based on the metadata identifier, the first data extraction rule and the second data extraction rule are compared, and if it is determined that the first data extraction rule and the second data extraction rule are the same, at least one feature data set is processed to generate a data product.

可选的,第一接收单元701具体用于:Optionally, the first receiving unit 701 is specifically configured to:

生成使用方公钥和使用方私钥;Generate the user's public key and the user's private key;

将使用方公钥发送至数据使用方,以使数据使用方通过使用方公钥,对元数据标识和第一数据提取规则进行加密;Sending the user public key to the data user, so that the data user encrypts the metadata identifier and the first data extraction rule using the user public key;

接收数据使用方发送的加密的元数据标识和加密的第一数据提取规则,并通过使用方私钥进行解密;Receiving the encrypted metadata identifier and the encrypted first data extraction rule sent by the data user, and decrypting them using the user's private key;

处理单元702具体用于:The processing unit 702 is specifically used for:

接收数据使用方发送的平台公钥;平台公钥为数据使用方通过第一特征计算引擎生成并发送的;Receive the platform public key sent by the data user; the platform public key is generated and sent by the data user through the first feature calculation engine;

对至少一个特征数据集进行处理生成数据产品,并通过平台公钥将数据产品进行加密后,传输至数据使用方,以使数据使用方接收数据产品后,通过平台私钥对数据产品进行解密;平台私钥为数据使用方通过第一特征计算引擎生成。At least one feature data set is processed to generate a data product, and the data product is encrypted by a platform public key and transmitted to a data user, so that after receiving the data product, the data user can decrypt the data product by a platform private key; the platform private key is generated by the data user through the first feature calculation engine.

可选的,在接收至少一个数据持有方发送的特征数据集之前,装置还包括:Optionally, before receiving the feature data set sent by at least one data holder, the device further includes:

建立单元703,用于接收数据使用方发送的环境建立请求后,建立针对本次数据处理的可信执行环境;The establishment unit 703 is used to establish a trusted execution environment for the current data processing after receiving an environment establishment request sent by the data user;

以及,处理单元702具体用于:And, the processing unit 702 is specifically used for:

在可信执行环境对至少一个特征数据集进行处理生成数据产品,并将数据产品传输至数据使用方;Processing at least one feature data set in a trusted execution environment to generate a data product, and transmitting the data product to a data user;

确定数据产品传输完成后,对可信执行环境进行资源释放。After the data product transmission is completed, the resources of the trusted execution environment are released.

可选的,第一接收单元701具体用于:Optionally, the first receiving unit 701 is specifically configured to:

通过可信执行环境生成至少一个持有方公钥和至少一个持有方私钥;持有方公钥与持有方私钥一一对应;Generate at least one holder public key and at least one holder private key through a trusted execution environment; the holder public key corresponds to the holder private key one by one;

对于每个数据持有方,通过可信执行环境将持有方公钥发送给数据持有方,以使数据持有方通过持有方公钥,对特征数据集和第二数据提取规则进行加密;For each data holder, a holder public key is sent to the data holder through the trusted execution environment, so that the data holder encrypts the feature data set and the second data extraction rule through the holder public key;

通过可信执行环境接收至少一个数据持有方发送的加密的特征数据集和加密的第二数据提取规则,并通过对应的持有方私钥进行解密。An encrypted feature data set and an encrypted second data extraction rule sent by at least one data holder are received through a trusted execution environment, and are decrypted through a corresponding holder private key.

基于同一发明构思,本申请实施例中还提供了另一种可信多方数据传输装置,如图7B所示,该数据传输装置700B包括:Based on the same inventive concept, another trusted multi-party data transmission device is also provided in the embodiment of the present application. As shown in FIG. 7B , the data transmission device 700B includes:

第一请求单元704,用于向至少一个数据持有方分别发送数据授权请求;A first request unit 704 is used to send a data authorization request to at least one data holder;

获取单元705,用于对于每个数据持有方,接收数据持有方确认授权后发送的数据目录信息,并根据数据需求从数据目录信息中获取目标原始数据对应的元数据标识;The acquisition unit 705 is used to receive the data directory information sent by each data holder after the data holder confirms the authorization, and acquire the metadata identifier corresponding to the target original data from the data directory information according to the data demand;

生成单元706,用于对于每个元数据标识,基于元数据标识和对应的数据需求,通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则,并将元数据标识和第一数据提取规则发送至对应的数据持有方,以使数据持有方基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台;A generating unit 706 is used to generate, for each metadata identifier, a first data extraction rule corresponding to the target original data through a first feature calculation engine based on the metadata identifier and the corresponding data demand, and send the metadata identifier and the first data extraction rule to the corresponding data holder, so that the data holder performs feature extraction on the target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule, and sends the feature extraction to the data service platform;

第二接收单元707,用于接收数据服务平台发送的数据产品;数据产品为:数据服务平台对至少一个特征数据集进行处理生成的。The second receiving unit 707 is used to receive a data product sent by the data service platform; the data product is generated by the data service platform by processing at least one feature data set.

可选的,在通过第一特征计算引擎生成对应目标原始数据的第一数据提取规则之后,装置还包括:Optionally, after generating the first data extraction rule corresponding to the target original data by the first feature calculation engine, the device further includes:

第三接收单元708,用于接收数据服务平台发送的使用方公钥,并通过使用方公钥对元数据标识和第一数据提取规则进行加密。The third receiving unit 708 is used to receive the user public key sent by the data service platform, and encrypt the metadata identifier and the first data extraction rule by using the user public key.

可选的,在通过使用方公钥对元数据标识和第一数据提取规则进行加密之后,装置还包括:Optionally, after encrypting the metadata identifier and the first data extraction rule by using the user public key, the device further includes:

第二发送单元709,用于将加密的元数据标识和加密的第一数据提取规则发送至数据服务平台,以使数据服务平台接收加密的元数据标识和加密的第一数据提取规则,并通过使用方私钥进行解密后,基于元数据标识,对第一数据提取规则和第二数据提取规则进行比较;第二数据提取规则为:数据持有方接收到数据使用方发送的第一数据提取规则后,转发给数据服务平台的。The second sending unit 709 is used to send the encrypted metadata identifier and the encrypted first data extraction rule to the data service platform, so that the data service platform receives the encrypted metadata identifier and the encrypted first data extraction rule, and after decrypting them with the user's private key, compares the first data extraction rule and the second data extraction rule based on the metadata identifier; the second data extraction rule is: after the data holder receives the first data extraction rule sent by the data user, it forwards it to the data service platform.

可选的,在向至少一个数据持有方发送数据授权请求之前,装置还包括:Optionally, before sending the data authorization request to at least one data holder, the device further includes:

第一注册单元710,用于在数据服务平台进行注册后,通过第一特征计算引擎生成至少一个第一通信密钥;每个第一通信密钥对应一个数据持有方;The first registration unit 710 is used to generate at least one first communication key through a first feature calculation engine after registering on the data service platform; each first communication key corresponds to a data holder;

第一请求单元704,用于通过数据服务平台向数据持有方发送数据授权请求;The first request unit 704 is used to send a data authorization request to the data holder through the data service platform;

确定数据持有方确认授权后,基于第一特征计算引擎和数据持有方的第二特征计算引擎共同建立密文通道;After confirming that the data holder has confirmed the authorization, a ciphertext channel is jointly established based on the first feature calculation engine and the second feature calculation engine of the data holder;

通过密文通道接收数据持有方发送的加密的数据目录信息,并通过对应的第一通信密钥进行解密。The encrypted data directory information sent by the data holder is received through the ciphertext channel, and is decrypted using the corresponding first communication key.

可选的,生成单元706具体用于:Optionally, the generating unit 706 is specifically configured to:

通过第一通信密钥将元数据标识和第一数据提取规则进行加密;encrypting the metadata identifier and the first data extraction rule by using a first communication key;

通过密文通道,将加密的元数据标识和第一数据提取规则发送至对应的数据持有方。The encrypted metadata identifier and the first data extraction rule are sent to the corresponding data holder through the ciphertext channel.

可选的,第二接收单元707具体用于:Optionally, the second receiving unit 707 is specifically configured to:

通过第一特征计算引擎生成平台私钥和平台公钥;Generate a platform private key and a platform public key through a first feature calculation engine;

将平台公钥发送给数据服务平台,以使数据服务平台通过平台公钥将数据产品进行加密;Send the platform public key to the data service platform so that the data service platform can encrypt the data product using the platform public key;

接收数据服务平台发送的加密的数据产品,并通过平台私钥进行解密。Receive encrypted data products sent by the data service platform and decrypt them using the platform private key.

可选的,在接收数据持有方确认授权后发送的数据目录信息之后,装置还包括:Optionally, after receiving the data directory information sent by the data holder after confirming the authorization, the device further includes:

第二请求单元711,用于向数据服务平台发送可信环境建立请求,以使数据服务平台建立针对本次数据传输的可信执行环境。The second request unit 711 is used to send a trusted environment establishment request to the data service platform, so that the data service platform establishes a trusted execution environment for this data transmission.

基于同一发明构思,本申请实施例中还提供了一种可信多方数据传输装置,如图7C所示,该数据传输装置700C包括:Based on the same inventive concept, an embodiment of the present application further provides a trusted multi-party data transmission device, as shown in FIG. 7C , the data transmission device 700C includes:

授权单元712,用于接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至数据使用方,以使数据使用方根据数据需求从数据目录信息中获取目标原始数据对应的元数据标识;The authorization unit 712 is used to receive a data authorization request sent by a data user, and after confirming the authorization, send the data directory information to the data user, so that the data user can obtain the metadata identifier corresponding to the target original data from the data directory information according to the data demand;

特征提取单元713,用于接收到数据使用方发送的元数据标识和第一数据提取规则后,基于第一数据提取规则,通过第二特征计算引擎对元数据标识对应的目标原始数据进行特征提取,获取特征数据集;The feature extraction unit 713 is used to extract features of the target original data corresponding to the metadata identifier through the second feature calculation engine based on the first data extraction rule after receiving the metadata identifier and the first data extraction rule sent by the data user, so as to obtain a feature data set;

第一发送单元714,用于将特征数据集发送至数据服务平台,以使数据服务平台对特征数据集进行处理生成数据产品,并发送给数据使用方。The first sending unit 714 is used to send the feature data set to the data service platform, so that the data service platform processes the feature data set to generate data products and sends them to the data user.

可选的,在将特征数据集发送至数据服务平台之前,装置还包括:Optionally, before sending the feature data set to the data service platform, the device further includes:

第四接收单元715,用于接收数据服务平台的可信执行环境发送的持有方公钥,并通过持有方公钥对特征数据集和第二数据提取规则进行加密;可信执行环境为:数据服务平台接收数据使用方发送的可信环境建立请求后建立的;The fourth receiving unit 715 is used to receive the holder's public key sent by the trusted execution environment of the data service platform, and encrypt the feature data set and the second data extraction rule by the holder's public key; the trusted execution environment is established after the data service platform receives the trusted environment establishment request sent by the data user;

将加密的特征数据集和加密的第二数据提取规则发送至可信执行环境,以使可信执行环境接收加密的特征数据集和加密的第二数据提取规则,并通过持有方私钥进行解密后,基于元数据标识,对第一数据提取规则和第二数据提取规则进行比较。The encrypted feature data set and the encrypted second data extraction rule are sent to the trusted execution environment, so that the trusted execution environment receives the encrypted feature data set and the encrypted second data extraction rule, and after decrypting them through the holder's private key, the first data extraction rule and the second data extraction rule are compared based on the metadata identifier.

可选的,在接收数据使用方发送的数据授权请求之前,装置还包括:Optionally, before receiving the data authorization request sent by the data user, the device further includes:

第二注册单元716,用于在数据服务平台进行注册后,通过第二特征计算引擎生成第二通信密钥;A second registration unit 716, configured to generate a second communication key through a second feature calculation engine after registering on the data service platform;

授权单元712具体用于:The authorization unit 712 is specifically used for:

通过数据服务平台接收数据使用方发送的数据授权请求;Receive data authorization requests sent by data users through the data service platform;

确认授权后,通过第二通信密钥对数据目录信息进行加密,并基于第二特征计算引擎和数据使用方的第一特征计算引擎共同建立密文通道;After the authorization is confirmed, the data directory information is encrypted using the second communication key, and a ciphertext channel is jointly established based on the second feature computing engine and the first feature computing engine of the data user;

通过密文通道,将加密的数据目录信息发送至数据使用方,以使数据使用方通过密文通道接收加密的数据目录信息,并通过第一通信密钥进行解密。The encrypted data directory information is sent to the data user through the ciphertext channel, so that the data user receives the encrypted data directory information through the ciphertext channel and decrypts it using the first communication key.

可选的,特征提取单元713具体用于:Optionally, the feature extraction unit 713 is specifically used for:

通过密文通道,接收加密的元数据标识和加密的第一数据提取规则,并通过第二通信密钥进行解密;元数据标识和第一数据提取规则为数据使用方通过第一通信密钥加密的。The encrypted metadata identifier and the encrypted first data extraction rule are received through the ciphertext channel and decrypted through the second communication key; the metadata identifier and the first data extraction rule are encrypted by the data user through the first communication key.

基于同一发明构思,本申请实施例中还提供了一种电子设备。在一种实施例中,该电子设备可以是图1所示的服务器120。在该实施例中,电子设备的结构可以如图8所示,包括存储器801,通讯模块803以及一个或多个处理器802。Based on the same inventive concept, an electronic device is also provided in an embodiment of the present application. In one embodiment, the electronic device may be the server 120 shown in FIG. 1 . In this embodiment, the structure of the electronic device may be as shown in FIG. 8 , including a memory 801 , a communication module 803 and one or more processors 802 .

存储器801,用于存储处理器802执行的计算机程序。存储器801可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统,以及运行即时通讯功能所需的程序等;存储数据区可存储各种即时通讯信息和操作指令集等。The memory 801 is used to store computer programs executed by the processor 802. The memory 801 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system and programs required for running the instant messaging function, etc.; the data storage area may store various instant messaging information and operation instruction sets, etc.

存储器801可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM);存储器801也可以是非易失性存储器(non-volatilememory),例如只读存储器,快闪存储器(flash memory),硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD);或者存储器801是能够用于携带或存储具有指令或数据结构形式的期望的计算机程序并能够由计算机存取的任何其他介质,但不限于此。存储器801可以是上述存储器的组合。The memory 801 may be a volatile memory, such as a random-access memory (RAM); the memory 801 may also be a non-volatile memory, such as a read-only memory, a flash memory, a hard disk drive (HDD) or a solid-state drive (SSD); or the memory 801 may be any other medium that can be used to carry or store a desired computer program in the form of instructions or data structures and can be accessed by a computer, but is not limited thereto. The memory 801 may be a combination of the above memories.

处理器802,可以包括一个或多个中央处理单元(central processing unit,CPU)或者为数字处理单元等等。处理器802,用于调用存储器801中存储的计算机程序时实现上述可信多方数据传输方法。The processor 802 may include one or more central processing units (CPU) or a digital processing unit, etc. The processor 802 is configured to implement the above-mentioned trusted multi-party data transmission method when calling the computer program stored in the memory 801 .

通讯模块803用于与电子设备和其他服务器进行通信。The communication module 803 is used to communicate with electronic devices and other servers.

本申请实施例中不限定上述存储器801、通讯模块803和处理器802之间的具体连接介质。本申请实施例在图8中以存储器801和处理器802之间通过总线804连接,总线804在图8中以粗线描述,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。总线804可以分为地址总线、数据总线、控制总线等。为便于描述,图8中仅用一条粗线描述,但并不描述仅有一根总线或一种类型的总线。The specific connection medium between the above-mentioned memory 801, the communication module 803 and the processor 802 is not limited in the embodiment of the present application. In the embodiment of the present application, the memory 801 and the processor 802 are connected through the bus 804 in Figure 8, and the bus 804 is described with a thick line in Figure 8. The connection mode between other components is only for schematic illustration and is not limited. The bus 804 can be divided into an address bus, a data bus, a control bus, etc. For ease of description, only one thick line is used in Figure 8, but it does not describe only one bus or one type of bus.

存储器801中存储有计算机存储介质,计算机存储介质中存储有计算机可执行指令,计算机可执行指令用于实现本申请实施例的可信多方数据传输方法。处理器802用于执行上述可信多方数据传输方法。基于同一发明构思,本申请实施例提供一种计算机可读存储介质,计算机程序产品包括:计算机程序代码,当计算机程序代码在计算机上运行时,使得计算机执行如前文论述任一的可信多方数据传输方法。由于上述计算机可读存储介质解决问题的原理与数据传输方法相似,因此上述计算机可读存储介质的实施可以参见方法的实施,重复之处不再赘述。The memory 801 stores a computer storage medium, and the computer storage medium stores computer executable instructions, and the computer executable instructions are used to implement the trusted multi-party data transmission method of the embodiment of the present application. The processor 802 is used to execute the above-mentioned trusted multi-party data transmission method. Based on the same inventive concept, the embodiment of the present application provides a computer-readable storage medium, and the computer program product includes: computer program code, when the computer program code is run on a computer, it enables the computer to execute any of the trusted multi-party data transmission methods discussed above. Since the principle of solving the problem by the above-mentioned computer-readable storage medium is similar to that of the data transmission method, the implementation of the above-mentioned computer-readable storage medium can refer to the implementation of the method, and the repeated parts will not be repeated.

下面参照图9来描述根据本申请的这种实施方式的计算装置900。图9的计算装置900仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。The computing device 900 according to this embodiment of the present application is described below with reference to Fig. 9. The computing device 900 in Fig. 9 is only an example and should not bring any limitation to the functions and scope of use of the embodiment of the present application.

如图9,计算装置900以通用计算装置的形式表现。计算装置900的组件可以包括但不限于:上述至少一个处理单元901、上述至少一个存储单元902、连接不同系统组件(包括存储单元902和处理单元901)的总线903。As shown in FIG9 , the computing device 900 is presented in the form of a general computing device. The components of the computing device 900 may include but are not limited to: at least one processing unit 901 , at least one storage unit 902 , and a bus 903 connecting different system components (including the storage unit 902 and the processing unit 901 ).

总线903表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器、外围总线、处理器或者使用多种总线结构中的任意总线结构的局域总线。Bus 903 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.

存储单元902可以包括易失性存储器形式的可读介质,例如随机存取存储器(RAM)921和/或高速缓存存储器922,还可以进一步包括只读存储器(ROM)923。The storage unit 902 may include a readable medium in the form of a volatile memory, such as a random access memory (RAM) 921 and/or a cache memory 922 , and may further include a read-only memory (ROM) 923 .

存储单元902还可以包括具有一组(至少一个)程序模块924的程序/实用工具925,这样的程序模块924包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。The storage unit 902 may also include a program/utility 925 having a set (at least one) of program modules 924, such program modules 924 including but not limited to: an operating system, one or more application programs, other program modules and program data, each of which or some combination may include an implementation of a network environment.

计算装置900也可以与一个或多个外部设备904(例如键盘、指向设备等)通信,还可与一个或者多个使得用户能与计算装置900交互的设备通信,和/或与使得该计算装置900能与一个或多个其它计算装置进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口905进行。并且,计算装置900还可以通过网络适配器906与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图9所示,网络适配器906通过总线903与用于计算装置900的其它模块通信。应当理解,尽管图中未表示出,可以结合计算装置900使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理器、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。The computing device 900 may also communicate with one or more external devices 904 (e.g., keyboards, pointing devices, etc.), may also communicate with one or more devices that enable a user to interact with the computing device 900, and/or communicate with any device that enables the computing device 900 to communicate with one or more other computing devices (e.g., routers, modems, etc.). Such communication may be performed via an input/output (I/O) interface 905. In addition, the computing device 900 may also communicate with one or more networks (e.g., a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) via a network adapter 906. As shown in FIG. 9 , the network adapter 906 communicates with other modules for the computing device 900 via a bus 903. It should be understood that, although not shown in the figure, other hardware and/or software modules may be used in conjunction with the computing device 900, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems.

本申请实施例还提供一种计算机程序产品,本申请中的方法可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备、核心网设备、OAM或者其它可编程装置。The embodiment of the present application also provides a computer program product, and the method in the present application can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented using software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs or instructions. When the computer program or instruction is loaded and executed on a computer, the process or function described in the present application is executed in whole or in part. The computer can be a general-purpose computer, a special-purpose computer, a computer network, a network device, a user device, a core network device, an OAM or other programmable device.

计算机可读存储介质可以作为计算机程序产品的一种实现,即本申请实施例还提供一种计算机可读存储介质,其包括计算机程序,当所述计算机程序被处理器执行时实现如上述任意一种可信多方数据传输方法。The computer-readable storage medium can be implemented as a computer program product, that is, an embodiment of the present application also provides a computer-readable storage medium, which includes a computer program, and when the computer program is executed by a processor, it implements any of the above-mentioned trusted multi-party data transmission methods.

所述计算机程序或指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘;还可以是半导体介质,例如,固态硬盘。该计算机可读存储介质可以是易失性或非易失性存储介质,或可包括易失性和非易失性两种类型的存储介质。The computer program or instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program or instructions may be transmitted from one website, computer, server or data center to another website, computer, server or data center by wired or wireless means. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center that integrates one or more available media. The available medium may be a magnetic medium, such as a floppy disk, a hard disk, or a magnetic tape; it may also be an optical medium, such as a digital video disk; it may also be a semiconductor medium, such as a solid-state drive. The computer-readable storage medium may be a volatile or non-volatile storage medium, or may include both volatile and non-volatile types of storage media.

本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may take the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the present application may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.

本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to the flowcharts and/or block diagrams of the methods, devices (systems), and computer program products according to the present application. It should be understood that each process and/or box in the flowchart and/or block diagram, as well as the combination of the processes and/or boxes in the flowchart and/or block diagram, can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, a special-purpose computer, an embedded processor, or other programmable data processing device to produce a machine, so that the instructions executed by the processor of the computer or other programmable data processing device produce a device for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to operate in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.

显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.

Claims (21)

Translated fromChinese
1.一种可信多方数据传输方法,其特征在于,应用于数据服务平台,所述方法包括:1. A trusted multi-party data transmission method, characterized in that it is applied to a data service platform, and the method comprises:接收至少一个数据持有方发送的特征数据集,所述特征数据集为:所述数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取得到的;所述元数据标识是所述数据使用方根据数据需求从所述数据持有方确认授权后发送的数据目录信息中获取的,所述第一数据提取规则为:所述数据使用方基于所述元数据标识和对应的数据需求,通过第一特征计算引擎生成的;Receive a feature data set sent by at least one data holder, the feature data set being obtained by extracting features of target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule after the data holder receives the metadata identifier and the first data extraction rule sent by the data user; the metadata identifier is obtained by the data user from the data directory information sent by the data holder after confirming the authorization according to data requirements, and the first data extraction rule is generated by the data user through the first feature calculation engine based on the metadata identifier and the corresponding data requirements;对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方。At least one of the feature data sets is processed to generate a data product, and the data product is transmitted to the data user.2.如权利要求1所述的方法,其特征在于,所述接收至少一个数据持有方发送的特征数据集,包括:2. The method according to claim 1, wherein the receiving of a feature data set sent by at least one data holder comprises:接收所述数据使用方发送的所述元数据标识和所述第一数据提取规则,以及,接收至少一个所述数据持有方发送的所述特征数据集和第二数据提取规则,所述第二数据提取规则为:所述数据持有方接收到所述数据使用方发送的所述第一数据提取规则后,转发给所述数据服务平台的;Receiving the metadata identifier and the first data extraction rule sent by the data user, and receiving the feature data set and the second data extraction rule sent by at least one of the data holders, wherein the second data extraction rule is: after the data holder receives the first data extraction rule sent by the data user, it forwards it to the data service platform;所述对至少一个所述特征数据集进行处理生成数据产品,包括:The step of processing at least one of the feature data sets to generate a data product comprises:基于所述元数据标识,对所述第一数据提取规则和所述第二数据提取规则进行比较,若确定所述第一数据提取规则和所述第二数据提取规则相同,则对至少一个所述特征数据集进行处理生成数据产品。Based on the metadata identifier, the first data extraction rule and the second data extraction rule are compared, and if it is determined that the first data extraction rule and the second data extraction rule are the same, at least one of the feature data sets is processed to generate a data product.3.如权利要求2所述的方法,其特征在于,所述接收所述数据使用方发送的所述元数据标识和所述第一数据提取规则,包括:3. The method according to claim 2, wherein the receiving the metadata identifier and the first data extraction rule sent by the data user comprises:生成使用方公钥和使用方私钥;Generate the user's public key and the user's private key;将所述使用方公钥发送至所述数据使用方,以使所述数据使用方通过所述使用方公钥,对所述元数据标识和所述第一数据提取规则进行加密;Sending the user public key to the data user, so that the data user encrypts the metadata identifier and the first data extraction rule by using the user public key;接收所述数据使用方发送的加密的所述元数据标识和加密的所述第一数据提取规则,并通过所述使用方私钥进行解密;receiving the encrypted metadata identifier and the encrypted first data extraction rule sent by the data user, and decrypting them using the user's private key;所述对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方,包括:The step of processing at least one of the feature data sets to generate a data product, and transmitting the data product to the data user, includes:接收所述数据使用方发送的平台公钥;所述平台公钥为所述数据使用方通过第一特征计算引擎生成并发送的;Receiving a platform public key sent by the data user; the platform public key is generated and sent by the data user through the first feature calculation engine;对至少一个所述特征数据集进行处理生成数据产品,并通过所述平台公钥将所述数据产品进行加密后,传输至所述数据使用方,以使所述数据使用方接收所述数据产品后,通过平台私钥对所述数据产品进行解密;所述平台私钥为所述数据使用方通过所述第一特征计算引擎生成。At least one of the feature data sets is processed to generate a data product, and the data product is encrypted by the platform public key and transmitted to the data user, so that after the data user receives the data product, the data product can be decrypted by the platform private key; the platform private key is generated by the data user through the first feature calculation engine.4.如权利要求1所述的方法,其特征在于,在所述接收至少一个数据持有方发送的特征数据集之前,所述方法还包括:4. The method according to claim 1, characterized in that before receiving the feature data set sent by at least one data holder, the method further comprises:接收所述数据使用方发送的环境建立请求后,建立针对本次数据处理的可信执行环境;After receiving the environment establishment request sent by the data user, establish a trusted execution environment for this data processing;以及,所述对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方,包括:And, the processing of at least one of the feature data sets to generate a data product, and transmitting the data product to the data user, includes:在所述可信执行环境对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方;Processing at least one of the feature data sets in the trusted execution environment to generate a data product, and transmitting the data product to the data user;确定所述数据产品传输完成后,对所述可信执行环境进行资源释放。After determining that the data product transmission is completed, the resources of the trusted execution environment are released.5.如权利要求4所述的方法,其特征在于,所述接收至少一个所述数据持有方发送的所述特征数据集和第二数据提取规则,包括:5. The method according to claim 4, wherein the receiving the feature data set and the second data extraction rule sent by at least one of the data holders comprises:通过所述可信执行环境生成至少一个持有方公钥和至少一个持有方私钥;所述持有方公钥与所述持有方私钥一一对应;Generate at least one holder public key and at least one holder private key through the trusted execution environment; the holder public key corresponds to the holder private key one by one;对于每个所述数据持有方,通过所述可信执行环境将所述持有方公钥发送给所述数据持有方,以使所述数据持有方通过所述公钥,对所述特征数据集和所述第二数据提取规则进行加密;For each of the data holders, sending the holder public key to the data holder through the trusted execution environment, so that the data holder encrypts the feature data set and the second data extraction rule through the public key;通过所述可信执行环境接收至少一个所述数据持有方发送的加密的所述特征数据集和加密的所述第二数据提取规则,并通过对应的所述持有方私钥进行解密。The encrypted feature data set and the encrypted second data extraction rule sent by at least one of the data holders are received through the trusted execution environment, and are decrypted through the corresponding holder private key.6.一种可信多方数据传输方法,其特征在于,应用于数据使用方,所述方法包括:6. A trusted multi-party data transmission method, characterized in that it is applied to a data user, and the method comprises:向至少一个数据持有方分别发送数据授权请求;Sending a data authorization request to at least one data holder respectively;对于每个所述数据持有方,接收所述数据持有方确认授权后发送的数据目录信息,并根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;For each of the data holders, receiving the data directory information sent by the data holder after confirming the authorization, and obtaining the metadata identifier corresponding to the target original data from the data directory information according to the data demand;对于每个所述元数据标识,基于所述元数据标识和对应的所述数据需求,通过第一特征计算引擎生成对应所述目标原始数据的第一数据提取规则,并将所述元数据标识和所述第一数据提取规则发送至对应的所述数据持有方,以使所述数据持有方基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台;For each metadata identifier, based on the metadata identifier and the corresponding data demand, a first data extraction rule corresponding to the target original data is generated through a first feature calculation engine, and the metadata identifier and the first data extraction rule are sent to the corresponding data holder, so that the data holder performs feature extraction on the target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule, and sends the feature extraction to the data service platform;接收所述数据服务平台发送的数据产品;所述数据产品为:所述数据服务平台对至少一个特征数据集进行处理生成的。Receive a data product sent by the data service platform; the data product is generated by the data service platform by processing at least one feature data set.7.如权利要求6所述的方法,其特征在于,在所述通过第一特征计算引擎生成对应所述目标原始数据的第一数据提取规则之后,所述方法还包括:7. The method according to claim 6, characterized in that after generating the first data extraction rule corresponding to the target original data by the first feature calculation engine, the method further comprises:接收所述数据服务平台发送的使用方公钥,并通过所述使用方公钥对所述元数据标识和所述第一数据提取规则进行加密。The user public key sent by the data service platform is received, and the metadata identifier and the first data extraction rule are encrypting by using the user public key.8.如权利要求7所述的方法,其特征在于,在通过所述使用方公钥对所述元数据标识和所述第一数据提取规则进行加密之后,所述方法还包括:8. The method according to claim 7, characterized in that after encrypting the metadata identifier and the first data extraction rule by using the user public key, the method further comprises:将加密的所述元数据标识和加密的所述第一数据提取规则发送至所述数据服务平台,以使所述数据服务平台接收加密的所述元数据标识和加密的所述第一数据提取规则,并通过使用方私钥进行解密后,基于所述元数据标识,对所述第一数据提取规则和第二数据提取规则进行比较;所述第二数据提取规则为:所述数据持有方接收到所述数据使用方发送的所述第一数据提取规则后,转发给所述数据服务平台的。The encrypted metadata identifier and the encrypted first data extraction rule are sent to the data service platform, so that the data service platform receives the encrypted metadata identifier and the encrypted first data extraction rule, and after decrypting them with the user's private key, compares the first data extraction rule and the second data extraction rule based on the metadata identifier; the second data extraction rule is: after the data holder receives the first data extraction rule sent by the data user, it forwards it to the data service platform.9.如权利要求6所述的方法,其特征在于,在所述向至少一个数据持有方发送数据授权请求之前,所述方法还包括:9. The method according to claim 6, characterized in that before sending the data authorization request to at least one data holder, the method further comprises:在所述数据服务平台进行注册后,通过所述第一特征计算引擎生成至少一个第一通信密钥;每个所述第一通信密钥对应一个数据持有方;After registering on the data service platform, at least one first communication key is generated by the first feature calculation engine; each first communication key corresponds to a data holder;所述对于每个所述数据持有方,接收所述数据持有方确认授权后发送的数据目录信息,包括:The step of receiving, for each of the data holders, data directory information sent by the data holder after the data holder confirms the authorization comprises:通过所述数据服务平台向所述数据持有方发送数据授权请求;Sending a data authorization request to the data holder through the data service platform;确定所述数据持有方确认授权后,基于所述第一特征计算引擎和所述数据持有方的所述第二特征计算引擎共同建立密文通道;After determining that the data holder confirms the authorization, jointly establishing a ciphertext channel based on the first feature calculation engine and the second feature calculation engine of the data holder;通过所述密文通道接收所述数据持有方发送的加密的所述数据目录信息,并通过对应的所述第一通信密钥进行解密。The encrypted data directory information sent by the data holder is received through the ciphertext channel, and is decrypted using the corresponding first communication key.10.如权利要求9所述的方法,其特征在于,将所述元数据标识与所述第一数据提取规则发送至对应的所述数据持有方,包括:10. The method according to claim 9, wherein sending the metadata identifier and the first data extraction rule to the corresponding data holder comprises:通过所述第一通信密钥将所述元数据标识和所述第一数据提取规则进行加密;encrypting the metadata identifier and the first data extraction rule by using the first communication key;通过所述密文通道,将加密的所述元数据标识和所述第一数据提取规则发送至对应的所述数据持有方。The encrypted metadata identifier and the first data extraction rule are sent to the corresponding data holder through the ciphertext channel.11.如权利要求6所述的方法,其特征在于,所述接收所述数据服务平台发送的数据产品,包括:11. The method according to claim 6, wherein the receiving the data product sent by the data service platform comprises:通过所述第一特征计算引擎生成平台私钥和平台公钥;Generate a platform private key and a platform public key through the first feature computing engine;将所述平台公钥发送给所述数据服务平台,以使所述数据服务平台通过所述平台公钥将所述数据产品进行加密;Sending the platform public key to the data service platform, so that the data service platform encrypts the data product by using the platform public key;接收所述数据服务平台发送的加密的所述数据产品,并通过所述平台私钥进行解密。The encrypted data product sent by the data service platform is received, and decrypted using the platform private key.12.如权利要求6所述的方法,其特征在于,在所述接收所述数据持有方确认授权后发送的数据目录信息之后,所述方法还包括:12. The method according to claim 6, characterized in that after receiving the data directory information sent by the data holder after confirming the authorization, the method further comprises:向所述数据服务平台发送可信环境建立请求,以使所述数据服务平台建立针对本次数据传输的可信执行环境。A trusted environment establishment request is sent to the data service platform so that the data service platform establishes a trusted execution environment for this data transmission.13.一种可信多方数据传输方法,其特征在于,应用于数据持有方,所述方法包括:13. A trusted multi-party data transmission method, characterized in that it is applied to a data holder, and the method comprises:接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至所述数据使用方,以使所述数据使用方根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;Receive a data authorization request sent by a data user, and after confirming the authorization, send the data directory information to the data user, so that the data user can obtain the metadata identifier corresponding to the target original data from the data directory information according to the data demand;接收到所述数据使用方发送的元数据标识和第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,获取特征数据集;After receiving the metadata identifier and the first data extraction rule sent by the data user, based on the first data extraction rule, a second feature calculation engine is used to extract features of the target original data corresponding to the metadata identifier to obtain a feature data set;将所述特征数据集发送至数据服务平台,以使所述数据服务平台对所述特征数据集进行处理生成数据产品,并发送给所述数据使用方。The feature data set is sent to a data service platform, so that the data service platform processes the feature data set to generate a data product, and sends the data product to the data user.14.如权利要求13所述的方法,其特征在于,在所述将所述特征数据集发送至数据服务平台之前,所述方法还包括:14. The method according to claim 13, characterized in that before sending the feature data set to the data service platform, the method further comprises:接收所述数据服务平台的可信执行环境发送的持有方公钥,并通过所述持有方公钥对所述特征数据集和第二数据提取规则进行加密;所述可信执行环境为:所述数据服务平台接收所述数据使用方发送的可信环境建立请求后建立的;Receiving a holder public key sent by a trusted execution environment of the data service platform, and encrypting the feature data set and the second data extraction rule by means of the holder public key; the trusted execution environment is established after the data service platform receives a trusted environment establishment request sent by the data user;将加密的所述特征数据集和加密的所述第二数据提取规则发送至所述可信执行环境,以使所述可信执行环境接收加密的所述特征数据集和加密的所述第二数据提取规则,并通过持有方私钥进行解密后,基于所述元数据标识,对所述第一数据提取规则和第二数据提取规则进行比较。The encrypted feature data set and the encrypted second data extraction rule are sent to the trusted execution environment, so that the trusted execution environment receives the encrypted feature data set and the encrypted second data extraction rule, and after decrypting them through the holder's private key, the first data extraction rule and the second data extraction rule are compared based on the metadata identifier.15.如权利要求13所述的方法,其特征在于,在所述接收数据使用方发送的数据授权请求之前,所述方法还包括:15. The method according to claim 13, characterized in that before receiving the data authorization request sent by the data user, the method further comprises:在所述数据服务平台进行注册后,通过所述第二特征计算引擎生成第二通信密钥;After registering on the data service platform, generating a second communication key through the second feature calculation engine;所述接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至所述数据使用方,包括:The receiving a data authorization request sent by a data user, and sending the data directory information to the data user after confirming the authorization, includes:通过所述数据服务平台接收所述数据使用方发送的所述数据授权请求;Receiving the data authorization request sent by the data user through the data service platform;确认授权后,通过所述第二通信密钥对所述数据目录信息进行加密,并基于所述第二特征计算引擎和所述数据使用方的第一特征计算引擎共同建立密文通道;After confirming the authorization, the data directory information is encrypted by the second communication key, and a ciphertext channel is jointly established based on the second feature calculation engine and the first feature calculation engine of the data user;通过所述密文通道,将加密的所述数据目录信息发送至所述数据使用方,以使所述数据使用方通过所述密文通道接收加密的所述数据目录信息,并通过第一通信密钥进行解密。The encrypted data directory information is sent to the data user through the ciphertext channel, so that the data user receives the encrypted data directory information through the ciphertext channel and decrypts it using the first communication key.16.如权利要求14所述的方法,其特征在于,接收到所述数据使用方发送的元数据标识和所述第一数据提取规则,包括:16. The method according to claim 14, wherein receiving the metadata identifier and the first data extraction rule sent by the data user comprises:通过密文通道,接收加密的所述元数据标识和加密的所述第一数据提取规则,并通过第二通信密钥进行解密;所述元数据标识和所述第一数据提取规则为所述数据使用方通过第一通信密钥加密的。The encrypted metadata identifier and the encrypted first data extraction rule are received through a ciphertext channel and decrypted using a second communication key; the metadata identifier and the first data extraction rule are encrypted by the data user using a first communication key.17.一种可信多方数据传输装置,其特征在于,应用于数据服务平台,所述装置包括:17. A trusted multi-party data transmission device, characterized in that it is applied to a data service platform, and the device comprises:第一接收单元,用于接收至少一个数据持有方发送的特征数据集,所述特征数据集为:所述数据持有方接收到数据使用方发送的元数据标识和第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取得到的;所述元数据标识是所述数据使用方根据数据需求从所述数据持有方确认授权后发送的数据目录信息中获取的,所述第一数据提取规则为:所述数据使用方基于所述元数据标识和对应的数据需求,通过第一特征计算引擎生成的;A first receiving unit is used to receive a feature data set sent by at least one data holder, wherein the feature data set is obtained by extracting features of target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule after the data holder receives the metadata identifier and the first data extraction rule sent by the data user; the metadata identifier is obtained by the data user from the data directory information sent by the data holder after confirming the authorization according to data requirements, and the first data extraction rule is generated by the data user through the first feature calculation engine based on the metadata identifier and the corresponding data requirements;处理单元,用于对至少一个所述特征数据集进行处理生成数据产品,并将所述数据产品传输至所述数据使用方。A processing unit is used to process at least one of the feature data sets to generate a data product, and transmit the data product to the data user.18.一种可信多方数据传输装置,其特征在于,应用于数据使用方,所述装置包括:18. A trusted multi-party data transmission device, characterized in that it is applied to a data user, and the device comprises:第一请求单元,用于向至少一个数据持有方分别发送数据授权请求;A first request unit, configured to send a data authorization request to at least one data holder;获取单元,用于对于每个所述数据持有方,接收所述数据持有方确认授权后发送的数据目录信息,并根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;An acquisition unit, configured to receive, for each of the data holders, data directory information sent by the data holder after the data holder confirms the authorization, and acquire metadata identifiers corresponding to target original data from the data directory information according to data requirements;生成单元,用于对于每个所述元数据标识,基于所述元数据标识和对应的所述数据需求,通过第一特征计算引擎生成对应所述目标原始数据的第一数据提取规则,并将所述元数据标识和所述第一数据提取规则发送至对应的所述数据持有方,以使所述数据持有方基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,并发送给数据服务平台;A generating unit is used to generate, for each metadata identifier, a first data extraction rule corresponding to the target original data through a first feature calculation engine based on the metadata identifier and the corresponding data demand, and send the metadata identifier and the first data extraction rule to the corresponding data holder, so that the data holder performs feature extraction on the target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule, and sends the feature extraction to the data service platform;第二接收单元,用于接收所述数据服务平台发送的数据产品;所述数据产品为:所述数据服务平台对至少一个特征数据集进行处理生成的。The second receiving unit is used to receive a data product sent by the data service platform; the data product is generated by the data service platform by processing at least one feature data set.19.一种可信多方数据传输装置,其特征在于,应用于数据持有方,所述装置包括:19. A trusted multi-party data transmission device, characterized in that it is applied to a data holder, and the device comprises:授权单元,用于接收数据使用方发送的数据授权请求,确认授权后将数据目录信息发送至所述数据使用方,以使所述数据使用方根据数据需求从所述数据目录信息中获取目标原始数据对应的元数据标识;The authorization unit is used to receive a data authorization request sent by a data user, and after confirming the authorization, send the data directory information to the data user, so that the data user can obtain the metadata identifier corresponding to the target original data from the data directory information according to the data demand;特征提取单元,用于接收到所述数据使用方发送的元数据标识和第一数据提取规则后,基于所述第一数据提取规则,通过第二特征计算引擎对所述元数据标识对应的目标原始数据进行特征提取,获取特征数据集;A feature extraction unit, configured to extract features of target original data corresponding to the metadata identifier through a second feature calculation engine based on the first data extraction rule after receiving the metadata identifier and the first data extraction rule sent by the data user, so as to obtain a feature data set;第一发送单元,用于将所述特征数据集发送至数据服务平台,以使所述数据服务平台对所述特征数据集进行处理生成数据产品,并发送给所述数据使用方。The first sending unit is used to send the feature data set to a data service platform, so that the data service platform processes the feature data set to generate a data product, and sends the data product to the data user.20.一种计算机可读存储介质,其特征在于,其包括计算机程序,当所述计算机程序在电子设备上运行时,所述计算机程序用于使所述电子设备执行权利要求1~16中任一所述方法的步骤。20. A computer-readable storage medium, characterized in that it comprises a computer program, and when the computer program is run on an electronic device, the computer program is used to enable the electronic device to execute the steps of any one of the methods of claims 1 to 16.21.一种计算机程序产品,其特征在于,包括计算机程序,所述计算机程序存储在计算机可读存储介质中;当电子设备的处理器从所述计算机可读存储介质读取所述计算机程序时,所述处理器执行所述计算机程序,使得所述电子设备执行权利要求1~16中任一所述方法的步骤。21. A computer program product, characterized in that it comprises a computer program, wherein the computer program is stored in a computer-readable storage medium; when a processor of an electronic device reads the computer program from the computer-readable storage medium, the processor executes the computer program, so that the electronic device executes the steps of any one of the methods described in claims 1 to 16.
CN202411047402.7A2024-08-012024-08-01Trusted multi-party data transmission method and device, electronic equipment and storage mediumActiveCN118568755B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202411047402.7ACN118568755B (en)2024-08-012024-08-01Trusted multi-party data transmission method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202411047402.7ACN118568755B (en)2024-08-012024-08-01Trusted multi-party data transmission method and device, electronic equipment and storage medium

Publications (2)

Publication NumberPublication Date
CN118568755Atrue CN118568755A (en)2024-08-30
CN118568755B CN118568755B (en)2024-11-08

Family

ID=92467219

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202411047402.7AActiveCN118568755B (en)2024-08-012024-08-01Trusted multi-party data transmission method and device, electronic equipment and storage medium

Country Status (1)

CountryLink
CN (1)CN118568755B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN118981796A (en)*2024-10-212024-11-19瓴羊智能科技有限公司 Data processing method, device, system, equipment, storage medium and program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180343247A1 (en)*2017-05-262018-11-29Samsung Sds Co., Ltd.Method, user terminal and authentication service server for authentication
CN112711774A (en)*2021-03-252021-04-27腾讯科技(深圳)有限公司Data processing method, device, equipment and storage medium
CN115085917A (en)*2022-06-212022-09-20杭州安恒信息技术股份有限公司 Data fusion computing method, device, device and medium of trusted execution environment
CN117992993A (en)*2024-04-072024-05-07蓝象智联(杭州)科技有限公司Data management and control method and system based on trusted execution environment
CN118070302A (en)*2023-11-242024-05-24中国工商银行股份有限公司Data processing method, device, nonvolatile storage medium and electronic equipment
CN118114222A (en)*2023-12-042024-05-31北京菱云科技有限公司Authentication method, device, system, equipment and medium for data product

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180343247A1 (en)*2017-05-262018-11-29Samsung Sds Co., Ltd.Method, user terminal and authentication service server for authentication
CN112711774A (en)*2021-03-252021-04-27腾讯科技(深圳)有限公司Data processing method, device, equipment and storage medium
CN115085917A (en)*2022-06-212022-09-20杭州安恒信息技术股份有限公司 Data fusion computing method, device, device and medium of trusted execution environment
CN118070302A (en)*2023-11-242024-05-24中国工商银行股份有限公司Data processing method, device, nonvolatile storage medium and electronic equipment
CN118114222A (en)*2023-12-042024-05-31北京菱云科技有限公司Authentication method, device, system, equipment and medium for data product
CN117992993A (en)*2024-04-072024-05-07蓝象智联(杭州)科技有限公司Data management and control method and system based on trusted execution environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN118981796A (en)*2024-10-212024-11-19瓴羊智能科技有限公司 Data processing method, device, system, equipment, storage medium and program product

Also Published As

Publication numberPublication date
CN118568755B (en)2024-11-08

Similar Documents

PublicationPublication DateTitle
US11025415B2 (en)Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device
WO2023024742A1 (en)Data processing method and apparatus, and computer device and storage medium
US20210099286A1 (en)Cryptographic operation method, working key creation method, cryptographic service platform, and cryptographic service device
CN103036872B (en)The encryption and decryption method of transfer of data, equipment and system
CN111741268B (en)Video transmission method, device, server, equipment and medium
US9608971B2 (en)Method and apparatus for using a bootstrapping protocol to secure communication between a terminal and cooperating servers
CN107948156A (en)The closed key management method and system of a kind of identity-based
US20230041862A1 (en)Cloud-side collaborative multi-mode private data circulation method based on smart contract
CN111131416A (en)Business service providing method and device, storage medium and electronic device
CN113613227B (en)Data transmission method and device of Bluetooth equipment, storage medium and electronic device
CN112733129B (en)Trusted access method for server out-of-band management
CN113923655B (en)Data decryption receiving method and device based on adjacent nodes
WO2025031042A1 (en)Data processing method and apparatus based on blockchain key, and device and storage medium
CN111901335A (en)Block chain data transmission management method and system based on middle station
CN118568755A (en)Trusted multi-party data transmission method and device, electronic equipment and storage medium
CN105491015A (en)Data communication and storage method
CN118802218A (en) Data transmission method, device, electronic device and storage medium
CN110690969A (en)Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties
CN110337100A (en) Block chain-based method, terminal and system for adding secondary cards for No. 1 multi-card business
CN114866317A (en) Multi-party data security computing method, device, electronic device and storage medium
CN114244569A (en)SSL VPN remote access method, system and computer equipment
CN113315749B (en) User data on-chain, user data usage methods, anonymous system and storage media
CN115412236A (en)Method for key management and password calculation, encryption method and device
CN117061115B (en)Key negotiation method, key negotiation apparatus, computer device, and computer-readable storage medium
CN119865312B (en) Encrypted communication system and method

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp