-
公开(公告)号:US20240364502A1
公开(公告)日:2024-10-31
申请号:US18631621
申请日:2024-04-10
Inventor: Peng XU , Mengyang YU , Wei WANG , Yixin SU , Yubo ZHENG , Hai JIN
CPC classification number: H04L9/0819 , H04L9/0869 , H04L9/3236
Abstract: A method and system for encryption and assured deletion of information is provided, the method at least includes: sorting fields of the information into at least two sensitivity levels by sensitivity; generating encryption keys and key shards thereof based on predetermined thresholds, and creating mapping between targets and the key shards, based on the encryption keys for the sensitivity levels, encrypting the information fields of the corresponding sensitivity levels and deleting the original information and encryption keys; and in response to reception of a recover request, recovering the encryption keys based on the key shards and performing decryption, so as to recover the original information. The present disclosure aims at the problem that information is difficult to be safely stored and assuredly deleted, and realizes multi-party security key deletion of encrypted personal information.
-
公开(公告)号:US20240330505A1
公开(公告)日:2024-10-03
申请号:US18602957
申请日:2024-03-12
Inventor: Peng XU , Yixin SU , Wei WANG , Mengyang YU , Tianyang CHEN , Hai JIN
IPC: G06F21/62
CPC classification number: G06F21/6245 , G06F2221/2143
Abstract: A method and system for trusted third-party audit of personal-information deletion is provided, wherein the method includes: acquiring log data of an arbitrary source-domain personal-information deleting body in a network and of its associated-domain personal-information deleting bodies; normalizing the log data according to predetermined parsing rules and thereby generating normalized log data; and performing consistency-of-notification analysis and operation-compliance analysis on the normalized log data by means of association analysis. The present application is based on an audit analysis of log files to identify whether the information deletion process conforms to the multi-dimensional or multi-level audit judgment conditions and to perform forensics on abnormal deletion of personal information in a timely manner, so as to ensure that personal-information deletion can satisfy requirements of internal control, industrial standards, policies and regulations.
-