Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

238results about How to "Enhanced anonymity" patented technology

System and Method of Encrypting Network Address for Anonymity and Preventing Data Exfiltration

A method is provided for sending a data packet from a client through a network and to a server. The data packet is a data structure having an originating address portion and destination address portion. The network includes a first mix router and a second mix router. The client has a client address, whereas the first mix router has a first mix router address, the second mix router has a second mix router address and the server has a server address. The method includes encrypting the originating address portion of the data packet and encrypting the destination portion of the data packet, transmitting the encrypted data packet, decrypting the originating address portion of the encrypted data packet and the destination portion of the encrypted data packet, providing a first data packet and providing a second data packet. Specifically, the encrypting the originating address portion of the data packet is based on the client address and the encrypting the destination portion of the data packet is based on one of the first mix router address and the second mix router address. The encrypting generates an encrypted data packet. The encrypted data packet is transmitted to the one of the first mix router and the second mix router, wherein it is decrypted to generate a decrypted data packet. The first data packet is based on the decrypted data packet and is provided to the other of the first mix router and the second mix router. The second data packet is provided to the server.
Owner:THE JOHN HOPKINS UNIV SCHOOL OF MEDICINE

Supervisory blockchain system and method

ActiveCN107483198AProtect anonymityAddresses the disadvantages of unsupervised featuresKey distribution for secure communicationUser identity/authority verificationBlockchainKey distribution center
The invention relates to a supervisory blockchain system and method. The system comprises a certificate authority (CA), a key distribution center (KDC), a supervision department and a common node, wherein the CA performs identity authentication for the common node to generate registration information about the node, and the registration information is opened to a blockchain network and waits to be written into a blockchain to complete the registration of the node; the KDC prepares supervision rules, defines a complete attribute set of the supervision department, and distributes keys to the supervision department according to specific attributes of the supervision department; the supervision department acquires the keys from the KDC, monitors network transactions of the blockchain, and adopts the own keys to decrypt the node registration information in the blockchain and acquire the real identity of the node when an abnormal account occurs; and the common node interacts with the CA, performs identity authentication, and joins the blockchain to operate after completing the registration. According to the system and method disclosed by the invention, a supervisory blockchain is constructed by using ABE, signatures and other cryptography techniques, different supervision departments are allowed to supervise data of the blockchain system according to different functions, and thus the occurrence of illegal acts and the like can be prevented.
Owner:INST OF INFORMATION ENG CAS

Smart card load and purchase transactions using wireless telecommunications network

A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card.
Owner:VISA INT SERVICE ASSOC

Certified Abstracted and Anonymous User Profiles For Restricted Network Site Access and Statistical Social Surveys

InactiveUS20110145570A1Enhanced anonymityEstablish dependabilitySecuring communicationChat roomInternet privacy
An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other forums. A trusted organization verifies that personal information presented by a user is correct, and authenticates the information in an encapsulated form as “certified profiles” within a smart card or other secure portable hardware device issued to the user Certified profiles are authenticated by digital signatures of the trusted organization and the profile users. Personal information in certified profiles can be in raw and/or in statistically-processed and abstracted form, and can be tailored by the user for specific needs to include whatever personal information is required, and to exclude all other personal information. By the use of unique aliases, it is possible for users to anonymously access restricted network sites and participate in surveys, while still satisfying recipients that supplied personal information is accurate, and for surveys that the user has not responded to the same survey more than once. Users enroll for certified profiles via trusted enrollment vendors who market the service to the public and also make hardware and software available to users for managing, maintaining, and distributing the certified profiles.
Owner:FORTRESS GB

Generation and capture system of encrypted frame hopping spread spectrum signal of air fleet link

The invention relates to a generation and capture system of an encrypted frame hopping spread spectrum signal of an air fleet link, belonging to the technical field of aeronautical data link and radio navigation. The invention discloses a system framework of an encrypted frame hopping spread spectrum signal generation and capture method which can be implemented on a digital signal processor (DSP)and a FPGA (field programmable gate array) of a circuit board, and provides a baseband signal generation algorithm of an encrypted frame hopping spread spectrum system to replace a traditional long periodic sequence spread spectrum code and a compound pseudo code by absorbing the advantages of the easy capture of the compound pseudo code and the difficult breaking of the long periodic sequence spread spectrum code; and meanwhile, the invention provides two advanced and high-performance encrypted frame hopping spread spectrum signal capture algorithms, i.e. a frequency domain parallel capture method of the encrypted frame hopping spread spectrum signal of based on a FFT (fast fourier transform algorithm) and a direct capture method of the encrypted frame hopping spread spectrum signal based on a matching filter and the FFT. The invention solves the problem of difficult capture of the traditional long periodic sequence spread spectrum code. The method can be widely applied to satellite navigation receivers, range measurement systems and communication systems based on a quiescent carrier modulation direct sequence spread spectrum system.
Owner:NAT SPACE SCI CENT CAS

Method for anonymous identification of the profiles of subscribers in a communication system and corresponding module

Methods and apparatus for anonymous identification of the profiles of subscribers in a communication system, wherein subscribers define and store subscriber-specific profiles via a respective input unit in a respective communication terminal and/or in a respective module respectively coupled to a respective communication terminal. Each respective module communication terminal is used to collect the profiles of other subscribers of the communication system on the basis of a wireless, locally defined network technology which are compared to the profiles defined and stored in the respective communication terminal whereupon they are discarded according to a subscriber-specific correlation threshold or communicated to the respective subscriber. A communication link is set up by an intermediate coupled provider of the communication system between subscribers when the respective subscriber activation occurs. A module is also disclosed that can be integrated in a mobile communication terminal or on a mobile communication terminal via an interface. The module includes a memory unit for storing profiles, a collector unit functioning on the basis of a wireless, locally defined network technology for collecting (scanning) profiles of subscribers, a correlation unit for comparing profiles, and a signaling/synchronizing unit.
Owner:SIEMENS AG

Vehicle fog data light-weight anonymous access authentication method based on blockchain assistance

The present invention provides a vehicle fog data light-weight anonymous access authentication method based on blockchain assistance, and relates to the technical field of network communication safetyof urban traffic operation management. The method comprises the steps of: arranging one witness node (WP) in a management range of each service manager (SM), initializing system parameters through antrusted center AD, and registering the SM and a OBU (On Board Unit); allowing the SM to authenticate the validity of the OBU, storing the authentication information, broadcasting an authentication result to the WP, and providing fog service to the OBU according to the authentication result by a roadside facility unit RSU; and writing the authentication result into a public account by the WP to complete OBU consensus. The vehicle fog data light-weight anonymous access authentication method based on blockchain assistance can protect the user privacy information while ensuring the identity authenticity of a vehicle user accessing the fog service so as to achieve the vehicle anonymous authentication and allow users to select the time and the frequency of replacement of the pseudonym by themselves; the non-interactive autonomous cross-domain authentication is achieved, and the communication delay is effectively reduced; and moreover, the authentication information management is simplified,and the risk that a single database is tampered is effectively avoided.
Owner:BEIJING JIAOTONG UNIV

Information transmitting method, processing method and device

The invention discloses an information transmitting method, a processing method and a device, so as to improve communication anonymity. The information transmitting method comprises steps: a transmitter receives to-be-transmitted information and a transmission target inputted by a user; the encryption key of the transmission target is acquired, and the encryption key is used for encrypting the to-be-transmitted information; the to-be-transmitted information after encryption is used as an additional information parameter for transaction information, wherein the transaction target of the transaction information is different from the transmission target; and the transaction information is transmitted through a block chain system. A receiver receives the transaction information transmitted from the block chain system; a decryption key is used for decrypting the additional information parameter in the transaction information; and after successful decryption, the information content in the additional information parameter is extracted. Thus, an attacker can not acquire the real identity of a user of the transmission target. Thus, when the technical scheme disclosed by the invention is adopted, the anonymity of anonymous communication can be enhanced.
Owner:UNION MOBILE PAY

PUF-based three-factor anonymous user authentication protocol method in Internet of Things

The invention discloses a PUF (Physical Unclonable Function)-based three-factor anonymous user authentication protocol method in the Internet of Things, which solves the security problems such as physical clone attacks and the like, and is implemented by the following steps that: a gateway generates a long-term key for registration and key negotiation of nodes and users; the node sends a PUF-basedchallenge and response to the gateway, and the gateway generates an authentication certificate and sends a node key to the node to complete registration; the user sends the identity identifier to thegateway, the gateway generates a user dynamic identity identifier and a user key and sends the user dynamic identity identifier and the user key to the user, and the user encrypts and stores the userdynamic identity identifier and the user key in the smart card to complete registration; and the user, the gateway and the node perform mutual authentication and key agreement to form a PUF-based three-factor anonymous user authentication protocol method in the Internet of Things. Based on three-factor authentication, smart card loss, password guessing attack and the like can be resisted; the method achieves the anonymity of the user and the node, is small in calculation amount, is high in efficiency, is suitable for IOT nodes with limited resources, and is used for IOT safety communication.
Owner:XIDIAN UNIV

Flexible asymmetric group key negotiation method

The invention discloses a flexible asymmetric group key negotiation method. The method comprises the steps of carrying out parameter initialization by members participating in group key negotiation, thereby generating public/private key pairs; blinding group contribution key shares through the public/private key pairs, and broadcasting group key shares; after the rest members receive corresponding broadcasting key shares, carrying out combination calculation, thereby obtaining group keys; and verifying whether calculated group keys are correct or not by the group members, encrypting communication information through the group keys if the calculated group keys are correct, and exchanging group security information. According to the method, members in or out of a group can select any one subset object in the group for secret information exchange; an object not selected by an information sender cannot decrypt the shared information; the group members can negotiate an encryption key and a decryption key which are consistent; the group members can verify the correctness of the keys; anonymity of the members participating in group key negotiation can be realized; and the personal private information of the group members can be protected.
Owner:河南招源科技有限公司

Distributed hash table network-based anonymous communication method

ActiveCN104168265AAchieve the purpose of normal operationRealization of anonymous communicationTransmissionSecure transmissionUser privacy
The invention relates to a distributed hash table (DHT) network-based anonymous communication method. With regard to three kinds of basic operations, including the resource publishing operation, the resource searching operation, and the resource transmission operation, of the traditional DHT network, a certain anonymous mechanism and security mechanism are introduced, thereby solving an anonymous communication problem in the DHT network. An anonymous mapping path is constructed at the resource publishing stage and a mapping node is determined, so that an anonymous base is provided for the resource publishing operation; a probabilistic forwarding strategy is used at the resource searching stage, so that the resource searching operation has the anonymous property; and at the resource loading and transmission stage, the mapping node is used as a relay node to carry out data transmission and combination with the session key encryption data is used, thereby guaranteeing the anonymous transmission and secure transmission of data. On the basis of combination of the three parts, sender anonymity, receiver anonymity, and communication relation anonymity are realized, thereby achieving objectives of user privacy protection and secure and stable operation of the whole DHT network.
Owner:NANJING UNIV OF POSTS & TELECOMM

Elliptic curve-based efficient and anonymous certificateless multi-receiver signcryption method

The invention discloses an elliptic curve-based efficient and anonymous certificateless multi-receiver signcryption method. The method is used for solving the technical problem in the prior art that an existing certificateless multi-receiver signcryption method is low in operation efficiency. According to the technical scheme of the invention, firstly, a user public key and a partial private key, generated by a private key generation center PKG, are sent to a user. Secondly, after the user receives the user public key and the partial private key, the user calculates its own private key. Meanwhile, the user verifies whether the received user public key and the received partial private key are valid or not. If valid, the operation is continued. Otherwise, the operation is stopped. Thirdly, the signcryption algorithm is adopted to design an elliptic curve and the ciphertext information does not include the identity information of a sender and a recipient. Finally, the ciphertext information is broadcasted. Only authorized recipients can fairly decrypt and verify the ciphertext information. According to the technical scheme of the invention, the signcryption process is designed to conduct based on the elliptic curve. Therefore, the multiplication operation on the elliptic curve is reduced, and the calculation efficiency is improved.
Owner:XIDIAN UNIV

Method for protecting privacy of identity information based on sensitive information measurement

The invention discloses a method for protecting privacy of identity information based on sensitive information measurement. The method comprises the comprises the following steps of S1, determining input and output; S2, defining and calculating identity importance degree; S3, optimizing the identity importance; S4, calculating a sensitive information disclosing matrix, a minimum attack set and an information disclosing probability; S5, determining a generalizing function, and generalizing a dataset; S6, establishing a background knowledge attack-avoidance privacy protection model; S7, describing a (gamma, eta)-Risk anonymity algorithm, inputting an original dataset D, and outputting an anonymity dataset D'; S8, introducing a confidence interval, controlling the high-probability inference attack of an attacking party within the specified confidence interval, so as to avoid a user using an attribute distribution function to calculate the identity information of the user, calculate features, and perform high-probability inference attack. The method has the advantages that the problem of difficulty in effectively treating the privacy information attack based on background knowledge attack in the existing privacy protection method is solved, and the key identity and identity sensitive information are more comprehensively and effectively protected.
Owner:湖南宸瀚科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products