Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

150results about How to "Guaranteed anonymity" patented technology

Modifiable reputation evaluation system and method based on block chain, and electronic payment system

ActiveCN107967557AAvoid injusticeGuaranteed transaction privacyFinanceDigital data protectionRing signatureE-commerce
The invention belongs to the e-commerce technology field and discloses a modifiable reputation evaluation system and method based on a block chain, and an electronic payment system. A receipt from a seller is received by a user, the signature of the seller in the receipt is verified, and the evaluation information is generated; after verification is completed, a ring signature of the evaluation information is generated by the user, and the ring signature is sent to the block chain; the receipt and the ring signature of the user are verified by the block chain; a database is updated after the block is generated; a new signature is acquired by the user through a signature algorithm, and the new signature is sent to the block chain; validity of the signature is verified by the block chain, and whether the two signatures are completed by the same user is determined; a pointer corresponding to the block of a previous message is modified after verification completion, the previous message ismarked as invalid, and the previously-revoked information is replaced by the block of the message. The method is advantaged in that on the condition that user anonymity and transaction non-tamperability are guaranteed, integrity and openness of the evaluation information are guaranteed, and reliability of the evaluation information is guaranteed.
Owner:XIDIAN UNIV

IOV (Internet of Vehicles) anonymous authentication system with controllable link, and IOV anonymous authentication method

The invention discloses an IOV (Internet of Vehicles) anonymous authentication system with a controllable link, and an IOV anonymous authentication method, and relates to the IO field. The system includes a system initialization module which is used for completing the initialization work of an IOV system and a TA (trusted authority); a registration module which is used for completing the registration of an OBU (onboard unit) and an RSU (roadside unit) to the TA; an OBU joining module which is used for obtaining a group certificate from the RSU when the OBU enters the communication range of a new RSU; a signature module which is used for completing the signature of a vehicle about a message; an authentication module which is used for completing the signature information authentication afterthe OBU receives the signature information; a link module which is used by an SP (service provider) to determine whether the two signature messages are linkable or not; an identity tracking module which is used for completing the process that the TA exposes the real identity of a signer of a valid signature message. The construction of the system uses a more lightweight elliptic curve operation to make the authentication process more efficient.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

PUF-based three-factor anonymous user authentication protocol method in Internet of Things

The invention discloses a PUF (Physical Unclonable Function)-based three-factor anonymous user authentication protocol method in the Internet of Things, which solves the security problems such as physical clone attacks and the like, and is implemented by the following steps that: a gateway generates a long-term key for registration and key negotiation of nodes and users; the node sends a PUF-basedchallenge and response to the gateway, and the gateway generates an authentication certificate and sends a node key to the node to complete registration; the user sends the identity identifier to thegateway, the gateway generates a user dynamic identity identifier and a user key and sends the user dynamic identity identifier and the user key to the user, and the user encrypts and stores the userdynamic identity identifier and the user key in the smart card to complete registration; and the user, the gateway and the node perform mutual authentication and key agreement to form a PUF-based three-factor anonymous user authentication protocol method in the Internet of Things. Based on three-factor authentication, smart card loss, password guessing attack and the like can be resisted; the method achieves the anonymity of the user and the node, is small in calculation amount, is high in efficiency, is suitable for IOT nodes with limited resources, and is used for IOT safety communication.
Owner:XIDIAN UNIV

Electronic voting system based on finger vein feature recognition

The invention discloses an electronic voting system based on finger vein feature recognition. The system comprises a finger vein feature acquisition device, a voting client sub-system, a voting center sub-system and a vote counting center sub-system. The finger vein image of a voter is acquired by the finger vein feature acquisition device, the voter is registered in the voting center sub-system by the finger vein feature, the legality of the voter is verified by the voting center sub-system, and the vote is issued to the voter if the voter is qualified. A biological characteristic public / private key pair of the voter can be generated by software of the voting client sub-system, and the voting process is realized by the interaction of security protocols such as certificate signing among the voting client sub-system, the voting center sub-system and the vote counting center sub-system. Compared with other electronic voting systems, the system enables a finger vein feature recognition technology to be introduced, and the finger vein feature recognition technology replaces ways such as passwords and digital certificates and takes part in the network identity authentication and the voting process, so that the safety and use convenience of the system are improved; the electronic voting system based on finger vein feature recognition also has anonymity, transparency and openness.
Owner:SOUTHWEST JIAOTONG UNIV

Data safe transmission method in body area network system

The invention provides a data safe transmission method in a body area network system. The data safe transmission method in the body area network system comprises the following steps: according to the level structure deploy body area network system, and symmetric keys are prearranged in cluster heads and base stations, and symmetric keys are prearranged in concentrators and the cluster heads; the body area network system is initialized; each concentrator collects data and transmits the data to the cluster heads; and the data are sent to the base stations by the cluster heads, and are decrypted, stored, analyzed and processed through the base stations. The body area network structure is delaminated, simplicity and expansibility of network deploy are improved, and the data safe transmission method is beneficial for network life circles and energy control. The data safe transmission method not only can guarantee data privacy of users, but also can ensure network user context privacy, and prevent corresponding relations between two communication sides from being broken. In addition, information receivers are not limited, and therefore medical workers or relatives of patients can all conveniently and fast search disease information of patient information, the data safe transmission method accords with actual using requirements of a body area network.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Remote identity authentication method participated in by registration center under multi-sever environment

The invention discloses a remote identity authentication method participated in by a registration center under a multi-sever environment, which comprises the following steps: a user registration application is submitted to the registration center; a smart card is adopted to log in to a server which is registered in the registration center; the smart card performs local legality verification on a user, if yes, first logging-in requesting information is generated and sent to a server; the server generates second logging-in requesting information and sends the information to the registration center; the registration center performs legality verification on the server and the user identity according to the received second logging-in requesting information, if yes, the registration center generates first authentication information and sends the information to the server; the server performs legality verification on the registration center, if yes, the server sends second authentication information to the smart card; the smart card performs legality verification on the server and the registration center, if yes, the smart card, the server and the registration center jointly generate a session key. The method can prevent anonymity attack and avoid the attack caused by reveal of a verification table.
Owner:SHANDONG UNIV OF SCI & TECH

Attribute-based anonymous authentication method and system thereof

InactiveCN104125199AFlexible Threshold Attribute Selective Presentation SchemeImprove communication efficiencyTransmissionInternet privacyService provision
The invention discloses an attribute-based anonymous authentication method which contains the following steps: 1) a trusted party TP generates a master key x and system public parameters according to set safety parameters; 2) a user U registers with the TP to submit attributes and initiates an attribute certificate issue request; 3) the TP verifies the attributes of the user U and issues an attribute certificate for the user U according to the attributes of the U, the master key x and the system public parameters; 4) the user U initiates an access request to a service provider SP; 5) the SP looks up an access strategy corresponding to the access request and returns the access strategy to the user U; 6) the user U selects an attributes that the U wants to use according to the access strategy, and an anonymous certificate is calculated by the use of the attribute certificate and a private key r and is sent to the SP; and 7) the SP verifies the anonymous certificate, and accepts the access request and provides corresponding service to the user if verification is passed and the access strategy is satisfied. According to the invention, privacy of a user is guaranteed, and a more flexible threshold attribute selective showing scheme is supported.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +1

Privacy protection access control method in wireless sensor network supported by IP

ActiveCN109963282AGuaranteed unlinkabilityFlexible revocation processNetwork topologiesSecurity arrangementWireless mesh networkPrivacy protection
The invention discloses a privacy protection access control method in a wireless sensor network supported by an IP. According to the method, a group signature technology is applied, system users are divided into different user groups according to different access authorities, the group users use group signatures for anonymous access to guarantee user data access privacy, and leakage of user behavior modes is prevented. According to the method, users are divided into different user groups according to different access authorities by utilizing a group signature technology, the group users generate group signatures for identity authentication, and anyone in a network can verify the correctness of the group signatures but cannot know the identities of the signers; the identity authentication and authorization process of the Hidra protocol is improved by utilizing a false ticket mechanism and a self-updating ticket mechanism, so that the unlinkability of a protocol message is ensured; the block chain technology is used for managing the group public key, so that the secret key management and Hidra protocol user revocation process is more flexible; a responsibility investigation mechanismis improved by utilizing a block chain technology, so that the responsibility investigation process is public and transparent, and possible responsibility investigation disputes are solved.
Owner:SOUTH CHINA UNIV OF TECH

Location privacy protection method based on dynamic pseudonym exchange area

The invention discloses a location privacy protection method based on a dynamic pseudonym exchange area, and belongs to the field of location privacy protection of the Internet of vehicles. The methodcomprises the steps that a vehicle in the vehicular ad hoc network registers and generates a dynamic pseudonym in the driving process and periodically updates the pseudonym, then the vehicle dynamically establishes a pseudonym exchange area, carries out pseudonym exchange to enhance the location privacy, embeds an improved Diffie-Hellman key exchange protocol in the pseudonym exchange process atthe same time to protect the pseudonym exchange process, the vehicle initiating the pseudonym exchange uploads a pseudonym exchange log to a certification authority (CA) of the area after the completion of the pseudonym exchange, the CA re-establishes the relationship between a real ID and the pseudonym of the vehicle through analyzing the pseudonym exchange log so as to enable the CA to perform identity tracking and violation processing. The location privacy protection method solves a problem of location privacy of the vehicle in the driving process, and is an effective location privacy protection method which adapts to the communication environment of the Internet of vehicles and can claim the responsibility of violation vehicles.
Owner:KUNMING UNIV OF SCI & TECH

Supervisable anonymous authentication method based on zero knowledge proof

The invention discloses a supervisable anonymous authentication method based on zero knowledge proof, comprising three types of participants: a CA, a user and a verifier, wherein the CA generates an issuer key pair and a group key, the CA allocates a pair of private keys to the user during registration of the user, and meanwhile the CA issues a relevant certificate to the user according to the attribute information submitted by the user; when the user presents the certificate, the verifier specifies an attribute that needs to be presented on the certificate of the user, and the user signs thecertificate and hides attribute values that do not need to be presented; and the verifier verifies the signature, if the signature passes the verification, the certificate presented by the user is valid, or otherwise, the certificate presented by the user is invalid. By adoption of the supervisable anonymous authentication method disclosed by the invention, the anonymity of the user is also ensured while increasing a mandatory supervision function, thereby greatly improving the identity privacy of the user compared with the general identity supervision scheme. By adoption of the supervisable anonymous authentication method disclosed by the invention, a supervisable function is also added.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Anonymous subscription agreement and system thereof

The invention provides an anonymous subscription agreement and a system thereof. The anonymous subscription agreement comprises the following steps: 1. a server generates a series of main system parameters, such as a login cycle and public and private key information thereof; 2. a user interacts with the server and executes a registration process, and in the process, the user provides a subscription interval time and pays a corresponding fee to obtain a valid signature from a service provider; 3. the user logs in by using the signature, logs in according to a fixed login cycle at a login stage, carries out a blind operation on the signature to generate a token of the current login cycle for login, carries out the next cycle after the login cycle is terminated, and changes the token to log in; 4. the anonymous agreement provides a connection operation, and the user can select to execute the connection operation when no decorrelation is required; and 5. when the user does not want to access the service, the user can execute a logout operation; and moreover, in the login and connection stages, inspection on the expiration time is contained, and if the subscription time interval is overdue, the user cannot log in anymore, so the benefits of the service provider are guaranteed.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Multi-receiver signcryption method based on multiple variables and multiple security properties

ActiveCN104539425AGuaranteed anonymityGuarantee the fairness of decryption signcryptionUser identity/authority verificationAlgorithmSigncryption
The invention discloses a multi-receiver signcryption method based on multiple variables and multiple security properties. The method is used for solving the technical problem that an existing multi-receiver signcryption method is poor in designcryption justice. According to the technical scheme, an algorithm KeyGen, a signcryption algorithm Signcrypt and a designcryption algorithm Designcrypt which are used for generating system parameters and secret key pairs of all users are involved in the method. The signcryption algorithm is based on a finite domain F with a characteristic q, totally N+tau participants are involved in a system, a leader L is selected from actual signcryption persons and calculates interference data, the interference data and real data are mixed together, so receivers can not judge the identities of the actual signcryption persons. By means of the threshold technology, the anonymity of senders is ensured; the identity list of the receivers is not directly given any more in communication data, and the anonymity and early judgment of the receivers are ensured; key information of designcryption and information of the authorized receivers are fused into a parameter list, and the designcryption justice is ensured.
Owner:东莞三航安视睿信息技术有限公司

VANETs anonymous authentication system and method based on ID-based group signature

The invention provides a VANETs anonymous authentication system based on an ID-based group signature, related to the technical field of wireless network security. The VANETs anonymous authentication system based on the ID-based group signature comprises a third-party trust institution, roadside units and vehicle units; and the third-party trust institution communicates with the vehicle units through the roadside units. The invention also provides a method for anonymous authentication using the VANETs anonymous authentication system based on the ID-based group signature; after the third-party trust institution generates an initial pseudonym, an initial trust value and a signature private key for the vehicle units, and generates a signature private key, a group private key and a group publickey for the roadside units, a V2I authentication protocol is performed between the vehicle unit and the roadside unit, and a V2V authentication protocol is performed among the vehicle units, and a shared key is generated when both are legal; and finally, the roadside units assist the third-party trust institution to track a true identity of the vehicle unit sending a malicious message and performfurther processing. The invention can ensure the anonymity of the vehicle node identity, avoid the certificate storage and management overhead, and improve the privacy protection strength and the authentication efficiency.
Owner:NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products