Unlock instant, AI-driven research and patent intelligence for your innovation.

Universal calculation secret protection method capable of repeatedly using assumed names

A technology for privacy protection and pervasive computing, which is applied to public keys for secure communication, user identity/authority verification, electrical components, etc. It can solve problems such as users not being identified, and achieve the effect of small computing tasks and low interference

Inactive Publication Date: 2010-07-14
HUAZHONG NORMAL UNIV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Pseudonyms are often pre-assigned at random, but it suffers from the birthday paradox
[0008] The ultimate purpose of anonymity and pseudonymity is to hide user identity information, but there are some differences between the two. When using anonymity, the user is never identified, so it cannot personalize the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal calculation secret protection method capable of repeatedly using assumed names
  • Universal calculation secret protection method capable of repeatedly using assumed names
  • Universal calculation secret protection method capable of repeatedly using assumed names

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below in conjunction with accompanying drawing and embodiment describe in detail:

[0033] 1. If figure 1 , the global pervasive computing environment 10 is divided into autonomous regions 20, and all autonomous regions 20 use the same pseudonym set S; in order to prevent too few pseudonyms in one region, when there are too many access users, the pseudonyms in the pseudonym set S are not enough Use, and prevent birthday paradox attack problem; The present invention adopts the summary value H (SHA-512) that SHA-512 algorithm outputs as pseudonym set, namely S=H (SHA-512). In an autonomous region, as long as there are users, the autonomous region will not only select a pseudonym for the user, but also randomly select a certain number of pseudonyms that do not correspond to any user, so as to ensure that the number of pseudonyms in the autonomous region reaches a threshold.

[0034] 2. If figure 2 , in an autonomous area 20, including an authentication server 21 and mul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a universal calculation secret protection method capable of repeatedly using assumed names, which belongs to a secret protection method in the filed of information security. The method of the invention comprises the following steps: 1, dividing the global universal computer environment into various different autonomous regions, and using one identical assumed name set in each autonomous region; 2, firstly authenticating a user by the autonomous region after the user enters the autonomous region, and then randomly selecting an assumed name unused in the region from the assumed name set by the autonomous region to be used as an identification mark of the user; 3, making the number of the assumed names randomly selected by the autonomous regions to be larger than one threshold value in each autonomous region if the users exist in the autonomous region; and 4, using the assumed names to obtain the service by the users. The invention has the advantages that one user can use different assumed names in one region but in different time intervals, the relationship between the users and the assumed names is the many-to-many relationship, the interference on the users is small, the users do not need to participate the selecting process of the assumed names, and the work load of user equipment calculation is small.

Description

technical field [0001] The invention belongs to a privacy protection method in the field of information security, in particular to a pervasive computing privacy protection method that can reuse pseudonyms. Background technique [0002] The ubiquitous computing environment is composed of various terminals, such as sensors, cameras, RFID (Radio Frequency Identification, radio frequency identification) tags, GPS (Global Positioning System, global satellite positioning system), mobile PCs and mobile phones, and so on. These devices will be ubiquitous and many will be invisible (such as sensors). In a pervasive computing environment, in order to provide better services to users, the environment needs to collect and use some personal information of users, which obviously involves the privacy information of users. From the perspective of users, the invisibility of pervasive systems makes it difficult for them to know when, where and what devices are serving them, and what personal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 郭亚军郭奕旻王彩梅郭艳华赵凯南彭飞
Owner HUAZHONG NORMAL UNIV