Unlock instant, AI-driven research and patent intelligence for your innovation.
Method and system for sharing anonymous resource
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A resource sharing and resource technology, applied in the field of computer information, can solve problems such as increasing server burden, unknown threats, and leaking user personal information.
Inactive Publication Date: 2010-09-15
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 22 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
At the same time, the use of pseudonym mapping can avoid the above situation to a certain extent, but it still cannot prevent the resource server from destroying the user's privacy
[0004] At present, there are already some research projects that focus on technologies related to anonymous authentication, including the shibboleth project organized by Oasis and the Liberty project of the Liberty Alliance. Obtain the user's personal information, thereby protecting the user's personal privacy, but there is no restriction on the resource server. The server can know all the user's information during authentication. If the server is dishonest or attacked, it will leak the user's personal information. information that may pose an unknown threat
In addition, the server generally needs to save and understand all the information of the resources. If the server is attacked, the information of the resources will be leaked, and the server needs to manage the access control of the resources, which increases the burden on the server.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
[0056] a. When the anonymous authentication system is established, the authentication server generates and publishes system parameters (q, G, G, g, g, e), where g, g are the generators of the group G and G respectively, and the order of the group is q, e It is a bilinear map e: G×G→G.
[0057] b. The authentication server chooses its private key x,y∈Zq, and generates its public key X=g x , Y=g y , the Zq represents an integer group of order q.
[0058] c. When the authenticator registers with the authentication server, randomly select t∈Zq and send C=g t To the authentication server, the server randomly selects α∈Zq, and calculates a=g α , and use its private key to generate an anonymous credential σ=(a, a y , a x C αxy ), denoted as (a, b, c), the authentication server sends σ to the authenticator.
[0059] d. When the authenticator performs authentication, the authenticator uses its anonymous credential σ and a random number s=(s 1 ,s 2 ) to generate a blinded signa...
Embodiment 2
[0065] Embodiment 2. Resource sharing method and system
[0066] This embodiment aims to provide a specific example of the resource sharing method and system of the present invention.
[0067] This embodiment is based on the following scenario setting: users A and B have registered on the resource server S, A wishes to publish resources through the resource server and restricts the attributes that users who obtain the resources should have, and B wishes to obtain the resources released by A and verify Properties that its publisher has. Therefore, in this setting, user A (or the computer client where user A is located) is the resource publisher, and user B (or the computer client where user B is located) is the resource acquirer.
[0068] The process for user A to publish resources is as follows: image 3 As shown, the specific content is as follows:
[0069] 1. Client A accesses server S and submits a resource publishing request. After obtaining the request, S calls the AAC...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method and a system for sharing an anonymous resource, which belong to the technical field of computer information. The method for sharing the resource comprises the following steps that: a resource provider initiates a resource publishing request to a resource managementserver; the resource managementserver performs an anonymous authentication on the request; the resource provider generates a resource acquisition strategy, uses the resource acquisition strategy as a cipher key to encrypt the resource, and sends the acquisition strategy and the encrypted resource to the resource managementserver; the resource management server stores a binary group and releases resource description information; a resource acquirer retrieves the resource description information and initiates a resource acquisition request; the resource management server performs the anonymous authentication on the resource acquirer; and the resource acquirer acquires and decrypts the resource after acquiring a strategy verification. The invention also discloses a system sharing the resource, which corresponds to the method. The method and the system can be used for computer information technical application such as network resource sharing and the like.
Description
technical field [0001] The invention relates to resource sharing, in particular to an anonymous authentication method, an anonymous resource sharing method and a system. It belongs to the field of computer information technology. Background technique [0002] The development of network technology enables the comprehensive sharing of information resources, bringing people a new mode of knowledge acquisition, but also triggers new security issues, such as information leakage in the process of resource sharing. With the increasing number of network activities, people pay more and more attention to personal privacy. It is an inevitable trend to use anonymous authentication and anonymous communication to protect the privacy of most network activities. The core idea of anonymous authentication is to separate qualification authentication from identity identification in the authentication process, that is, in the authentication process, the verifier can only verify the relevant a...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.