Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things

A secure multi-party computing, privacy protection technology, applied in computing, special data processing applications, user identity/authority verification, etc.

Active Publication Date: 2014-09-10
尚阳科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, each evaluator can read the total score value and final ranking of each evaluator from its corresponding RFID tag, but cannot extract the specific evaluation questionnaires of other evaluators, thereby protecting the evaluator's personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things
  • Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things
  • Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The process of the security multi-party computing privacy protection evaluation method based on the Internet of Things scenario can be described as follows:

[0057] The scheme is composed of a collection of entities such as participants, an identity authentication center, a registration information database, an evaluation database center, an evaluation result database, a score calculation center, and an evaluator database. figure 1 shown:

[0058] Step 1) Without loss of generality, it is assumed that there are n evaluators (n is a positive integer), these evaluators use different evaluation terminals in the Internet of Things to conduct online evaluations, and they identify their identity S i Stored in the radio frequency identification tag RFID attached to its terminal. When the evaluator uses the evaluation terminal for evaluation, the login system will automatically sense the RFID tag of the user terminal (such as figure 2 shown), and extract its identity S i A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The diversification of information acquisition terminals in an internet of things causes easy leakage of private information of a user, and the privacy of an evaluator and an evaluated person face serious threat, therefore, the protection of the privacy of evaluation parties becomes an urgent problem in online evaluation of the internet of things. In order to solve the problem, the invention provides a secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things. The method has the beneficial effects that since the authentication of the identity of the evaluated person is carried out by using an identity authentication protocol and simultaneously the encryption and decryption processes of evaluation questionnaires are properly controlled, the security of evaluation is further ensured; since a high-efficiency secure multi-party computation is applied in the design of a secure evaluation system, the secure scoring and ranking of a trusted third party is not needed, the intervention of an evaluation mechanism is reduced, and the privacy of evaluation is guaranteed; and by use of the method for separated storage of evaluation data in an evaluation result data and an evaluated person database, on the basis of secure multi-party summing and scoring, the personal privacy of the evaluator and the evaluated person is protected.

Description

technical field [0001] The invention relates to an implementation method for protecting the privacy information of both an evaluator and an evaluator from being violated during network evaluation in the Internet of Things, and belongs to the cross field of the Internet of Things and information security technology. Background technique [0002] The Internet of Things is based on the computer Internet, through radio frequency identification (RFID), infrared sensors, global positioning systems, laser scanners and other information sensing equipment, according to the agreed protocol, any item is connected to the Internet for information exchange. A network for intelligent identification, positioning, tracking, monitoring and management. The emergence of the Internet of Things is bringing concrete and profound changes to modern society, and its application fields involve all aspects of people's daily life. Therefore, in the future, information collection terminals such as RFID ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F17/30
Inventor 孙力娟周旋黄海平王汝传徐佳吕亚超严骐尚上戴庭窦轶沙超肖甫
Owner 尚阳科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products