Access control method for protecting access privacy of user in mobile value-added service system

A value-added service and access control technology, applied in the direction of public keys, security devices, electrical components, etc. of secure communication, which can solve the problem of inability to provide lightweight management methods.

Inactive Publication Date: 2012-09-12
JINAN UNIVERSITY
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention provides an access control method for protecting user access privacy in a mobile value-added service system, so as to solve the problem existing in the prior art that cannot provide a lightweight management method that can not only ensure the privacy of mobile value-added service users but also perform access control on them technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for protecting access privacy of user in mobile value-added service system
  • Access control method for protecting access privacy of user in mobile value-added service system
  • Access control method for protecting access privacy of user in mobile value-added service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] Such as figure 1 As shown, the system is composed of six types of entities: trusted third party 111 , certificate issuing authority server CA121 , role management center server 131 , service provider server 141 , wireless network 150 and mobile user equipment 161 . In a mobile value-added service environment in practical applications, in addition to multiple mobile user equipments 161, there may also be multiple service providers 141 and multiple role management centers 131. The trusted third party 111 is used to generate public parameters of the entire system. The certificate issuing authority server CA121 is used to generate public key / private key pairs of the role management central server 131, the service provider 141 and the mobile user equipment 161, and generate corresponding public key certificates. The role management center server 131 is used to perform proxy authorization on the proxy signature key of the mobile user. The authorization is based on the user r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of mobile value-added services, in particular to an access control method for protecting access privacy of a user in a mobile value-added service system. The method comprises system initialization, role-based authorization, certification and secret key consultation, tracking of the user and revocation of a user role. A role management center is required to implement honestly the authorization of the agent key and the opening of the anonymity, in particular, the role management center can not forge request information of the mobile user and protects interest of the user, and besides, a service provider does not know personal preferences of legal users to the mobile value-added service, so that the requirement of the system is reduced, the legitimate interests of users are safeguarded, the privacy right of users is protected and the method is suitable for development requirements of existing value added services.

Description

technical field [0001] The invention relates to the technical field related to mobile value-added services, in particular to an access control method for protecting user access privacy in a mobile value-added service system. Background technique [0002] With the use of telecom 3G networks and the popularity of smart phones, mobile value-added services have been applied to people's daily work and life. In this business, the service provider sells its own service products online, and mobile users purchase and use the services provided by the service provider through mobile devices. Due to the openness of the Internet and mobile networks, this service is suffering from various malicious attacks. In order to prevent attackers from illegally obtaining services, access control has become an indispensable part of mobile value-added services. In addition, when enjoying this service, the protection of personal privacy is also an issue that people are currently concerned about. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/30
Inventor 卢建朱邓盛源姚国祥范修伟
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products