Method with privacy protection function for validating creditability of public terminal

A technology of privacy protection and verification method, which is applied in the field of public terminal credibility verification, and can solve problems that are highly technical and difficult for ordinary users

Inactive Publication Date: 2012-10-31
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is too professional and technical, and it is difficult for ordinary users to make intuitive judgments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method with privacy protection function for validating creditability of public terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Such as figure 1 As shown, the described public terminal credibility verification method with privacy protection function, the specific steps are as follows:

[0041] Step 1: The headquarters server to which the public terminal belongs runs the authentication protocol initialization algorithm to generate various necessary parameters:

[0042] 1) Generate commitment parameters . In this step, three groups with sufficiently large prime order are chosen , for the group respectively choose random generators such that , , and also choose a bilinear map: . Next is to choose a random hash function , . . In the present invention, operations on the TPM are strictly limited to group , doing so allows the parameter A subset of TPM parameters allowable Priority was previously set to .

[0043] 2) Generate signature and verification parameters : choose two hash functions, with , the final setting .

[0044] 3) Generate parameters for the publi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method with a privacy protection function for validating the creditability of a public terminal, which can validate the creditability of the public terminal and can protect the privacy of the public terminal. A dependable computing module and a near-field wireless communication module (NFC) are arranged in a key service computing device, a common user holds a mobile terminal with the NFC communication module, before a public computer is used for carrying out a business transaction, the user holding the mobile terminal is close to the computer and sends a validating request through an NFC channel, the dependable computing module in the computer carries out Hash operation on several key content information in a system, then carries out signing on Hash values by directly using an anonymous attestation protocol, and sends signature data to the mobile terminal of the user through the NFC channel, the mobile terminal of the user carries out validation on signatures, and validation results are displayed through a screen of the mobile terminal. Through the method, a user extremely intuitively judges whether a computer for carrying out transactions is credible, thereby determining subsequent transaction actions; and because a direct anonymous authentication technology is adopted, the identity privacy of an authentication computer also can be protected.

Description

technical field [0001] The invention relates to a public terminal credibility verification method capable of verifying the credibility of a public terminal and protecting the privacy of the public terminal, which has a privacy protection function. Background technique [0002] With the rapid popularization of bank electronic transactions, many businesses can be carried out on public terminals such as ATMs in public places. Computing devices in public places generally do not have professional security protection measures, which has brought opportunities for many malicious attackers. There have been many incidents of ATM machines being tampered with and passwords of cashiers stolen. To prevent such incidents from happening again, the credibility of business-critical machines in public places must be ensured. A feasible way is to add a trusted computing module to computing devices in public places, and conduct strict verification from machine startup to software operation. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 苏庆会梁松涛贾洪勇张鲁国董建强刘熙胖王科峰刘长河
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products