Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of generating bill for protecting user access privacy in network service

A technology for network services and users, which is applied in user identity/authority verification and key distribution, and can solve problems such as high communication costs

Inactive Publication Date: 2013-09-04
JINAN UNIVERSITY
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally, the output length of Proceed(α,ρ,chpk) is relatively large (for example, Proceed(α,ρ,chpk)=chpk α g ρ modn, the maximum output length is log 2 n, and requires 2 modulo exponent operations), and the sensitive data α representing the service type is usually much smaller than n, this invention can send m d ||α||C||m f , also need to transmit ρ∈{0,1} λ and group signature sg, its communication cost is λ+α+|m d |+|C|+|m f |+|sg|, so the communication cost of the invention is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of generating bill for protecting user access privacy in network service
  • Method of generating bill for protecting user access privacy in network service
  • Method of generating bill for protecting user access privacy in network service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0116] In this embodiment, a bill generation method for protecting user access privacy in network services, such as figure 1 As shown, the ticket generation system used to implement the ticket generation method of this embodiment includes a management agency M1, an inspection agency D2, an identification agency O3, and a user device 4; the management agency M, the inspection agency D, and the identification agency O pass data transmission The bus is connected to each other, the user equipment is connected to each other through data lines or the network, and the management organization M, the inspection organization D and the identification organization O are respectively connected to the user equipment through the network.

[0117] Management agency M: used to distribute public key / private key pairs of inspection agencies, identification agencies, and public keys for generating groups, and generate user U i Authorization certificate on group signing key.

[0118] Inspection a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of generating a bill for protecting user access privacy in network service. The method comprises the following steps: (1) performing system initiation, namely generating a system public parameter pps according to the input system security parameter, and respectively generating public key / private key pairs of groups G managed by a management mechanism M, a detection mechanism D and a recognition mechanism O; (2) constructing a group signature key xi by a user Ui and acquiring an authorization certification Ci about the group signature key xi of the user Ui from the management mechanism M; (3) constructing request information of protecting the user access privacy and a group signature thereof according to the request information by the user; (4) identifying the legality of the request information by the recognition mechanism O and determining that the qualification of group members of the user is not repealed; (5) verifying the legality of the information by utilizing the group signature by the detection mechanism D, acquiring legal service types and providing corresponding anonymous service; and (6) generating the service bill for protecting the user access privacy by the recognition mechanism O. The method disclosed by the invention can be used for effectively protecting the user access privacy and has the advantages of low communication cost, high safety and the like.

Description

technical field [0001] The invention belongs to the technical field of authentication and identification for protecting user access privacy in network services, and in particular relates to a ticket generation method for protecting user access privacy in network services. Background technique [0002] The 21st century is the era of network information. With the development of microelectronics, optoelectronics, computers, communications and information services, the software system supporting the Internet has also developed rapidly. In various industries represented by finance and communications Widely used in industry. While computer systems and Internet networks play an important role in the growth of the national economy, the issue of system security and its importance have become increasingly prominent. When receiving service activities in cyberspace, people are most worried about security issues. Key security requirements include: identity authentication of parties inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 卢建朱杨菁菁姚国祥周继鹏陈婷
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products