Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A ticket generation method for protecting user access privacy in network services

A technology for network services and users, which is applied in user identity/authority verification and key distribution, and can solve problems such as high communication costs

Inactive Publication Date: 2015-12-23
JINAN UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally, the output length of Proceed(α,ρ,chpk) is relatively large (for example, Proceed(α,ρ,chpk)=chpk α g ρ modn, the maximum output length is log 2 n, and requires 2 modulo exponent operations), and the sensitive data α representing the service type is usually much smaller than n, this invention can send m d ||α||C||m f , also need to transmit ρ∈{0,1} λ and group signature sg, its communication cost is λ+α+|m d |+|C|+|m f |+|sg|, so the communication cost of the invention is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ticket generation method for protecting user access privacy in network services
  • A ticket generation method for protecting user access privacy in network services
  • A ticket generation method for protecting user access privacy in network services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0116] In this embodiment, a method for generating a ticket for protecting user access privacy in network services, such as figure 1 As shown, the bill generation system used to implement the bill generation method of this embodiment includes a management institution M1, an inspection institution D2, an identification institution O3, and a user equipment 4. The management institution M, the inspection institution D, and the identification institution O communicate through data transmission The buses are connected to each other, the user equipment is connected to each other through a data line or a network, and the management organization M, the inspection organization D, and the identification organization O are respectively connected to the user equipment through the network.

[0117] Management agency M: used to allocate public key / private key pairs of inspection agencies and identification agencies, and generate group public keys, and generate user U i About the authorization c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of generating a bill for protecting user access privacy in network service. The method comprises the following steps: (1) performing system initiation, namely generating a system public parameter pps according to the input system security parameter, and respectively generating public key / private key pairs of groups G managed by a management mechanism M, a detection mechanism D and a recognition mechanism O; (2) constructing a group signature key xi by a user Ui and acquiring an authorization certification Ci about the group signature key xi of the user Ui from the management mechanism M; (3) constructing request information of protecting the user access privacy and a group signature thereof according to the request information by the user; (4) identifying the legality of the request information by the recognition mechanism O and determining that the qualification of group members of the user is not repealed; (5) verifying the legality of the information by utilizing the group signature by the detection mechanism D, acquiring legal service types and providing corresponding anonymous service; and (6) generating the service bill for protecting the user access privacy by the recognition mechanism O. The method disclosed by the invention can be used for effectively protecting the user access privacy and has the advantages of low communication cost, high safety and the like.

Description

Technical field [0001] The invention belongs to the technical field of authentication and identification for protecting user access privacy in network services, and in particular relates to a ticket generation method for protecting user access privacy in network services. Background technique [0002] The 21st century is the era of network information. With the development of microelectronics, optoelectronics, computers, communications, and information service industries, software systems supporting the Internet have also developed rapidly. Widely used in the industry. While computer systems and Internet networks play an important role in national economic growth, the issue of system security and its importance have become increasingly prominent. When receiving service activities in cyberspace, people are most worried about security. The key security requirements include: the identity authentication of all parties involved in the activity, the confidentiality of the session, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 卢建朱杨菁菁姚国祥周继鹏陈婷
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products