Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous subscription agreement and system thereof

A protocol and client-side technology, which is applied in the field of anonymous ordering protocol and its system, can solve the problems of large storage capacity, long time consumption, and no consideration of limiting the order period, etc., to achieve the effect of guaranteeing private information, low computing time consumption, and low storage capacity

Active Publication Date: 2016-08-10
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these anonymous payment methods are not commonly used by the general public as electronic payment methods, that is, they are not practical
[0014] Although the above-mentioned anonymous ordering can protect user privacy in the application of video ordering service scenarios, these cryptography-based token generation and verification methods have the defects of large storage capacity, long time consumption, impractical payment methods, and no consideration of limiting the order period , it is necessary to explore more effective protocols and systems based on specific video online ordering requirements scenarios and anonymous ordering agreements and user privacy will not be stolen by service providers or the outside world

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous subscription agreement and system thereof
  • Anonymous subscription agreement and system thereof
  • Anonymous subscription agreement and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] The database type in this embodiment uses redis to store tokens; before implementing the registration process, the server needs to execute a parameter setting module, which mainly generates necessary system parameters and their public and private keys, corresponding to the steps in the main body of the manual One, the specific steps are:

[0074] Step 1.1 Generate security parameters t=80, l=40, s=40; generate n, n=pq is a large composite number, p and q are large prime numbers, |n|=100; generate n > Refers to by g n The generated multiplicative group;

[0075] Step 1.2 selection Set X=g x ,Y=g y , Set public key and private key: spk=(q,G,G T ,g,X,Y,Z 1 ,Z 2 ), ssk=(x,y,z 1 ,z 2 ), where G is an elliptic curve group. In the first embodiment, the elliptic curve is y 2 = X 3 +1mod p, q is the order of the elliptic curve, g is a generator of the elliptic curve, G T Is a bilinear mapping group on the elliptic curve, expressed in the form of e:G×G→G T , And g T =e(g,g) is the g...

Embodiment 2

[0097] This embodiment is based on the login process of an anonymous ordering system of the present invention, specifically taking access to a video service as an example.

[0098] After successful registration, the user can log in to the client to access the video service to watch the video. The user logs in through the client login module and interacts with the server login processing module. The specific steps are as follows:

[0099] Step (3.1) The client uses sk=(s=(a,A 1 ,A 2 ,b,B 1 ,B 2 ,c),d,exp s ,exp e ) Generate a blind signature, select t is the start time of the current login period; meanwhile, this embodiment uses the difference between the current time and the time at 0:00 on January 1, 1970, and converts it into minutes; the client login module generates And Y d (t), where Y d (t) is the token, which is generated using the PRF method and sent to the server;

[0100] Step (3.2) The server-side login processing module judges the token Y d (t); exist or not and perform...

Embodiment 3

[0120] This embodiment is based on the connection process of an anonymous ordering system of the present invention.

[0121] When the user is logged in, the connection operation can be performed. The connection operation is mainly an optional operation provided to the user. When disassociation is not required, the user can select the connection between the current cycle and the next cycle, so that when the next cycle arrives , The user does not need to log in again; the connection operation is performed through the connection module of the client, and the interaction with the server-side connection processing module is mainly carried out by the user maintaining a variable linkn in the client connection module, linkn represents the current login cycle after the connection is started Linkn cycles, linkn is reduced by 1 after each cycle ends, linkn is reduced to 0 to indicate no connection afterwards, linkn can be modified in any login cycle to prompt whether to connect in subsequent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anonymous subscription agreement and a system thereof. The anonymous subscription agreement comprises the following steps: 1. a server generates a series of main system parameters, such as a login cycle and public and private key information thereof; 2. a user interacts with the server and executes a registration process, and in the process, the user provides a subscription interval time and pays a corresponding fee to obtain a valid signature from a service provider; 3. the user logs in by using the signature, logs in according to a fixed login cycle at a login stage, carries out a blind operation on the signature to generate a token of the current login cycle for login, carries out the next cycle after the login cycle is terminated, and changes the token to log in; 4. the anonymous agreement provides a connection operation, and the user can select to execute the connection operation when no decorrelation is required; and 5. when the user does not want to access the service, the user can execute a logout operation; and moreover, in the login and connection stages, inspection on the expiration time is contained, and if the subscription time interval is overdue, the user cannot log in anymore, so the benefits of the service provider are guaranteed.

Description

Technical field [0001] The invention relates to an anonymous order agreement and its system, belonging to the fields of anonymous authentication, signature technology and order technology. Background technique [0002] The use of real names to access the subscription service can ensure practicality, but it will expose users' private information. Therefore, in recent years, anonymous subscription agreements have emerged. An anonymous subscription agreement generally includes three parties: the user (Customer), the subscription authorizer (Vendor), and the service provider (Supplier); among them, the user is the party who wants to access the subscription service; the subscription authorizer provides access authorization; the service provider Party is the provider of the subscription service. The specific implementation process of the anonymous order agreement includes two steps: 1) Customer obtains an anonymous order authorization from Vendor, which is equivalent to an anonymous ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L9/3218H04L9/3257H04L9/3263H04L63/0421H04L63/0807H04L63/0823
Inventor 张子剑陈明新祝烈煌佟安格
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products