Anonymous subscription agreement and system thereof
A protocol and client-side technology, which is applied in the field of anonymous ordering protocol and its system, can solve the problems of large storage capacity, long time consumption, and no consideration of limiting the order period, etc., to achieve the effect of guaranteeing private information, low computing time consumption, and low storage capacity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0073] The database type in this embodiment uses redis to store tokens; before implementing the registration process, the server needs to execute a parameter setting module, which mainly generates necessary system parameters and their public and private keys, corresponding to the steps in the main body of the manual One, the specific steps are:
[0074] Step 1.1 Generate security parameters t=80, l=40, s=40; generate n, n=pq is a large composite number, p and q are large prime numbers, |n|=100; generate n > Refers to by g n The generated multiplicative group;
[0075] Step 1.2 selection Set X=g x ,Y=g y , Set public key and private key: spk=(q,G,G T ,g,X,Y,Z 1 ,Z 2 ), ssk=(x,y,z 1 ,z 2 ), where G is an elliptic curve group. In the first embodiment, the elliptic curve is y 2 = X 3 +1mod p, q is the order of the elliptic curve, g is a generator of the elliptic curve, G T Is a bilinear mapping group on the elliptic curve, expressed in the form of e:G×G→G T , And g T =e(g,g) is the g...
Embodiment 2
[0097] This embodiment is based on the login process of an anonymous ordering system of the present invention, specifically taking access to a video service as an example.
[0098] After successful registration, the user can log in to the client to access the video service to watch the video. The user logs in through the client login module and interacts with the server login processing module. The specific steps are as follows:
[0099] Step (3.1) The client uses sk=(s=(a,A 1 ,A 2 ,b,B 1 ,B 2 ,c),d,exp s ,exp e ) Generate a blind signature, select t is the start time of the current login period; meanwhile, this embodiment uses the difference between the current time and the time at 0:00 on January 1, 1970, and converts it into minutes; the client login module generates And Y d (t), where Y d (t) is the token, which is generated using the PRF method and sent to the server;
[0100] Step (3.2) The server-side login processing module judges the token Y d (t); exist or not and perform...
Embodiment 3
[0120] This embodiment is based on the connection process of an anonymous ordering system of the present invention.
[0121] When the user is logged in, the connection operation can be performed. The connection operation is mainly an optional operation provided to the user. When disassociation is not required, the user can select the connection between the current cycle and the next cycle, so that when the next cycle arrives , The user does not need to log in again; the connection operation is performed through the connection module of the client, and the interaction with the server-side connection processing module is mainly carried out by the user maintaining a variable linkn in the client connection module, linkn represents the current login cycle after the connection is started Linkn cycles, linkn is reduced by 1 after each cycle ends, linkn is reduced to 0 to indicate no connection afterwards, linkn can be modified in any login cycle to prompt whether to connect in subsequent...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com