A way to order anonymously

A client-side and server-side technology, applied in the fields of anonymous authentication, signature technology and ordering technology, can solve problems such as time-consuming, impractical payment methods, and large storage capacity

Active Publication Date: 2019-03-05
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these anonymous payment methods are not commonly used by the general public as electronic payment methods, that is, they are not practical
[0014] Although the above-mentioned anonymous ordering can protect user privacy in the application of video ordering service scenarios, these cryptography-based token generation and verification methods have the defects of large storage capacity, long time consumption, impractical payment methods, and no consideration of limiting the order period , it is necessary to explore more effective protocols and systems based on specific video online ordering requirements scenarios and anonymous ordering agreements and user privacy will not be stolen by service providers or the outside world

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A way to order anonymously
  • A way to order anonymously
  • A way to order anonymously

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] The database type in this embodiment uses redis to store tokens; before implementing the registration process, the server needs to execute the parameter setting module, mainly to generate necessary system parameters and its public key and private key, corresponding to the steps in the main body of the manual One, the specific steps are:

[0072] Step 1.1 generate security parameters t=80, l=40, s=40; generate n, n=pq is a large composite number, p and q are large prime numbers, |n|=100; generate n > refers to the n The resulting multiplicative group;

[0073] Step 1.2 Select Set X = g x ,Y=g y , Set public key and private key: spk=(q,G,G T ,g,X,Y,Z 1 ,Z 2 ), ssk=(x,y,z 1 ,z 2 ), wherein G is an elliptic curve group, in the present embodiment 1, the elliptic curve is y 2 =x 3 +1modp, q is the order of the elliptic curve, g is a generator of the elliptic curve, G T is a bilinear mapping group on the elliptic curve, expressed as e:G×G→G T , and g T =e(g...

Embodiment 2

[0095] This embodiment is based on the login process of an anonymous ordering system on which the present invention is based, specifically taking access to video services as an example.

[0096] After successful registration, the user can log in to the client to access the video service to watch videos. The user logs in through the client login module and interacts with the server login processing module. The specific steps are:

[0097] Step (3.1) The client uses sk=(s=(a, A 1 ,A 2 ,b,B 1 ,B 2 ,c),d,exp s , exp e ) to generate a blind signature, select t is the start time of the current login period; at the same time, this embodiment uses the difference between the current time and the time at 0:00 on January 1, 1970, and converts it into minutes; the client login module generates and Y d (t), where Y d (t) is a token, which is generated using the PRF method and sent to the server;

[0098] Step (3.2) The server-side login processing module judges the token Y d ...

Embodiment 3

[0118] This embodiment is based on the connection process of an anonymous ordering system of the present invention.

[0119] When the user is in the login state, the connection operation can be performed. The connection operation is mainly an optional operation provided to the user. When de-association is not required, the user can choose the connection between the current cycle and the next cycle, so that after the next cycle arrives , the user does not need to log in again; the connection operation is performed through the connection module of the client, and interacts with the connection processing module of the server, mainly through the user maintaining a variable linkn in the connection module of the client, linkn indicates the current login period after the connection starts Linkn cycles, every time a cycle ends, linkn will be decremented by 1, and linkn will be reduced to 0 to indicate that there will be no connection in the future, and linkn can be modified in any logi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anonymous subscription agreement and a system thereof. The anonymous subscription agreement comprises the following steps: 1. a server generates a series of main system parameters, such as a login cycle and public and private key information thereof; 2. a user interacts with the server and executes a registration process, and in the process, the user provides a subscription interval time and pays a corresponding fee to obtain a valid signature from a service provider; 3. the user logs in by using the signature, logs in according to a fixed login cycle at a login stage, carries out a blind operation on the signature to generate a token of the current login cycle for login, carries out the next cycle after the login cycle is terminated, and changes the token to log in; 4. the anonymous agreement provides a connection operation, and the user can select to execute the connection operation when no decorrelation is required; and 5. when the user does not want to access the service, the user can execute a logout operation; and moreover, in the login and connection stages, inspection on the expiration time is contained, and if the subscription time interval is overdue, the user cannot log in anymore, so the benefits of the service provider are guaranteed.

Description

technical field [0001] The invention relates to an anonymous ordering method, belonging to the technical fields of anonymous authentication, signature technology and ordering. Background technique [0002] Using the real-name method to access the subscription service, although practicality can be guaranteed, will expose the user's private information. Hence, in recent years, anonymous ordering protocols have emerged. An anonymous order agreement generally includes three parties: the user (Customer), the order authorizer (Vendor) and the service provider (Supplier); among them, the user is the party who wants to access the order service; the order authorizer provides access authorization; the service provider Party is the provider of the Subscription Service. The specific implementation process of the anonymous order agreement includes two steps: 1) Customer obtains anonymous order authorization from Vendor, which is equivalent to an anonymous certificate; 2) Customer provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L9/3218H04L9/3257H04L9/3263H04L63/0421H04L63/0807H04L63/0823
Inventor 张子剑陈明新祝烈煌佟安格
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products