Safe charging method for bike sharing based on safe position proof

A technology for sharing bicycles and secure locations, applied in secure communication devices and key distribution, can solve the problems that location privacy information cannot be strictly protected and users cannot be obtained.

Inactive Publication Date: 2017-06-23
HUBEI UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Considering that many users, especially campus teachers and students, often only ride for less than one kilometer, and the time is mostly 5-10 minutes, this simple method of charging in stages based on the length of the car is undoubtedly different from the actual situation. match
On the other hand, usin...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe charging method for bike sharing based on safe position proof
  • Safe charging method for bike sharing based on safe position proof
  • Safe charging method for bike sharing based on safe position proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] A description of the model involved in the present invention, the security goal and the problem to be solved will be given below.

[0036] 1. System model

[0037]The structure of the shared bicycle billing system model constructed by the present invention is shown in figure 1 , when the user needs a car, first obtain the location certificate from other users in the surrounding environment when using the car, and then inform the shared bicycle operator of the location certificate, and the shared bicycle operator verifies the authenticity of the location certificate to confirm the user's use track. More specifically, there are four types of entities in the system, which are: (1) users, when they want to generate a location proof, the user is called a location proof (Location Proof, LP) requester (Prover), denoted as a requester P; When generating a location proof for others, the user is called the location proof issuer (Witness), which is denoted as the issuer W; (2) t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe charging method for bike sharing based on a safe position proof. The method mainly comprises a position proof generation phase and a position proof verification phase. In the position proof generation phase, when a requester P starts or completes use of a bike, a broadcast request recruit is sent to issuers W in the surrounding, the W respond to a request, P distributes a sub-secret to the W via a safe channel, and the W embed the received sub-secret in a position proof generated by the P, and returns the position proof to the P. In the position proof verification phase, the P makes a declaration of specific position in specific time before settling with a verifier V, and then, the V verifies the authenticity of the position and time in the declaration. On the basis that the driving mileage of the bike can be calculated efficiently and simply, safety attack in a bike charging system is defended, and it is verified that the method is reasonable, correct and effective.

Description

technical field [0001] The invention relates to a charging method for shared bicycles, in particular to a safe charging method for shared bicycles based on secure location proof. Background technique [0002] The rapid development of the mobile Internet has spawned a large number of online to offline (Online To Offline, O2O) sharing economy businesses. Among these shared economic businesses, one type of O2O business has recently developed rapidly, which is shared bicycles. Since the bike-sharing business first appeared on the campus of Peking University in May 2015, many bike-sharing apps including Mobike, Uber, Ofo, Xiaoming, Xiaolan, Qibei, etc. have been born. The birth of these shared bicycle applications has facilitated the daily life of the majority of users, greatly promoted the solution of the last mile problem of people's daily travel, and has been greatly popularized in practical applications. Today, walking in the campuses of colleges and universities in major c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/02H04L9/08H04L9/32
CPCG06Q30/0284H04L9/0872H04L9/3247H04L9/3263
Inventor 刘梦君杨兵丁永刚
Owner HUBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products