Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security verification method of user's running track

A technology of running trajectory and security verification, applied in the field of information security, can solve the problem that the security problem of user trajectory verification has not been completely resolved, and achieve the effect of resisting collusion attacks

Active Publication Date: 2020-08-04
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this sense, the security issue of user trace verification with collusion attacks has not been fully resolved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method of user's running track
  • Security verification method of user's running track
  • Security verification method of user's running track

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Due to the increasingly serious problem of network security in the world today, some unmanned or remote-operated operating equipment is facing more and more security attacks, and the attack level of opponents is getting higher and higher, which greatly affects the order of the system and society, and thus produces serious impact, and the existing trajectory verification technology cannot resist the collusion attack of the opponent. In view of this situation, the present invention has carried out research and innovation, and provides a security verification method for the user's running trajectory. See figure 1 , including the following steps:

[0033] (1) Establish a system model: In the trajectory verification system, see figure 2 with image 3 , there are users, verifiers, attackers and trajectories to be verified. It is necessary to verify whether the user runs strictly according to the user's running track. Suppose there are four landmarks around the user's runnin...

Embodiment 2

[0043] The technical scheme of the safety verification method of the user's running track is the same as embodiment 1, wherein the position verification in the step (4) first adopts the safety positioning protocol SP to send the verification information, and the specific steps of using the safety positioning protocol SP to send the verification information are as follows:

[0044] 4a) Four Landmarksl 1 , l 2 , l 3 , l 4 First proceed to pair at the first discrete position p 1 The user sends verification information, let the position number be i, since there are n discrete positions in the user's running track, so 1≤i≤n, first initialize the position number i to 1;

[0045] 4b) Four Landmarksl 1 , l 2 , l 3 , l 4 Select the key k separately i,1 ,k i,2 ,k i,3 ,k i,4 ←{0,1} r , r represents the length of the key, and the four landmarks propagate k to each other on the private channel i,1 ,k i,2 ,k i,3 ,k i,4 , landmark l 2 , l 3 , l 4 Generate random informatio...

Embodiment 3

[0059] The technical scheme of the safety verification method of the user's running trajectory is the same as that of embodiment 1-2, and the judgment of the user response information described in step (4) completes the position verification, and the specific steps are as follows:

[0060] 4e) T i time to p i The user of the point can obtain the position p through the secure positioning protocol SP i The fourth key k of i,4 , will respond to message M i =ID U ||k i,4 ||s i broadcast, making the response message M i Teleport to four landmarks l 1 , l 2 , l 3 , l 4 , four landmarks l 1 , l 2 , l 3 , l 4 Verify the received response message M separately i The fourth key k in i,4 , complete the discrete position p in the user's running trajectory i point of location authentication, where ID U is the user identity, k i,4 for p i position fourth key, s i =H n-i+1 (S U ), is the i-th identity key;

[0061] If the location number i=1 and four landmarks l 1 , l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety verification method for a moving path of a user, mainly solving the problem that in the prior art, the safety requirement of a user moving path verification mechanism cannot be met. The technical scheme of the method comprises the steps as follows: a system model is built, a path to be verified is divided into n disperse locations, and the path is encircled by a tetrahedron surrounded by verifiers; an attacker model is built, and attackers jointly try to successfully pass through path verification; a user generates a Hash chain; the verifiers verify whether the user is on the corresponding disperse location on the moving path at each correct moment, and the verification comprises location verification adopting a safety positioning (SP) protocol and user identity verification using the Hash chain; and if the user moves in strict accordance with the path, the user verification is passed, and otherwise the verification is failed. According to the method provided by the invention, the SP protocol is combined with the Hash chain for use, so that jointly attacks can be defended, and safety and efficiency of user identity verification are ensured, The method can be used for verifying whether the user moves in strict accordance with the path.

Description

technical field [0001] The invention belongs to the technical field of information security, and mainly relates to safe positioning in position cryptography, in particular to a safety verification method for a user running track, which can be used to verify whether a mobile device runs strictly according to a predetermined track. Background technique [0002] In the field of network service technology, location-based services are closely related to people's daily life. Location-based services obtain the location information of mobile users through positioning technology, and provide location-related information services to mobile device terminals through communication networks. Location-based services generally include positioning, maps, information collection and analysis of location data, etc. The combination of these technologies constitutes the basic services of location-based services. [0003] With the rapid development of modern industry, various modern management met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/32H04L29/06H04L12/24
CPCH04L9/002H04L9/0643H04L9/32H04L9/3236H04L41/145H04L63/08
Inventor 姬雅娴张俊伟马建峰宗跃杜方琼高启
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products