False certificate detecting method and system for service system for providing identity management by third party
A service system, identity management technology, applied in the field of false credential detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail through the following examples.
[0045] There are four participants in this solution: user, identity provider (IdP), application provider (RP), and log server (Log Server).
[0046] S IdP (m): indicates a message signed by the IdP;
[0047] S Log (m): Indicates the message signed by the Log Server;
[0048] E. u (m): indicates the message m encrypted with the public key of user u;
[0049] B(m,s): indicates the message m blinded using the blinding factor s;
[0050] F(u): Indicates the pseudonym generated for user u using the Bloom Filter algorithm.
[0051] In the initialization phase, the IdP generates a public-private key pair for signing and discloses the public key; Log Server generates a public-private key pair for blind signature and discloses the public key; when a user joins the system, the user regist...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
