A method and system for detecting clone of user identity in an anonymous information system

A user identity and information system technology, applied in the field of user identity cloning detection, can solve problems that are not based on physical security assumptions, and achieve the effect of ensuring universality, low cost, and high efficiency

Active Publication Date: 2021-12-14
NINGBO INST OF TECH ZHEJIANG UNIV ZHEJIANG
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems existing in the background technology, the present invention is not based on any physical security assumptions, does not depend on special hardware, provides a user identity cloning detection method and system in an anonymous information system, and solves the problem of user identity cloning in an efficient and practical way

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for detecting clone of user identity in an anonymous information system
  • A method and system for detecting clone of user identity in an anonymous information system
  • A method and system for detecting clone of user identity in an anonymous information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The user identity clone detection method and system of the present invention will be further described below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0054] Such as figure 1 As shown, the clone detection system of the present invention includes a user, a registration server and an authentication server. In this system, the privacy of honest users is absolutely protected. That is to say, after the honest user registers at the registration server, he can anonymously complete the authentication at the authentication server and log in to the system. Logins are from the same user. At the same time, once the user clones the identity, by collecting the login information from the authentication server, the registration server can identify the cloning behavior and the real identity of the cloner, and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity clone detection method and system in an anonymous information system. Send to the authentication server a zero-knowledge proof that provides the secret parameters in the current user's anonymous certificate; when logging out this time, update some of the secret parameters of the user's anonymous certificate and send it to the authentication server; prove the current user's anonymous certificate in a zero-knowledge manner There is a connection between the secret parameter and the new secret parameter of the user’s anonymous certificate, and the authentication server signs the new secret parameter of the user’s anonymous certificate generated by the user; at the next login, the user proves to the authentication server in a zero-knowledge manner; the user’s input calculation Generate the authentication serial number and send it to the authentication server to prove that the authentication serial number is correctly generated in a zero-knowledge manner. The invention can effectively solve the problem of cloning user identities in the anonymous information system, and thoroughly solve the problem of using the anonymous attribute to implement cloning attacks on the big data system.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for detecting user identity cloning in an anonymous information system. Background technique [0002] Personal privacy is getting more and more attention, and countries including China have legislated on the protection of personal privacy. The deeper the application of big data, the stronger the privacy protection requirements. Moreover, this is also the key to whether big data applications can be promoted. In a big data environment, true privacy protection means that users remain anonymous to everyone (including the system), and each login behavior cannot be linked. Privacy protection is the general trend. However, the implementation of such "absolute protection" for user privacy makes it difficult to detect user identity cloning behavior (shared identity information), which leads to the problem of illegal use of information systems, and even ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3218H04L9/3221H04L9/0825
Inventor 练斌陈恭亮崔家林何大可喻平
Owner NINGBO INST OF TECH ZHEJIANG UNIV ZHEJIANG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products