Satellite positioning-based dynamic digital signature for intelligent mobile terminal

An intelligent mobile terminal, satellite positioning technology, applied in location information-based services, digital transmission systems, key distribution, and can solve the problems of illegal tracking, waste of social resources, and not knowing the precise location of victims.

Inactive Publication Date: 2019-11-05
奚伟祖
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1) For example, a consumer scans a QR code in a supermarket to pay for food with a mobile phone, but the store’s QR code is planted with a Trojan horse by criminals due to poor management. The payment account number and password are stolen, so criminals can use the stolen payment account number and password of consumers to consume. Such crimes are difficult to be discovered in advance, and consumers have already suffered a lot by the time they are discovered. economic loss
[0012] 2) Another example, at the 3.15 conference in 2019, the bank admitted that its mobile terminal-based flash payment has security risks. In this regard, UnionPay announced that as long as the report is made within 72 hours, the loss can be fully compensated
[0013] 3) For another example, there are a large number of illegal POS machines in the market now, swiping cards on these illegal POS machines will bring major security risks to cardholders
[0030] 3. Spending money to illegally purchase fingerprint or face template data from relevant personnel in companies that provide fingerprint or face recognition services like the current buying and selling of personal information;
[0031] 4. Illegal use of stolen template data;
[0032] 5. Use stolen template data to illegally track from one system to another;
[0050] 4) The former is a passive defense that cannot actively discover online hackers hiding in the virtual world, because traditional cryptography only studies the digital signature itself and does not study the people behind the digital signature
[0058] For example, although satellite positioning is a public and open service, and the obtained satellite positioning latitude and longitude are real, network hackers can abandon it and develop an application APP that can completely simulate the user's current use, and artificially input a satellite positioning by themselves. Longitude and latitude, but the problem is: a major feature of cyber hackers is that they don’t know where the v

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Satellite positioning-based dynamic digital signature for intelligent mobile terminal
  • Satellite positioning-based dynamic digital signature for intelligent mobile terminal
  • Satellite positioning-based dynamic digital signature for intelligent mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0099] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0100] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a satellite positioning-based dynamic digital signature for an intelligent mobile terminal. The method is characterized in that a group of parameters reflecting satellite positioning position track dynamic changes generated by tracks of a person or an object are used as dynamic digital signatures representing the identity of the person or the object, and the legality and effectiveness of the corresponding dynamic digital signatures are analyzed by analyzing the dynamic change rule of the group of parameters. The method has the significance that a person or an object isdirectly associated with the digital signature for the first time; therefore, the behavior of a person or an object becomes an inseparable part in the digital signature; the congenital defect of the traditional cryptography that only a string of abstract data has no relationship with a person using the data string is overcome; therefore, the historical problem that the traditional cryptography only recognizes the password but not recognizes the person is solved, an effective method is provided for discriminating the identity of the hacker hidden on the internet, and a brand-new research direction is developed for the traditional cryptography.

Description

technical field [0001] The invention relates to the technical field of digital signatures of cryptography, in particular to a dynamic digital signature based on satellite positioning for intelligent mobile terminals. Background technique [0002] Ever since there was a computer, there have been computer security issues. [0003] With the emergence of the Internet, computer security issues have evolved into network security issues and become more severe. [0004] With the Internet of Everything in the 5G era, it is no exaggeration to say that network security issues will further evolve into security issues for object control: [0005] Especially mobile phones as smart mobile terminals will inevitably become a remote control / operation center, a mobile payment center and a mobile human-machine dialogue center. A large number of network links of unknown origin are very easy to be infected with various Trojan horse viruses, so the security environment of mobile phones becomes v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04W4/029
CPCH04L9/0825H04L9/0872H04W4/029
Inventor 奚伟祖
Owner 奚伟祖
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products