Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing anonymous identity recognition method and system based on alliance chain and implicit certificate

An identity recognition and implicit certificate technology, applied in the field of alliance chain, can solve the problems of ID information leakage, information leakage, and high risk of DOS attack on the identity server, and achieve the effect of improving security.

Active Publication Date: 2020-01-31
RUBAN QUANTUM TECH CO LTD +1
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If lost, it may cause ID information leakage
If the ID is recorded at multiple identification devices, ID tracking can be realized, which is a serious information leakage in some application scenarios
[0005] 2. Identity recognition needs to be recognized by the identity recognition server, and the identity recognition server is at a higher risk of being attacked by DOS
If the communication and storage data are obtained by the enemy, the enemy can realize ID tracking, which is a serious information leakage in some application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing anonymous identity recognition method and system based on alliance chain and implicit certificate
  • Anti-quantum computing anonymous identity recognition method and system based on alliance chain and implicit certificate
  • Anti-quantum computing anonymous identity recognition method and system based on alliance chain and implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0061] It should be understood that, unless otherwise specified herein, the steps are not strictly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum computing anonymous identity recognition method and system based on an alliance chain and an implicit certificate. The method is implemented among alliance chain members communicating with each other, the alliance chain members include client members and server members, each party is configured with a key fob, and algorithm parameters and a server public key pool are stored in all the key fobs; a secret key card of the server stores a server secret sharing private key pool and a client public key pool. Client units in one-to-one correspondence with theclients are stored in the client public key pool, and each client unit comprises a user name, a true identity identifier, a public key updating state, an implicit certificate and a false identity identifier of the corresponding client; a client public key pointer random number, a client private key and a private key parameter are stored in a secret key card of the client, a message sent by a Userdoes not disclose an own real identity identifier, and a false identity identifier of the own is disclosed, so that the security of interaction of all parties is further improved.

Description

technical field [0001] This application relates to the field of consortium chains, in particular to a method and system for anti-quantum computing anonymous identification based on consortium chains and implicit certificates. Background technique [0002] Blockchain is a brand-new distributed infrastructure and computing paradigm. It uses an ordered chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring the data security of transactions and the privacy of customers is a necessary condition for the further development of blockchain. For this reason, cryptography technology, especially public key cryptography, has been widely used in blockchain. The alliance chain is a branch of the blockchain, so it is also a distributed and decentralized public database. The difference from other chains is that it is aimed at members of specific groups and limited third parties...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/73G06F21/33
CPCG06F21/33G06F21/602G06F21/6254G06F21/73
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products