Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for generating anonymous certificate

A credential and identity credential technology, applied in the computer field, can solve problems such as identity information leakage

Pending Publication Date: 2020-10-27
北京泰尔英福科技有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the existing identity certificates based on CA organizations, the identity information is stored in plain text, which is easy to cause identity information leakage. Therefore, there is an urgent need for a method and system for generating anonymous credentials

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating anonymous certificate
  • Method and system for generating anonymous certificate
  • Method and system for generating anonymous certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0041] In the network, there is often a situation where one party needs to verify the identity of the other party. When the verified party cannot self-certify the identity, an authoritative third party is needed to endorse the identity of the verified party. This authoritative third party is the CA organization. Credibility is guaranteed by crypto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and system for generating an anonymous certificate, and the method comprises the steps: generating the root hash of a Merkel tree according to the identity information of a user; signing the root hash, and sending the signed root hash to a request end, so that the request end compares the signed root hash with a root hash generated by a preset algorithm, and sends an acknowledgement signal if the signed root hash is the same as the root hash generated by the preset algorithm; and if the acknowledgement signal is received, generating an identitycertificate of the user by utilizing the Merkel tree. According to the method and the system for generating the anonymous certificate, the identity certificate is generated through the Merkel tree, so that only the hash value of the identity information is stored in the identity certificate, and leakage of private data of a user is avoided to a certain extent.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for generating anonymous certificates. Background technique [0002] In the prior art, the steps of generating identity certificate based on CA institution are as follows: [0003] Step 1: Select a root CA and apply for a CA certificate; [0004] Step 2: Real-name authentication, providing identity information to the root CA organization for identity authentication; [0005] Step 3: The root CA signs the plaintext identity information to generate a certificate; [0006] Step 4: Use the CA-signed certificate as the identity certificate. [0007] In the existing CA-based identity certificate certificates, the identity information is stored in plain text, which may easily cause identity information leakage. Therefore, a method and system for generating anonymous certificates is urgently needed. Contents of the invention [0008] In order to solve the abov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3247
Inventor 金键曾西平张发振胡键伟史维君李慧玲郭健单鹏飞阚雪娇周厚发王颜飞
Owner 北京泰尔英福科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products