Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive data anonymous access method based on knowledge signatures

A technology of sensitive data and access methods, applied in the field of anonymous access to sensitive data based on knowledge signatures, can solve problems such as security bottlenecks, complex authentication interactions, and inappropriate cross-domain multi-party sensitive data access scenarios, to achieve the effect of protecting privacy

Inactive Publication Date: 2021-07-16
STATE GRID ZHEJIANG ELECTRIC POWER +1
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the scenario of anonymous access to sensitive data, scholars at home and abroad have proposed some anonymous access schemes. Liu et al. proposed a method based on direct anonymous authentication in the document "A TPM authentication scheme for mobile IP" (DOI: 10.1109 / CISW.2007.4425596). An anonymous identity authentication scheme based on mechanism authentication, but the certificate authority of the direct anonymous authentication mechanism in this scheme is the security bottleneck of the entire system, so the overall performance of the scheme is poor
In the literature "A novel Direct Anonymous Attestation protocol based on zeroknowledge proof for different trusted domains" (DOI: 10.1007 / s12243-010-0178-y), Yang et al. proposed a direct anonymous authentication scheme based on knowledge proof, which implements Anonymous authentication and privacy information protection between devices, but the authentication interaction of this scheme is complicated, and it is not suitable for cross-domain multi-party sensitive data access scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data anonymous access method based on knowledge signatures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the structure and advantages of the present application clearer, the structure of the present application will be further described below in conjunction with the accompanying drawings.

[0041] This application proposes an anonymous access method for sensitive data based on knowledge signatures, such as figure 1 As shown, the method includes:

[0042] S1, obtain the secret value selected by the sensitive data access client, and generate a knowledge signature corresponding to the sensitive data access client based on the secret value;

[0043] S2. Obtain the data access request sent by the sensitive data access client with the knowledge signature and identity identifier. When the identity identifier meets the requirements, generate a reply ciphertext sent to the sensitive data access client based on the secret value and time stamp, and pass the identity identifier to the sensitive data access client. Added to the access information list, the sensitive d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a sensitive data anonymous access method based on knowledge signatures. The method comprises the steps of: generating the knowledge signatures corresponding to sensitive data access clients based on secret values; and acquiring a data access request with a knowledge signature and an identity identifier sent by a sensitive data access client, generating a reply ciphertext sent to the sensitive data access client based on the secret value and the timestamp, and adding the identity identifier to an access information list, wherein the sensitive data access client encrypts the proxy signature by using a public key of the sensitive data server to generate a ciphertext, and the sensitive data server identifies the access authority based on the ciphertext of the sensitive data access client and the knowledge signature. The sensitive data access client and the sensitive data server can complete identity verification and authorization processes without intervention of a management platform, are flexible and efficient, and are suitable for cross-domain multi-party sensitive data access scenes. In the authorization process, the sensitive data access client can perform anonymous access, and the privacy of the sensitive data access client is also protected.

Description

technical field [0001] This application relates to the field of data access, in particular to an anonymous access method for sensitive data based on knowledge signatures. Background technique [0002] The primary security goal of sensitive data sharing is data security and privacy protection, including preventing unauthorized users from illegally accessing and using data, data sharing platforms maliciously leaking user privacy information, and untrustworthy data sharing platforms obtaining user privacy by collecting and analyzing user behavior information. Sensitive data security and privacy protection not only involves data security protection issues at all stages of sensitive data life cycle, such as creation, storage, sharing, use, archiving, and destruction, but also involves personal privacy protection issues when users access sensitive data. The existing sensitive data protection mainly considers the security protection of sensitive data, but there are not many effect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L9/3263H04L9/3297H04L63/0421
Inventor 刘若琳周鹏叶卫陆鑫戚伟强王以良陈逍潇郭亚琼俞天奇陈婧楠江樱张烨华宋宇波杨帆孙望舒许敏朱好朱鸿江周慧凯王臻
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products