Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection online invoicing service authentication method and system, storage medium and application

An authentication method and privacy protection technology, applied in the field of privacy protection online billing service authentication, can solve problems such as unlinkability, high computing and communication overhead, unlinkability, data confidentiality, etc., and achieve the effect of mutual authentication

Pending Publication Date: 2021-07-23
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme can achieve security features such as mutual authentication and anonymity, but this scheme uses the difficult problem of large integer decomposition to encrypt private data, resulting in more communication overhead
[0007] Through the above analysis, the existing problems and defects of the existing technology are: the design scheme of the electronic credential system proposed at present is difficult to take into account the authentication security, computing overhead and communication overhead of online issuance of electronic credential, and does not have anonymity and non-linkability, etc. , vulnerable to security attacks, and has a large computational and communication overhead
[0008] The difficulty of solving the above problems and defects is as follows: Aiming at various security and performance defects in the current schemes, an efficient privacy-preserving online billing service authentication scheme is proposed, which can satisfy mutual authentication, anonymity, and non-linkability , data confidentiality, integrity, and anti-replay attacks, user impersonation attacks, and smart card stolen attacks, etc., reducing computing and communication overheads

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection online invoicing service authentication method and system, storage medium and application
  • Privacy protection online invoicing service authentication method and system, storage medium and application
  • Privacy protection online invoicing service authentication method and system, storage medium and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] The embodiment of the present invention describes the system setup phase process. Electronic Credential System Selection Master Key K e , select a cyclic group G on the elliptic curve E, where the order of G is q, the generator is P, and the private key sk∈Z is selected q * , the public key pk=sk*P. Subsequently, the electronic credential system selects two secure hash functions h 1 ,h 2 , a keyed hash function f 1and a key derivation function KDF. Then, the electronic credential system selects a bind function according to the binding relationship between the ID card information and the face information required by the identity verification system of the Ministry of Public Security. The bind function is generally a hash function and does not leak input information. Finally, the electronic credential system selects the symmetric encryption algorithm ENC and decryption algorithm DEC, as well as the fuzzy extraction generation algorithm Gen and regeneration algorith...

Embodiment 2

[0089] The embodiment of the present invention describes the process of the online registration stage of the bill collector.

[0090] (1) The mobile APP of the electronic credential billing party first needs to locally verify the consistency of the ID card photo provided by the billing party user and the live face collection photo. If they are consistent, the mobile APP of the electronic voucher recipient will use the face information B provided by the user. i Calculate (α i ,β i )=Gen(B i ), and then export the ID card information eID i with face information α i The binding relationship A i =bind(eID i ,α i ). Then, the mobile APP of the electronic voucher recipient calculates H i =h 1 (eID i ,α i ,h i ), choose a random number Calculate R i =r i *P, Z i =r i *pk and MLK i =h 2 (Z i ,t i0 )=MK i ||LK i , using the encryption key MK i encrypted c i =ENC MKi (eID i ||A i ||H i ), using the integrity key LK i Calculate s i =f 1 (LK i ,C i ||R ...

Embodiment 3

[0094] The embodiment of the present invention describes the process of the online registration stage of the invoicing party.

[0095] (1) The corporate legal person will use the identification information sID of the company that issues the invoice j As well as business license, legal person ID card and other information M j Enter the electronic credential billing party server. The electronic credential issuer server selects a random number Calculate R j =r j *P, Z j =r j *pk, and MLK j =h 2 (Z j ,t j0 )=MK j ||LK j . Subsequently, the electronic credential issuer server adopts the encryption key MK j Put private information M j encrypted to get c j =ENC MKj (sID j ||M j ), using the integrity key LK j Calculate s j =f 1 (LK j ,C j ||t j0 ), where t j0 is the current timestamp. Finally, the electronic credential issuer server will register the request message (c j ,s j ,R i ,t j0 ) to the electronic credential system.

[0096] (2) After the elec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information safety, and discloses a privacy protection online invoicing service authentication method and system, a storage medium and application, a ticket receiver needs to locally download an electronic credential ticket receiver mobile phone APP and completes registration by using an effective identity card and face information of the ticket receiver, and an invoicing party completes registration by using legal information of the invoicing party; the ticket receiver initiates a certain transaction invoicing request message to the electronic credential system through the electronic credential ticket receiver mobile phone APP; the electronic credential system verifies the identity information of the ticket receiver after receiving the invoicing request of the ticket receiver, and after verification succeeds, the electronic credential system issues an electronic credential for the ticket receiver and delivers the electronic credential to the ticket receiver; after verifying that the electronic credential is valid, the ticket receiver sends a confirmation message to the electronic credential system; and the electronic credential system sends a verification confirmation message to the invoicing party, and the invoicing party records that the electronic credential has been issued in the transaction. According to the invention, the legality of the entity identity and the privacy of the identity information in the online electronic credential issuing service are ensured.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a privacy protection online invoicing service authentication method, system, storage medium and application. Background technique [0002] With the rapid development of science and technology in my country, the application of Internet technology has gradually become popular, and the relationship between various fields and the Internet has become more and more close. Traditional paper invoices have the characteristics of difficulty in distribution, storage, management, verification and high cost, which are not conducive to optimizing economic markets and promoting financial management. The implementation of electronic invoice credentials is conducive to further improving the work efficiency of taxation departments, reducing management costs, eliminating false invoices, and promoting green development. However, issuing electronic credentials online also in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/04G06F21/31G06F21/32G06F21/45G06F21/64
CPCG06Q30/04G06F21/31G06F21/32G06F21/45G06F21/64
Inventor 曹进马如慧李晖石小平
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products