Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

155 results about "Identity privacy" patented technology

Strong privacy protection dual authentication method based on node identities and reputations in Internet of vehicles

The invention discloses a strong privacy protection dual authentication method based on node identities and reputations in Internet of vehicles. A user registers with an authentication center to obtain unique secret information shared with the authentication center; the user stores vehicle node initialization parameter information into a TPM security storage area; when the user expects interaction between vehicle applications on vehicle nodes and a background application server, the user needs to input identity information and an authentication process of the vehicle nodes and a background is executed by TA; the authentication process is as follows: a temporary encryption key with the TA is established to carry out symmetrical encryption transmission on the information through a bilinear pairing principle, the TA carries out integrity and consistency detection on the received information, verifies legality of real and temporary identities of the vehicle nodes and calls an ES to compute the node reputation, if the identities of the vehicle nodes are legal finally and the reputations exceed a threshold, the authentication of communication between the vehicle nodes and the background is completed. According to the method, the authentication security is enhanced, the identity privacy and the trajectory privacy of the user are protected, the authentication efficiency is improved and the authentication time delay is reduced.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Artwork circulation, authentication and registration method based on blockchain and expert system

The invention discloses an artwork circulation, authentication and registration method based on a blockchain and an expert system. According to the method, registration for an authentication result of an artwork is completed by smart contracts of authentication markets, and then the artwork is allowed to be circulated and recorded in smart contracts of trading markets. According to the method, block information accumulated in the smart contracts of the authentication markets is utilized, and knowledge is acquired outside the blockchain by machine learning of authentication information, the expert system is established, and a need for the commodity authentication validity and authentication result checking is met through providing an authentication suggestion for the artwork of which an inquiry is to the expert system. In addition, under the premise of protecting the identity privacy of a trader from disclosure, the smart contracts of the trading markets and the smart contracts of the authentication markets are combined, and cultural relic registration is established to specifically record a circulation state and an authentication result of a cultural relic. Ultimately, decentralization is realized in a trading process of the artwork by virtue of the above-mentioned method, and gain effects of creditability, convenience and a low cost are achieved at the same time.
Owner:JINAN UNIVERSITY

Security distributed aggregation and access system and method based on fog alliance chain

The invention discloses a security distributed aggregation and access system and method based on a fog alliance chain, and aims to solve the problem that most of current data aggregation schemes are designed based on a centralized mode, face single-point faults and tampering threats, and have security and performance improvement space. In order to solve the challenge, a distributed aggregation framework is designed in combination with fog computing and an alliance chain, single-point faults and tampering crisis are solved, and powerful support is provided for safe collection, communication andstorage of data. Meanwhile, a Paillier homomorphic algorithm of a threshold version is fused, a safe access control mechanism with a fault-tolerant function is designed, and confidentiality and privacy of data on a chain are guaranteed. Meanwhile, an efficient anonymous authentication method is provided, and identity privacy and data integrity can be guaranteed. Finally, the comparative analysisresult of the method and the existing method shows that the method can resist malicious attacks and ensure the system security, and compared with other existing methods, the method has lower calculation and communication costs.
Owner:NANJING UNIV OF POSTS & TELECOMM

Identity-based privacy protection integrity detection method and system in cloud storage

ActiveCN107948143AReduce overheadReduce public key certificate management workUser identity/authority verificationThird partyData integrity
The invention discloses an identity-based privacy protection integrity detection method and system in a cloud storage. The method comprises the following steps of (1) a system initialization stage that a trusted third-party PKG generates a main private key and a public parameter; (2) a secret key extraction stage that the trusted third-party PKG generates a private key for a user according to useridentity; (3) a label generation stage that the user generates a data label for each data block by using the private key and uploads data and the corresponding data label to a cloud server; (4) a challenge inquiry stage that a verifier sends a challenge to the cloud server; (5) an evidence generation stage that the cloud server computes an integrity evidence according to challenge information andreturns the integrity evidence to the verifier; and (6) a verification stage that the verifier verifies the data integrity according to the evidence. According to the method and the system, the public key certificate management and calculation cost of the system is reduced based on an identity signature, and meanwhile, the identity privacy and the data privacy of the user are protected in a process of verifying the data integrity, and the safety of the system is improved.
Owner:ANHUI UNIVERSITY

Cross-domain identity authentication method based on edge computing network architecture

The invention discloses a cross-domain identity authentication method based on an edge computing network architecture, and mainly solves the technical problems that in the prior art, key management and distribution are difficult, and user privacy is difficult to protect. The method comprises the following steps: 1) an edge node local authentication server and a home authentication server calculaterespective public and private keys; 2) the home authentication server generates a private key constructed by the user by using the pseudo identity; 3) the user applies for cross-domain access to theedge node local authentication server; 4) the edge node local authentication server sends information to a home authentication server of the user to verify the identity of the user; 5) the home authentication server authenticates the user information and returns a session key; 6) the local authentication server of the edge node calculates the session key and returns the authentication information;7) the user confirms the information to generate the session key. According to the method, the bidirectional verification security of the edge node equipment and the user can be effectively improved,the problems that the identity privacy of the user is exposed and the session is tracked are solved, and the method can be used for modern Internet of Things equipment.
Owner:XIDIAN UNIV

A block chain privacy protection scheme and system based on SM9 algorithm

InactiveCN109409884ASolve problems that are difficult to apply to real-world scenariosSolve application problemsDigital data protectionProtocol authorisationChain structurePrivacy protection
The invention discloses a block chain privacy protection scheme and a block chain privacy protection system based on an SM9 commercial cryptographic algorithm in China, belonging to the field of blockchain security and privacy protection. This invention provides an inter-node transaction platform based on federation chain, defines the permissions and functions of various nodes in the platform, and supports node transaction, information verification, parameter maintenance, block generation and other functions. This invention describes an improved SM9 multi-KGC (Key Generation Center) signaturealgorithm, which improves the working mode of single KGC in SM9 algorithm, adapts to the federation chain structure, and adopts this algorithm to determine the identity of the opposite party in the transaction between nodes. A group signature scheme based on SM9 algorithm is proposed. The identity verification of SM9 algorithm is improved to group signature verification, which effectively protects the identity privacy of the signatory. The transaction information is signed by the node through the algorithm and written into the block chain after the transaction, which can effectively hide theidentity information of both parties of the transaction, protecting the privacy of the node and ensuring the legitimacy of the transaction.
Owner:BEIJING ANRUSHAN CULTURE TECH

Cross-domain anonymous resource sharing platform and implementing method thereof

ActiveCN106992988AAchieve authenticationRealize cross-domain authorization managementUser identity/authority verificationInternet privacyStrategy making
The invention discloses a cross-domain anonymous resource sharing platform and an implementing method thereof. The platform comprises an anonymous identity authentication module, a resource uploading module and an access control module. According to the invention, anonymous identity authentication on a user is implemented by the anonymous identity authentication module, and authorization management on the user is implemented by methods of access control and the like. According to the invention, firstly, by analysis on an attribute certification structure, anonymous identity authentication on the user and construction of a user attribute library on the basis of protecting user identity privacy are implemented. Based on identity authentication, access strategy making for uploaded resources is implemented by the resource uploading module, the access control module judges whether a visitor has an access permission according to each entity attribute and strategy so as to ensure security of resources, and finally, anonymous cross-domain authentication management on the user is implemented and a fine-grained resource sharing mode is implemented. Meanwhile, the cross-domain anonymous resource sharing platform and the implementing method thereof have effectiveness, dynamics and the like.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

User privacy protection scheme for car hailing based on blockchain

The invention relates to a user privacy protection scheme for car hailing based on a blockchain, and belongs to the technical field of communication of the Internet of Vehicles. The user privacy protection scheme includes the steps: a TA initializes a whole car-hailing system; a passenger, a driver and a roadside node register to the TA to obtain corresponding secret keys; the passenger sends a car hailing request to the nearest roadside node; the roadside node and the driver respond to the car hailing request of the passenger; the roadside nodes match drivers for the passengers and return successfully matched information to the corresponding passengers and drivers; and the passenger and the driver which are successfully matched send confirmation information to the roadside node to start ajourney, and after the journey is finished, the car hailing record is sent to the roadside node, and the roadside node sends car hailing data to the cloud server to be stored and sends a car hailingdata signature to the blockchain network. Compared with the prior art, the identity privacy, the position privacy and the request/report privacy of the user can be protected; rapid matching between passengers and drivers is realized; and a data auditing function of the car-hailing data is realized by using the block chain.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Supervisable anonymous authentication method based on zero knowledge proof

The invention discloses a supervisable anonymous authentication method based on zero knowledge proof, comprising three types of participants: a CA, a user and a verifier, wherein the CA generates an issuer key pair and a group key, the CA allocates a pair of private keys to the user during registration of the user, and meanwhile the CA issues a relevant certificate to the user according to the attribute information submitted by the user; when the user presents the certificate, the verifier specifies an attribute that needs to be presented on the certificate of the user, and the user signs thecertificate and hides attribute values that do not need to be presented; and the verifier verifies the signature, if the signature passes the verification, the certificate presented by the user is valid, or otherwise, the certificate presented by the user is invalid. By adoption of the supervisable anonymous authentication method disclosed by the invention, the anonymity of the user is also ensured while increasing a mandatory supervision function, thereby greatly improving the identity privacy of the user compared with the general identity supervision scheme. By adoption of the supervisable anonymous authentication method disclosed by the invention, a supervisable function is also added.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Processing methods and related devices of digital certificate

The embodiment of the application discloses processing methods and devices of a digital certificate. The method includes: recording a CA (Certificate Authority) public key of a first participant intoa blockchain network by a CA of the first participant of the blockchain network; when the CA of the first participant receives a certificate authorization request of any user, confirming, according touser identity information carried in the certificate authorization request, whether the same is a user of the CA of the first participant; if yes, obtaining a public key of the user from the certificate authorization request, and obtaining CA public keys of any N second participants from the blockchain network according to a ring signature certificate signing and issuing rule, wherein N is equalto a public key number set in the ring signature certificate signing and issuing rule; and carrying out ring signature on the user identity information and the public key of the user by the CA of thefirst participant according to the CA public key and a private key of the first participant and the CA public keys of the N second participants to form the digital certificate, and sending the same tothe user. By adopting the embodiment of the application, identity privacy of signing and issuing sides of digital certificates can be enhanced.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Alliance chain cross-chain privacy protection method based on group signature and CA multi-party authentication

The invention discloses an alliance chain cross-chain privacy protection method based on group signature and CA multi-party authentication. In the alliance chain, full-life-cycle supervision in the chain and privacy protection of cross-chain transactions of the alliance chain are achieved through a technical system integrating certificate distribution uplink and group signature encryption. According to the invention, the certificate blockchain is introduced, and the CA of the alliance chain maintains the certificate blockchain and packages the operation and content of the distributed certificates into a transaction uplink, thereby achieving the later tracing and evidence obtaining of the alliance chain. A group signature technology is introduced, a node of an alliance chain uses a group public key to encrypt a cross-chain transaction to achieve identity privacy protection of the transaction, and an administrator uses a group private key to obtain a signer of the cross-chain transactionto achieve supervision. Generation of a digital certificate and a group public and private key and signature and verification of transaction information are achieved by integrally adopting a currentinternationally universal asymmetric encryption algorithm or an over-encryption algorithm, so that overall data privacy protection of the alliance chain is ensured.
Owner:ZHEJIANG UNIV

Authentication key negotiation method enabling identity privacy and non-malleable security

The invention relates to an authentication key negotiation method enabling identity privacy and non-malleable security. The method includes the following steps that: a first device transmits a determined expression, namely, X'=AX<d>, to a second device, wherein A= g is the public key of the first device, X=g<x> and d=h<d>(X, aux<d>); the second device determines an expression, namely, Y'=BY<e>, wherein B=g is the public key of the second device, Y=g<y>, and e=h<e> (Y, aux<e>), and determines S according to a DH- index y, a private key b and X', determines K and K based on S, and determines an expression, namely, C=AE(K,(I, B, CERT(B), Y, Data)) according to K and an authentication encryption function AE, transmits Y' and C to the first device; and the first device determines S according to a DH- index x, a private key a and Y', and determines K and K based on S, and the first device determines an expression, namely, C=AE (K, (I, A, CERT, X, Data)) according to K, and transmits C to the second device. According to the session key negotiation method, based on reasonable parameter setting, each device operations 2.5 modular exponentiation, and therefore, the data computation load of each device can be greatly decreased, and the generation efficiency of session keys can be improved, and the method can be applied more flexibly.
Owner:赵运磊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products