Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

150results about How to "Guaranteed anonymity" patented technology

Modifiable reputation evaluation system and method based on block chain, and electronic payment system

ActiveCN107967557AAvoid injusticeGuaranteed transaction privacyFinanceDigital data protectionRing signatureE-commerce
The invention belongs to the e-commerce technology field and discloses a modifiable reputation evaluation system and method based on a block chain, and an electronic payment system. A receipt from a seller is received by a user, the signature of the seller in the receipt is verified, and the evaluation information is generated; after verification is completed, a ring signature of the evaluation information is generated by the user, and the ring signature is sent to the block chain; the receipt and the ring signature of the user are verified by the block chain; a database is updated after the block is generated; a new signature is acquired by the user through a signature algorithm, and the new signature is sent to the block chain; validity of the signature is verified by the block chain, and whether the two signatures are completed by the same user is determined; a pointer corresponding to the block of a previous message is modified after verification completion, the previous message ismarked as invalid, and the previously-revoked information is replaced by the block of the message. The method is advantaged in that on the condition that user anonymity and transaction non-tamperability are guaranteed, integrity and openness of the evaluation information are guaranteed, and reliability of the evaluation information is guaranteed.
Owner:XIDIAN UNIV

IOV (Internet of Vehicles) anonymous authentication system with controllable link, and IOV anonymous authentication method

The invention discloses an IOV (Internet of Vehicles) anonymous authentication system with a controllable link, and an IOV anonymous authentication method, and relates to the IO field. The system includes a system initialization module which is used for completing the initialization work of an IOV system and a TA (trusted authority); a registration module which is used for completing the registration of an OBU (onboard unit) and an RSU (roadside unit) to the TA; an OBU joining module which is used for obtaining a group certificate from the RSU when the OBU enters the communication range of a new RSU; a signature module which is used for completing the signature of a vehicle about a message; an authentication module which is used for completing the signature information authentication afterthe OBU receives the signature information; a link module which is used by an SP (service provider) to determine whether the two signature messages are linkable or not; an identity tracking module which is used for completing the process that the TA exposes the real identity of a signer of a valid signature message. The construction of the system uses a more lightweight elliptic curve operation to make the authentication process more efficient.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

PUF-based three-factor anonymous user authentication protocol method in Internet of Things

The invention discloses a PUF (Physical Unclonable Function)-based three-factor anonymous user authentication protocol method in the Internet of Things, which solves the security problems such as physical clone attacks and the like, and is implemented by the following steps that: a gateway generates a long-term key for registration and key negotiation of nodes and users; the node sends a PUF-basedchallenge and response to the gateway, and the gateway generates an authentication certificate and sends a node key to the node to complete registration; the user sends the identity identifier to thegateway, the gateway generates a user dynamic identity identifier and a user key and sends the user dynamic identity identifier and the user key to the user, and the user encrypts and stores the userdynamic identity identifier and the user key in the smart card to complete registration; and the user, the gateway and the node perform mutual authentication and key agreement to form a PUF-based three-factor anonymous user authentication protocol method in the Internet of Things. Based on three-factor authentication, smart card loss, password guessing attack and the like can be resisted; the method achieves the anonymity of the user and the node, is small in calculation amount, is high in efficiency, is suitable for IOT nodes with limited resources, and is used for IOT safety communication.
Owner:XIDIAN UNIV

Electronic voting system based on finger vein feature recognition

The invention discloses an electronic voting system based on finger vein feature recognition. The system comprises a finger vein feature acquisition device, a voting client sub-system, a voting center sub-system and a vote counting center sub-system. The finger vein image of a voter is acquired by the finger vein feature acquisition device, the voter is registered in the voting center sub-system by the finger vein feature, the legality of the voter is verified by the voting center sub-system, and the vote is issued to the voter if the voter is qualified. A biological characteristic public / private key pair of the voter can be generated by software of the voting client sub-system, and the voting process is realized by the interaction of security protocols such as certificate signing among the voting client sub-system, the voting center sub-system and the vote counting center sub-system. Compared with other electronic voting systems, the system enables a finger vein feature recognition technology to be introduced, and the finger vein feature recognition technology replaces ways such as passwords and digital certificates and takes part in the network identity authentication and the voting process, so that the safety and use convenience of the system are improved; the electronic voting system based on finger vein feature recognition also has anonymity, transparency and openness.
Owner:SOUTHWEST JIAOTONG UNIV

Data safe transmission method in body area network system

The invention provides a data safe transmission method in a body area network system. The data safe transmission method in the body area network system comprises the following steps: according to the level structure deploy body area network system, and symmetric keys are prearranged in cluster heads and base stations, and symmetric keys are prearranged in concentrators and the cluster heads; the body area network system is initialized; each concentrator collects data and transmits the data to the cluster heads; and the data are sent to the base stations by the cluster heads, and are decrypted, stored, analyzed and processed through the base stations. The body area network structure is delaminated, simplicity and expansibility of network deploy are improved, and the data safe transmission method is beneficial for network life circles and energy control. The data safe transmission method not only can guarantee data privacy of users, but also can ensure network user context privacy, and prevent corresponding relations between two communication sides from being broken. In addition, information receivers are not limited, and therefore medical workers or relatives of patients can all conveniently and fast search disease information of patient information, the data safe transmission method accords with actual using requirements of a body area network.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

System for providing personalized services

A system comprises an apparatus which is capable of personalizing its behavior in accordance with a user profile, and a gatekeeper device which comprises control means for allowing a user to control said personalization of the apparatus. The gatekeeper device is capable of detecting apparatuses which have personalization capabilities and of notifying the user upon such detection. The user may then decide to establish a relationship with the apparatus, which relationship specifies the extent of personalization which the apparatus is allowed to exhibit and whether confirmation by the user is required at fixture occasions. The user is allowed to change the relationship at any time. The system enables the user to build up anonymous relationships with various apparatuses, providing the user with personalized services while privacy is guaranteed.
Owner:SURFACE ENGINEERED PRODS +2

Remote identity authentication method participated in by registration center under multi-sever environment

The invention discloses a remote identity authentication method participated in by a registration center under a multi-sever environment, which comprises the following steps: a user registration application is submitted to the registration center; a smart card is adopted to log in to a server which is registered in the registration center; the smart card performs local legality verification on a user, if yes, first logging-in requesting information is generated and sent to a server; the server generates second logging-in requesting information and sends the information to the registration center; the registration center performs legality verification on the server and the user identity according to the received second logging-in requesting information, if yes, the registration center generates first authentication information and sends the information to the server; the server performs legality verification on the registration center, if yes, the server sends second authentication information to the smart card; the smart card performs legality verification on the server and the registration center, if yes, the smart card, the server and the registration center jointly generate a session key. The method can prevent anonymity attack and avoid the attack caused by reveal of a verification table.
Owner:SHANDONG UNIV OF SCI & TECH

Block chain-based food safety multi-interest subject credit evaluation method

The invention provides a block chain-based good safety multi-interest subject credit evaluation method. According to the method, a Hyperledger block chain is taken as a bottom support technology of the credit evaluation method, multi-interest subjects (traders) on food supply chains and supervisors are endowed with different identity authorities, and the traders are endowed with identity anonymityand evaluation result publicity and transparency during the evaluation; and the supervisors collect evaluation information, for transactions, of the multi-interest subjects on the food supply chainsthrough intelligent contracts, carry emotion analysis on the fed back evaluation information by adoption of a deep learning algorithm long and short term memory (LSTM) model, and feed credit evaluation results back to both parties of the transactions. According to the method, the efficiency and correctness of traditional credit evaluation systems are improved and the effectiveness of food safety supervision is enhanced.
Owner:BEIJING TECHNOLOGY AND BUSINESS UNIVERSITY

Transmission of Anonymous Information Through a Communication Network

A system that enables anonymous data collection from Respondents, such as over the Internet using public key technologies, where the anonymity and authenticity of Respondents is provided by a trusted mediation service. The invention provides a simple and secure solution that allows authentication of research Respondents while maintaining their anonymity. The Collector cannot link Respondent's real identification and their responses, and a Mediator provides a communication service but has no access to the content of information exchanged between the Respondents and the Collector. According to one aspect of the invention, a Collector requests a list of anonymous Ids from the Mediator. The Mediator then generates a list of anonymous tokens which can then be used by the Respondents when they communicate with the Collector through the Mediator.
Owner:GENACTIS

Sensor network distributed access control method capable of protecting user privacy

InactiveCN102088462ADefend against compromise attacksGuaranteed anonymityNetwork topologiesTransmissionUser privacyRing signature
The invention discloses a sensor network distributed access control method capable of protecting user privacy. The method comprises the following steps: broadcasting a pre-established group access list pool to all of the network users by a network owner, and loading the group access list pool in all of sensor nodes; generating request information and ring signature information by a network user when the network user proposes an access requirement, transmitting the request information and the ring signature information to a sensor node to be accessed, wherein the request information includes a user random number; after the sensor node to be accessed receives the request information and the ring signature information, checking the request information according to the group access list pool to determine whether the request information is valid; refusing the request information if the request information is invalid; and determining whether the ring signature information is correct by the sensor node if the request information is valid, if correct, transmitting the data requested by the network user to the network user via the sensor node, otherwise, refusing the request information.
Owner:ZHEJIANG UNIV

Attribute-based anonymous authentication method and system thereof

InactiveCN104125199AFlexible Threshold Attribute Selective Presentation SchemeImprove communication efficiencyTransmissionInternet privacyService provision
The invention discloses an attribute-based anonymous authentication method which contains the following steps: 1) a trusted party TP generates a master key x and system public parameters according to set safety parameters; 2) a user U registers with the TP to submit attributes and initiates an attribute certificate issue request; 3) the TP verifies the attributes of the user U and issues an attribute certificate for the user U according to the attributes of the U, the master key x and the system public parameters; 4) the user U initiates an access request to a service provider SP; 5) the SP looks up an access strategy corresponding to the access request and returns the access strategy to the user U; 6) the user U selects an attributes that the U wants to use according to the access strategy, and an anonymous certificate is calculated by the use of the attribute certificate and a private key r and is sent to the SP; and 7) the SP verifies the anonymous certificate, and accepts the access request and provides corresponding service to the user if verification is passed and the access strategy is satisfied. According to the invention, privacy of a user is guaranteed, and a more flexible threshold attribute selective showing scheme is supported.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +1

Privacy protection access control method in wireless sensor network supported by IP

ActiveCN109963282AGuaranteed unlinkabilityFlexible revocation processNetwork topologiesSecurity arrangementWireless mesh networkPrivacy protection
The invention discloses a privacy protection access control method in a wireless sensor network supported by an IP. According to the method, a group signature technology is applied, system users are divided into different user groups according to different access authorities, the group users use group signatures for anonymous access to guarantee user data access privacy, and leakage of user behavior modes is prevented. According to the method, users are divided into different user groups according to different access authorities by utilizing a group signature technology, the group users generate group signatures for identity authentication, and anyone in a network can verify the correctness of the group signatures but cannot know the identities of the signers; the identity authentication and authorization process of the Hidra protocol is improved by utilizing a false ticket mechanism and a self-updating ticket mechanism, so that the unlinkability of a protocol message is ensured; the block chain technology is used for managing the group public key, so that the secret key management and Hidra protocol user revocation process is more flexible; a responsibility investigation mechanismis improved by utilizing a block chain technology, so that the responsibility investigation process is public and transparent, and possible responsibility investigation disputes are solved.
Owner:SOUTH CHINA UNIV OF TECH

Location privacy protection method based on dynamic pseudonym exchange area

The invention discloses a location privacy protection method based on a dynamic pseudonym exchange area, and belongs to the field of location privacy protection of the Internet of vehicles. The methodcomprises the steps that a vehicle in the vehicular ad hoc network registers and generates a dynamic pseudonym in the driving process and periodically updates the pseudonym, then the vehicle dynamically establishes a pseudonym exchange area, carries out pseudonym exchange to enhance the location privacy, embeds an improved Diffie-Hellman key exchange protocol in the pseudonym exchange process atthe same time to protect the pseudonym exchange process, the vehicle initiating the pseudonym exchange uploads a pseudonym exchange log to a certification authority (CA) of the area after the completion of the pseudonym exchange, the CA re-establishes the relationship between a real ID and the pseudonym of the vehicle through analyzing the pseudonym exchange log so as to enable the CA to perform identity tracking and violation processing. The location privacy protection method solves a problem of location privacy of the vehicle in the driving process, and is an effective location privacy protection method which adapts to the communication environment of the Internet of vehicles and can claim the responsibility of violation vehicles.
Owner:KUNMING UNIV OF SCI & TECH

Credible inter-domain rapid authentication method on basis of separation mechanism network

InactiveCN102355663AImpossible to decryptImpossible to tamper withSecurity arrangementAnonymityInter-domain
The invention relates to a credible inter-domain rapid authentication method on the basis of a separation mechanism network for solving the problem of rapid authentication when a terminal in the separation mechanism network is subjected to inter-domain switching. In the method, a novel protocol is provided for realizing the rapid authentication when the terminal is subjected to inter-domain switching; and when the identity of a user is authenticated, the identity authentication of a terminal platform and the integrity check of the terminal platform are realized. In the method, when the terminal is subjected to inter-domain switching, an authentication center of a home domain does not need to participate again and an authentication center of a local domain can authenticate the mobile terminal by a Ticket. The method can resist the anti-replay attack, so that the credibility, safety, anonymity, anonymity of the identity of the user and untraceability of the identity of the user of the platform are ensured.
Owner:BEIJING JIAOTONG UNIV

Supervisable anonymous authentication method based on zero knowledge proof

The invention discloses a supervisable anonymous authentication method based on zero knowledge proof, comprising three types of participants: a CA, a user and a verifier, wherein the CA generates an issuer key pair and a group key, the CA allocates a pair of private keys to the user during registration of the user, and meanwhile the CA issues a relevant certificate to the user according to the attribute information submitted by the user; when the user presents the certificate, the verifier specifies an attribute that needs to be presented on the certificate of the user, and the user signs thecertificate and hides attribute values that do not need to be presented; and the verifier verifies the signature, if the signature passes the verification, the certificate presented by the user is valid, or otherwise, the certificate presented by the user is invalid. By adoption of the supervisable anonymous authentication method disclosed by the invention, the anonymity of the user is also ensured while increasing a mandatory supervision function, thereby greatly improving the identity privacy of the user compared with the general identity supervision scheme. By adoption of the supervisable anonymous authentication method disclosed by the invention, a supervisable function is also added.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Authentication method and apparatus for wireless radio frequency recognition system

The embodiment of the invention discloses an authentication method for a wireless radio frequency identification (RFID) system. Anonymity of a tag is ensured by updating ID in each authentication; and an (ID, P-key) pair of the tag is stored in a reader party, and only the (ID, P-key) part in the reader party, which is inconsistent with the content transmitted by the tag, is updated by the reader party, such that synchronicity of data update can be ensured. The embodiment of the invention also discloses an authentication device for the wireless radio frequency identification (RFID) system. By adopting the embodiment of the invention and by ensuring the anonymity of the tag through ID update, the asynchronism of data update easily caused by the adoption of an ID updating mechanism in a common RFID air interface protocol can be simultaneously solved.
Owner:HUAWEI TECH CO LTD

Anonymous subscription agreement and system thereof

The invention provides an anonymous subscription agreement and a system thereof. The anonymous subscription agreement comprises the following steps: 1. a server generates a series of main system parameters, such as a login cycle and public and private key information thereof; 2. a user interacts with the server and executes a registration process, and in the process, the user provides a subscription interval time and pays a corresponding fee to obtain a valid signature from a service provider; 3. the user logs in by using the signature, logs in according to a fixed login cycle at a login stage, carries out a blind operation on the signature to generate a token of the current login cycle for login, carries out the next cycle after the login cycle is terminated, and changes the token to log in; 4. the anonymous agreement provides a connection operation, and the user can select to execute the connection operation when no decorrelation is required; and 5. when the user does not want to access the service, the user can execute a logout operation; and moreover, in the login and connection stages, inspection on the expiration time is contained, and if the subscription time interval is overdue, the user cannot log in anymore, so the benefits of the service provider are guaranteed.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Ring signature generation method based on SM9 digital signature algorithm

The invention discloses a ring signature generation method based on an SM9 digital signature algorithm, which is characterized by comprising a key generation center KGC, a signer and a Verifier, wherein the KGC is responsible for generating a user private key of a signed user in the system; setting the number of users in the ring to be n, marking the user group identifier set as L={ID1, ID2,..., IDn}, and the signer being the pi-th user in the user group, the private key of which is SKpi and the identifier of which is IDpi. The method comprises the following steps of (1) generating a ring signature of a to-be-signed message M, and (2) verifying the ring signature. In the process of generating the signature, a signer can spontaneously construct a user group to form a ring, the ring signature can be generated without the participation of other users, and meanwhile, the non-repudiation of the signature and the anonymity of the identity of the signer are ensured.
Owner:WUHAN UNIV

Multi-receiver signcryption method based on multiple variables and multiple security properties

ActiveCN104539425AGuaranteed anonymityGuarantee the fairness of decryption signcryptionUser identity/authority verificationAlgorithmSigncryption
The invention discloses a multi-receiver signcryption method based on multiple variables and multiple security properties. The method is used for solving the technical problem that an existing multi-receiver signcryption method is poor in designcryption justice. According to the technical scheme, an algorithm KeyGen, a signcryption algorithm Signcrypt and a designcryption algorithm Designcrypt which are used for generating system parameters and secret key pairs of all users are involved in the method. The signcryption algorithm is based on a finite domain F with a characteristic q, totally N+tau participants are involved in a system, a leader L is selected from actual signcryption persons and calculates interference data, the interference data and real data are mixed together, so receivers can not judge the identities of the actual signcryption persons. By means of the threshold technology, the anonymity of senders is ensured; the identity list of the receivers is not directly given any more in communication data, and the anonymity and early judgment of the receivers are ensured; key information of designcryption and information of the authorized receivers are fused into a parameter list, and the designcryption justice is ensured.
Owner:东莞三航安视睿信息技术有限公司

VANETs anonymous authentication system and method based on ID-based group signature

The invention provides a VANETs anonymous authentication system based on an ID-based group signature, related to the technical field of wireless network security. The VANETs anonymous authentication system based on the ID-based group signature comprises a third-party trust institution, roadside units and vehicle units; and the third-party trust institution communicates with the vehicle units through the roadside units. The invention also provides a method for anonymous authentication using the VANETs anonymous authentication system based on the ID-based group signature; after the third-party trust institution generates an initial pseudonym, an initial trust value and a signature private key for the vehicle units, and generates a signature private key, a group private key and a group publickey for the roadside units, a V2I authentication protocol is performed between the vehicle unit and the roadside unit, and a V2V authentication protocol is performed among the vehicle units, and a shared key is generated when both are legal; and finally, the roadside units assist the third-party trust institution to track a true identity of the vehicle unit sending a malicious message and performfurther processing. The invention can ensure the anonymity of the vehicle node identity, avoid the certificate storage and management overhead, and improve the privacy protection strength and the authentication efficiency.
Owner:NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products