Sensor network distributed access control method capable of protecting user privacy
A sensor network and access control technology, applied in the direction of network topology, transmission system, security devices, etc., can solve the problems of long time consumption, inability to guarantee the privacy of users, the legality of network owners, etc., and achieve the effect of resisting compromise attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0014] First, the meanings of the symbols involved in the following specific embodiments are explained:
[0015] p,q,E,P,G,H1,H2: generate public variables in the process of user request;
[0016] Z * p : A collection of numbers less than p (excluding 1 and common divisors of p);
[0017] x owner : network user private key;
[0018] Ri, Rj: Two different random numbers generated when the network user sends a request to the sensor node (R1 - the random numbers numbered i and j in Rm);
[0019] H1: {0, 1} * → Z * p 、H2:G×G→Z * p : All are cryptographic hash equations;
[0020] E(Zq): is a variable consisting of a point at infinity and (x,y) satisfying the equation y2 = x3 + ax + b(mod q), (x, y) ∈ Zq × Zq;
[0021] ? : point at infinity in E(Zq);
[0022] Uj: the network user whose number is j;
[0023] Un : new network user;
[0024] Que: request information;
[0025] σ: ring signature information;
[0026] a i : a random number;
[0027] Ω: code name...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com