Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous preservation of a relationship and its application in account system management

A one-way hash function and relationship identification technology, which is applied in the fields of information security and Internet sites, can solve the problems of not being convenient to save the key, not being able to obtain useful information, and not being able to retrieve data macroscopically, so as to expand the scope of cooperation and avoid the effect of the process

Inactive Publication Date: 2012-06-20
郭敏 +1
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the problem is: 1. It is not a convenient thing to save the key; 2. You must have the key to read and modify the data; 3. Without the key, the functional department cannot perform macroscopic retrieval of the data and cannot obtain statistics useful information in the sense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]

[0057] 1. Selection and application of one-way hash functions.

[0058]

[0059] The one-way hash function, also known as the hash function, referred to as the single hash function, is a function that changes an input string of arbitrary length into an output string of fixed length. The one-way hash function has two core features: 1. The result of encrypting the data is irreversible. For example, the string "abc" will become "900150983CD24FB0D6963F7D28E17F72" after being encrypted by the one-way hash function MD5. There is no general method in a limited time 2. There is a one-to-one correspondence between the data before and after encryption, that is to say, the one-way hash function MD5 can only encrypt the string "abc" into "900150983CD24FB0D6963F7D28E17F72", any other string will not be encrypted by the one-way hash function MD5 into "900150983CD24FB0D6963F7D28E17F72".

[0060]

[0061] The one-way hash function selected in the present invention is mainly used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a system or method of using hash functions to preserve a relationship. A relationship is anonymously preserved by storing the hash result of a relationship token that comprises a finite set of values of a plurality of objects. Specifically, an account anonymous identifier of an account can be produced by hashing a relationship token that comprises identity information of an owner of said account. A party that has enough knowledge of an account owner can independently produces said account anonymous identifier and therefore, securely communicates with a specific account without prior communication or a password. An account owner can further prove his / her ownership of an account by submitting related documents and a relationship token that comprises his / her identity information to an account system.

Description

technical field [0001] The invention belongs to the technical fields of information security and Internet sites, and relates to a method for using a one-way hash function to store and verify a relationship that can be described by a limited number of finite character strings. It specifically relates to a method for establishing, identifying and recovering accounts by using two core features of a one-way hash function (Hash), the irreversibility of data encryption results and the one-to-one correspondence between data before and after encryption. Background technique [0002] Civilized society has a great market demand for private health and medical records. A complete private health medical record can help doctors diagnose diseases and avoid unnecessary repeated tests. Macro research on private health care records can also provide a scientific basis for the country to formulate relevant policies. As a result, governments and companies around the world have invested signifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F17/30H04L29/06
CPCH04L9/3213H04L9/32G06F21/31H04L63/12H04L9/3236G06F21/6254G06Q10/10H04L2209/42H04L63/102G06F21/34
Inventor 郭敏柳松
Owner 郭敏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products