CN102761556A - Method to protect communication security and privacy function of mobile client - Google Patents
Method to protect communication security and privacy function of mobile client Download PDFInfo
- Publication number
- CN102761556A CN102761556A CN2012102598824A CN201210259882A CN102761556A CN 102761556 A CN102761556 A CN 102761556A CN 2012102598824 A CN2012102598824 A CN 2012102598824A CN 201210259882 A CN201210259882 A CN 201210259882A CN 102761556 A CN102761556 A CN 102761556A
- Authority
- CN
- China
- Prior art keywords
- client
- message
- mobile service
- tpm
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method to protect a communication security and privacy function of a mobile client. The method comprises the following steps: combining a direct anonymous authentication (DAA) protocol and a transport layer security (TLS) protocol, and utilizing the identity privacy of a DAA protocol protection client with an NFC (Near Field Communication) function, as well as the privacy between the TLS protocol protection client and a server; reading the service website information and a website connecting with the server by the client with the NFC function, realizing the protection for the client identity privacy and the communication privacy through operating a modified TLS protocol between the client and the server; adopting an ellipse curve cryptography to realize the DAA protocol, wherein the client with a DAA certificate can complete the signature; and combining the DAA protocol and the TLS protocol so as to uniformly realize the anonymity and privacy of the communication between the mobile client and the server.
Description
Technical field
The present invention relates to the confidentiality of communicating by letter between mobile client that a kind of protection possesses the NFC communication function and the server; The privacy of client identity be can protect simultaneously again, the protection mobile client communication security of client identity information and the method for privacy function do not revealed.
Background technology
Along with developing rapidly of mobile computing, increasing important service such as shopping at network, internet bank trade are accomplished through portable terminal (mobile phone, panel computer).The convenient, fast completion mobile service that appears as of NFC (short-range communication) provides technical support.More and more mobile equipment has possessed the NFC communication module, and these equipment can read the supporting NFC label of businessman, thereby starts mobile service according to the data that obtain easily.This business model has all proposed very high requirement to confidentiality in the process of exchange and anonymity.Existing solution is to utilize the confidentiality of transaction data between tls protocol (Transport Layer Security) protection portable terminal and the server, utilizes DAA authentication (directly anonymous authentication) to realize the anonymous authentication of portable terminal to server.Tls protocol is mainly used in and between client and server, accomplishes key agreement, utilizes the key structure of consulting out to go out an escape way.When between NFC mobile device and server, moving tls protocol, might expose some privacies of NFC equipment.Though the privacy that DAA can portable terminal, the anonymity that it has just accomplished identity proves, does not realize bipartite key agreement, therefore still can't ensure the fail safe of interactive information after the authentication.Existing these methods can only realize single target, can't both guarantee the confidentiality of communicating by letter, and can protect the anonymity of portable terminal simultaneously again.How to be directed against this problem, to combine DAA agreement and tls protocol, the anonymity and the confidentiality of communicating by letter between unified realization portable terminal and the server need to propose new technical scheme.
Summary of the invention
The objective of the invention is to overcome the deficiency that exists in the prior art and provide a kind of and combine DAA agreement and tls protocol, unified anonymity and the protection mobile client communication security of confidentiality and the method for privacy function of communicating by letter between portable terminal and the server of realizing.
The objective of the invention is to realize like this:
A kind of client that possesses the NFC communication function of can protecting is with the confidentiality of communicating by letter between the server; Can protect simultaneously protection mobile client communication security and the method for privacy function of the privacy of identities of client again; It is characterized in that: combine the direct same Transport Layer Security of anonymous authentication agreement (DAA) (TLS); Utilize the DAA protocol protection to possess the privacy of identities of the client of NFC function, utilize the confidentiality of communicating by letter between tls protocol protection client and the server simultaneously; Possess the server website information in the client reading tag of NFC communication function, Connection Service device network address is utilized the tls protocol that operation was revised between described client and the server, realizes the protection to client identity privacy and communication security; Described DAA agreement adopts elliptic curve cipher technology (ECC) to realize that client has the DAA certificate, can accomplish signature; The described modification that Handshake Protocol in the tls protocol is partly carried out is following, replaces the client identity that sends in the general T LS agreement with a nonce that produces in the identity at certificate issuance center and the key exchange process.
A kind of method of protecting mobile client communication security and privacy function, it is characterized in that: concrete steps are following:
Step 1: the mobile service certificate center is responsible for the granting of a plurality of mobile service security protocol parameters; This center operation initialization algorithm; For portable terminal and mobile service server generate various essential parameters, also send public key certificate simultaneously to the mobile service server:
1), generates promise parameter
: in this step; Selection has enough three crowds
of big Prime Orders; Generator makes
for crowd
selects respectively at random;
; Simultaneously, also to select a bilinear mappings:
; Next be to select random Harsh function
,
;
; The last arithmetic operation of TPM in crowd
, is let the subclass of parameter
be that the parameter
of TPM preferentially is set to
before at
by strict restriction;
3), generate publisher's parameter
; For each
; Step below carrying out: select two random integers:
; Publisher's private key
; Calculate then
and
; Publisher's PKI
is set to
; Then; Open parameters through the publisher derives
; Finally; For each publisher
,
is set to
;
4), generate the TPM parameter: according to the endorsement key that self embeds, TPM generates a pair of public and private key:
; In addition, TPM also will generate a privately owned secret data
; Finally; For the corresponding main frame
of each TPM, its open parameters
is set to
;
Step 2: the mobile service certificate center sends common parameter and the certificate that agreement needs to portable terminal and mobile service server;
Step 3: the part that joins request of operation DAA agreement between portable terminal and the mobile service certificate center; The adding agreement operates in the TPM module
of given portable terminal; Mobile terminal host
, and between the mobile service certificate center
;
1), promoter: send request by the mobile service certificate center, calculate as follows simultaneously:
2), after mobile terminal host receives this message, transmit to the TPM that is embedded in wherein;
3), after TPM receives message, respond, and carry out following computing:
1), the TPM module is sent message
to mobile terminal host; After mobile terminal host is received message, send message
to the mobile service certificate center through the GPRS/3G network;
2), the mobile service certificate center receives above-mentioned message, carries out following computing:
If
that the mobile service certificate center is preserved be not in the message of receiving; Stop computing so, the operation of terminate agreement; Otherwise calculate as follows:
; if
; Then stop computing, and the operation of termination protocol; Otherwise calculate as follows:
;
if
; Stop computing so; The operation of terminate agreement; Otherwise, carry out following computing:
For
in all revocation lists; if
; The operation of terminate agreement so, otherwise carry out following computing:
3) after, mobile terminal host is received this message; Therefrom extract B; Send B to TPM; After TPM receives message B, calculate
, send D to the mobile service certificate center then;
4), after the mobile service certificate center receives D, carry out following computing:
Step 4: when the user gets into the NFC label area; The user presses close to label to portable terminal, and portable terminal reads the content in the NFC label through the NFC passage, read information after; Portable terminal connects the website that mobile service can be provided through the GPRS/3G network; Move signature algorithm simultaneously, calculate anonymous signature, initiate the operation of DAA-TLS agreement by portable terminal;
Step 6: mobile service server
is selected random number
; Select secret value
at random; Calculate
; To
with the computing of signing of the private key of server; Obtain
, send message (
) to portable terminal I then;
Step 7: after client I receives message; Select secret value
at random; Calculate
; Utilize the PKI of server that signature
is verified; Checking is through
calculated in the back; All message of utilizing the DAA private key that client is sent and receiving are done the signature computing; Obtain
; Send message
to server;
wherein is as the identify label of client; Wherein, the detailed process of utilizing the DAA private key that transmission message is signed is following:
1) if
;
so; Otherwise
; Wherein,
expression basic platform title; It is a property value that has creditable calculation modules equipment; Calculate
;
;
;
;
,
; TPM module in being embedded in portable terminal is sent order
; After TPM receives above-mentioned message; Carry out following computing:
;
,
;
,
;
,
;
2), TPM sends message
to mobile terminal host; After mobile terminal host is received message; The data of grasping according to oneself with receive that the content of message carries out following computing:
, final
signature value that generates;
Step 8: the mobile service server terminal is verified signature after receiving this message, if checking is passed through, just generates the original material of session key, and then, accomplishes the generation of final session key according to the tls protocol standard,
Process to anonymous signature verification is following: cancel the private key
in the tabulation for all; If
returns authentication failed so; If
and
returns authentication failed; If
be
perhaps, return authentication failed; Calculate
;
;
;
,
; if
; Return signature verification failure, if equate then return the signature verification success.
The invention has the beneficial effects as follows:
The confidentiality of communicating by letter between NFC equipment need guarantee the client simultaneously when accomplishing mobile service anonymity and client and the server; Existing solution generally only realizes a target; Basically there is not scheme that anonymity and confidentiality can be provided simultaneously; The DAA-SIGMA agreement that Jesse Walker proposes just the exploring of theory, combines the DAA agreement, for IKE provides anonymous authentication property with IKE.But, in reality, seldom use, so DAA-SIGMA does not have practicality because the SIGMA agreement is a kind of IKE that is used for theory analysis.The present invention is directed to these problems, combine the tls protocol of DAA agreement, be applied to NFC equipment simultaneously and accomplish in the scene of mobile service, anonymity and confidentiality are provided when communicating with the mobile service server for NFC equipment with extensive use in the reality.
Description of drawings
Fig. 1 DAA-TLS agreement flow chart.
Embodiment
A kind of client that possesses the NFC communication function of can protecting is with the confidentiality of communicating by letter between the server; Can protect simultaneously protection mobile client communication security and the method for privacy function of the privacy of identities of client again; It is characterized in that: combine the direct same Transport Layer Security of anonymous authentication agreement (DAA) (TLS); Utilize the DAA protocol protection to possess the privacy of identities of the client of NFC function, utilize the confidentiality of communicating by letter between tls protocol protection client and the server simultaneously; Possess the server website information in the client reading tag of NFC communication function, Connection Service device network address is utilized the tls protocol that operation was revised between described client and the server, realizes the protection to client identity privacy and communication security; Described DAA agreement adopts elliptic curve cipher technology (ECC) to realize that client has the DAA certificate, can accomplish signature; The described modification that Handshake Protocol in the tls protocol is partly carried out is following, replaces the client identity that sends in the general T LS agreement with a nonce that produces in the identity at certificate issuance center and the key exchange process.
As shown in Figure 1, a kind of method of protecting mobile client communication security and privacy function, concrete steps are following:
Step 1:The mobile service certificate center can be responsible for the granting of a plurality of mobile service security protocol parameters.Operation initialization algorithm in this center for portable terminal and mobile service server generate various essential parameters, also sends public affairs to the mobile service server simultaneously
The key certificate:
1) generates promise parameter
.In this step; Selection has enough three crowds
of big Prime Orders; Generator makes
for crowd
selects respectively at random;
; Simultaneously, also to select a bilinear mappings:
.Next be to select random Harsh function
,
.
。In the present invention; The last arithmetic operation of TPM in crowd
, is done to let the subclass of parameter
be that the parameter
of TPM can preferentially be set to
before at
by strict restriction like this.
3) generation publisher's parameter
; For each
; Step below carrying out: select two random integers:
, publisher's private key
.Calculate then
and
, publisher's PKI
is set to
.Then; Open parameters through the publisher derives
; Finally; For each publisher
,
is set to
.
4) generate the TPM parameter.According to the endorsement key that self embeds, TPM generates a pair of public and private key:
.In addition, TPM also will generate a privately owned secret data
.Finally; For the corresponding main frame
of each TPM, its open parameters
is set to
.
Step 2:The mobile service certificate center sends common parameter and the certificate that agreement needs to portable terminal and mobile service server.
Step 3:The part that joins request of operation DAA agreement adds the TPM module that agreement operates in given portable terminal between portable terminal and the mobile service certificate center
, mobile terminal host
, and the mobile service certificate center
Between.
1) promoter: send request by the mobile service certificate center, calculate as follows simultaneously:
2) after mobile terminal host is received this message, transmit to the TPM that is embedded in wherein.
3) after TPM receives message, respond, and carry out following computing:
4) the TPM module is sent message
to mobile terminal host; After mobile terminal host is received message, send message
to the mobile service certificate center through the GPRS/3G network;
5) the mobile service certificate center is received above-mentioned message, carries out following computing:
If
that the mobile service certificate center is preserved be not in the message of receiving; Stop computing so, the operation of terminate agreement.Otherwise calculate as follows:
; if
; Then stop computing, and the operation of termination protocol.Otherwise calculate as follows:
if
; Stop computing so, the operation of terminate agreement.Otherwise, carry out following computing:
For
in all revocation lists; if
, the operation of terminate agreement so.Otherwise carry out following computing:
6) after mobile terminal host is received this message, therefrom extract B, send B to TPM.After TPM receives message B; Calculate
, send D to the mobile service certificate center then.
7) after the mobile service certificate center is received D, carry out following computing:
Step 4:When the user got into the NFC label area, the user pressed close to label to portable terminal, can comprise various contents in the label, and portable terminal reads the content in the NFC label through the NFC passage, and for example placard, discount information, admission ticket are bought website etc.After having read information, portable terminal connects the website that mobile service can be provided through the GPRS/3G network, moves signature algorithm simultaneously, calculates anonymous signature.Initiate the operation of DAA-TLS agreement by portable terminal.
Step 6:The mobile service server
Select random number
, select secret value at random
, calculate
, right
With the computing of signing of the private key of server, obtain
, then to portable terminal I send message (
).
Step 7: after client I receives message, select secret value at random
, calculate
, the PKI that utilizes server is to signature
Verify that checking is calculated through the back
, utilize the DAA private key that client is sent and all message of receiving are done the signature computing, obtain
, send message to server
, wherein
Identify label as client.Wherein, the detailed process of utilizing the DAA private key that transmission message is signed is following:
1) if
;
so, otherwise
.Wherein,
expression basic platform title is a property value that has creditable calculation modules equipment.Calculate
;
;
;
;
,
; TPM module in being embedded in portable terminal is sent order
.After TPM receives above-mentioned message; Carry out following computing:
;
,
;
,
;
,
;
2) TPM sends message
to mobile terminal host; After mobile terminal host is received message; The data of grasping according to oneself with receive that the content of message carries out following computing:
, just final
signature value that generates.
Step 8:The mobile service server terminal is verified signature after receiving this message, if checking is passed through; Just can generate the original material of session key; And then, accomplish the generation of final session key according to the tls protocol standard, concrete steps can be with reference to the tls protocol standard.
Process to anonymous signature verification is following: cancel the private key
in the tabulation for all; If
returns authentication failed so.If
and
returns authentication failed.If
be
perhaps, return authentication failed.Calculate
;
;
;
,
.if
; Return signature verification failure, if equate then return the signature verification success.
Claims (2)
1. can protect the client that possesses the NFC communication function with the confidentiality of communicating by letter between the server for one kind; Can protect simultaneously protection mobile client communication security and the method for privacy function of the privacy of identities of client again; It is characterized in that: combine the direct same Transport Layer Security of anonymous authentication agreement (DAA) (TLS); Utilize the DAA protocol protection to possess the privacy of identities of the client of NFC function, utilize the confidentiality of communicating by letter between tls protocol protection client and the server simultaneously; Possess the server website information in the client reading tag of NFC communication function, Connection Service device network address is utilized the tls protocol that operation was revised between described client and the server, realizes the protection to client identity privacy and communication security; Described DAA agreement adopts elliptic curve cipher technology (ECC) to realize that client has the DAA certificate, can accomplish signature; The described modification that Handshake Protocol in the tls protocol is partly carried out is following, replaces the client identity that sends in the general T LS agreement with a nonce that produces in the identity at certificate issuance center and the key exchange process.
2. method of protecting mobile client communication security and privacy function, it is characterized in that: concrete steps are following:
Step 1: the mobile service certificate center is responsible for the granting of a plurality of mobile service security protocol parameters; This center operation initialization algorithm; For portable terminal and mobile service server generate various essential parameters, also send public key certificate simultaneously to the mobile service server:
1), generates promise parameter
: in this step; Selection has enough three crowds
of big Prime Orders; Generator makes
for crowd
selects respectively at random;
; Simultaneously, also to select a bilinear mappings:
; Next be to select random Harsh function
,
;
; The last arithmetic operation of TPM in crowd
, is let the subclass of parameter
be that the parameter
of TPM preferentially is set to
before at
by strict restriction;
3), generate publisher's parameter
; For each
; Step below carrying out: select two random integers:
; Publisher's private key
; Calculate then
and
; Publisher's PKI
is set to
; Then; Open parameters through the publisher derives
; Finally; For each publisher
,
is set to
;
4), generate the TPM parameter: according to the endorsement key that self embeds, TPM generates a pair of public and private key:
; In addition, TPM also will generate a privately owned secret data
; Finally; For the corresponding main frame
of each TPM, its open parameters
is set to
;
Step 2: the mobile service certificate center sends common parameter and the certificate that agreement needs to portable terminal and mobile service server;
Step 3: the part that joins request of operation DAA agreement between portable terminal and the mobile service certificate center; The adding agreement operates in the TPM module
of given portable terminal; Mobile terminal host
, and between the mobile service certificate center
;
1), promoter: send request by the mobile service certificate center, calculate as follows simultaneously:
2), after mobile terminal host receives this message, transmit to the TPM that is embedded in wherein;
3), after TPM receives message, respond, and carry out following computing:
if
; Then think and mistake occurred; Stop computing; Otherwise, calculate following steps:
1), the TPM module is sent message
to mobile terminal host; After mobile terminal host is received message, send message
to the mobile service certificate center through the GPRS/3G network;
2), the mobile service certificate center receives above-mentioned message, carries out following computing:
If
that the mobile service certificate center is preserved be not in the message of receiving; Stop computing so, the operation of terminate agreement; Otherwise calculate as follows:
; if
; Then stop computing, and the operation of termination protocol; Otherwise calculate as follows:
if
; Stop computing so; The operation of terminate agreement; Otherwise, carry out following computing:
For
in all revocation lists; if
; The operation of terminate agreement so, otherwise carry out following computing:
3) after, mobile terminal host is received this message; Therefrom extract B; Send B to TPM; After TPM receives message B, calculate
, send D to the mobile service certificate center then;
4), after the mobile service certificate center receives D, carry out following computing:
Step 4: when the user gets into the NFC label area; The user presses close to label to portable terminal, and portable terminal reads the content in the NFC label through the NFC passage, read information after; Portable terminal connects the website that mobile service can be provided through the GPRS/3G network; Move signature algorithm simultaneously, calculate anonymous signature, initiate the operation of DAA-TLS agreement by portable terminal;
Step 6: mobile service server
is selected random number
; Select secret value
at random; Calculate
; To
with the computing of signing of the private key of server; Obtain
, send message (
) to portable terminal I then;
Step 7: after client I receives message; Select secret value
at random; Calculate
; Utilize the PKI of server that signature
is verified; Checking is through
calculated in the back; All message of utilizing the DAA private key that client is sent and receiving are done the signature computing; Obtain
; Send message
to server;
wherein is as the identify label of client; Wherein, the detailed process of utilizing the DAA private key that transmission message is signed is following:
1) if
;
so; Otherwise
; Wherein,
expression basic platform title; It is a property value that has creditable calculation modules equipment; Calculate
;
;
;
;
,
; TPM module in being embedded in portable terminal is sent order
; After TPM receives above-mentioned message; Carry out following computing:
;
,
;
,
;
,
;
2), TPM sends message
to mobile terminal host; After mobile terminal host is received message; The data of grasping according to oneself with receive that the content of message carries out following computing:
, final
signature value that generates;
Step 8: the mobile service server terminal is verified signature after receiving this message, if checking is passed through, just generates the original material of session key, and then, accomplishes the generation of final session key according to the tls protocol standard,
Process to anonymous signature verification is following: cancel the private key
in the tabulation for all; If
returns authentication failed so; If
and
returns authentication failed; If
be
perhaps, return authentication failed; Calculate
;
;
;
,
; if
; Return signature verification failure, if equate then return the signature verification success.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102598824A CN102761556A (en) | 2012-07-26 | 2012-07-26 | Method to protect communication security and privacy function of mobile client |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102598824A CN102761556A (en) | 2012-07-26 | 2012-07-26 | Method to protect communication security and privacy function of mobile client |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102761556A true CN102761556A (en) | 2012-10-31 |
Family
ID=47055877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012102598824A Pending CN102761556A (en) | 2012-07-26 | 2012-07-26 | Method to protect communication security and privacy function of mobile client |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102761556A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475473A (en) * | 2013-08-26 | 2013-12-25 | 广东数字证书认证中心有限公司 | Digital signature method, digital signature equipment, password operation method in digital signature, and server |
CN107743066A (en) * | 2017-11-07 | 2018-02-27 | 中证技术股份有限公司 | A kind of anonymity signature method and system supervised |
CN110012097A (en) * | 2019-04-04 | 2019-07-12 | 苏州足加新能源科技有限公司 | Communication means between charging pile client and charging pile server |
CN110677240A (en) * | 2019-08-29 | 2020-01-10 | 阿里巴巴集团控股有限公司 | Method and device for providing high-availability computing service through certificate issuing |
US10790979B1 (en) | 2019-08-29 | 2020-09-29 | Alibaba Group Holding Limited | Providing high availability computing service by issuing a certificate |
CN112116475A (en) * | 2020-09-22 | 2020-12-22 | 中国科学院沈阳计算技术研究所有限公司 | Block chain-based distributed data transaction method and system |
CN113315788A (en) * | 2021-07-28 | 2021-08-27 | 北京电信易通信息技术股份有限公司 | Lightweight protection method and system for sensitive data of video conference mobile terminal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101146126A (en) * | 2006-09-14 | 2008-03-19 | 索尼株式会社 | Wireless communication system, wireless communication device, authentication method and program thereof |
CN101482957A (en) * | 2007-12-21 | 2009-07-15 | 北京大学 | Credible electronic transaction method and transaction system |
-
2012
- 2012-07-26 CN CN2012102598824A patent/CN102761556A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101146126A (en) * | 2006-09-14 | 2008-03-19 | 索尼株式会社 | Wireless communication system, wireless communication device, authentication method and program thereof |
CN101482957A (en) * | 2007-12-21 | 2009-07-15 | 北京大学 | Credible electronic transaction method and transaction system |
Non-Patent Citations (3)
Title |
---|
CHRISTIAN WACHSMANN 等: "Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices", 《13TH INTERNATIONAL CONFERENCE,ISC 2010》 * |
EMANUELE CESENA 等: "Anonymous Authentication with TLS and DAA", 《TRUST 2010,LNCS》 * |
LIQUN CHEN 等: "On the Design and Implementation of an efficient DAA Scheme", 《9TH IFIP WG 8.8/11.2 INTERNATIONAL CONFERENCE,CARDIS 2010》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475473A (en) * | 2013-08-26 | 2013-12-25 | 广东数字证书认证中心有限公司 | Digital signature method, digital signature equipment, password operation method in digital signature, and server |
CN103475473B (en) * | 2013-08-26 | 2016-10-05 | 数安时代科技股份有限公司 | Crypto-operation method and server in digital signature method and equipment, digital signature |
CN107743066A (en) * | 2017-11-07 | 2018-02-27 | 中证技术股份有限公司 | A kind of anonymity signature method and system supervised |
CN110012097A (en) * | 2019-04-04 | 2019-07-12 | 苏州足加新能源科技有限公司 | Communication means between charging pile client and charging pile server |
CN110677240A (en) * | 2019-08-29 | 2020-01-10 | 阿里巴巴集团控股有限公司 | Method and device for providing high-availability computing service through certificate issuing |
CN110677240B (en) * | 2019-08-29 | 2020-07-10 | 阿里巴巴集团控股有限公司 | Method, apparatus and medium for providing highly available computing services through certificate issuance |
US10790979B1 (en) | 2019-08-29 | 2020-09-29 | Alibaba Group Holding Limited | Providing high availability computing service by issuing a certificate |
US10972272B2 (en) | 2019-08-29 | 2021-04-06 | Advanced New Technologies Co., Ltd. | Providing high availability computing service by issuing a certificate |
US11206137B2 (en) | 2019-08-29 | 2021-12-21 | Advanced New Technologies Co., Ltd. | Providing high availability computing service by issuing a certificate |
CN112116475A (en) * | 2020-09-22 | 2020-12-22 | 中国科学院沈阳计算技术研究所有限公司 | Block chain-based distributed data transaction method and system |
CN112116475B (en) * | 2020-09-22 | 2023-07-04 | 中国科学院沈阳计算技术研究所有限公司 | Distributed data transaction method and system based on blockchain |
CN113315788A (en) * | 2021-07-28 | 2021-08-27 | 北京电信易通信息技术股份有限公司 | Lightweight protection method and system for sensitive data of video conference mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qin et al. | A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing | |
CN109067539B (en) | Alliance chain transaction method, alliance chain transaction equipment and computer readable storage medium | |
CA2701055C (en) | Method of providing assured transactions using secure transaction appliance and watermark verification | |
CN108234115B (en) | Information security verification method, device and system | |
CN102761556A (en) | Method to protect communication security and privacy function of mobile client | |
Liu et al. | State of the art: Secure mobile payment | |
CN103546567B (en) | Without certificate cross-domain authentication method in a kind of credible cloud computing environment | |
CN109064324A (en) | Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain | |
CN108366069A (en) | A kind of mutual authentication method and system | |
CN101183439A (en) | Electronic bill processing system and processing method | |
CN104184588B (en) | The undetachable digital signatures method of identity-based | |
Chen et al. | A secure and efficient key authentication using bilinear pairing for NFC mobile payment service | |
KR101879758B1 (en) | Method for Generating User Digital Certificate for Individual User Terminal and for Authenticating Using the Same Digital Certificate | |
CN102118251A (en) | Security authentication method for internet banking remote payment based on multi-interface intelligent safety card | |
Saranya et al. | Efficient mobile security for E health care application in cloud for secure payment using key distribution | |
CN102710611A (en) | Network security authentication method and system | |
Gkaniatsou et al. | Low-level attacks in bitcoin wallets | |
CN112435026B (en) | Method and device for protecting file transaction information by using zero-knowledge proof and electronic equipment | |
CN102694781A (en) | Internet-based system and method for security information interaction | |
Shao et al. | IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT | |
Yeh et al. | A robust mobile payment scheme with smart contract-based transaction repository | |
Chang et al. | A secure and efficient authentication scheme for e-coupon systems | |
Saraswat et al. | UpHaaR: Blockchain-based charity donation scheme to handle financial irregularities | |
CN104320253A (en) | Two-dimension code authentication system and method based on CBS signature mechanism | |
CN103281180B (en) | User is protected to access the bill generation method of privacy in a kind of network service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121031 |