CN105553979A - Encryption publishing method for privacy information in smart power grid - Google Patents

Encryption publishing method for privacy information in smart power grid Download PDF

Info

Publication number
CN105553979A
CN105553979A CN201510933323.0A CN201510933323A CN105553979A CN 105553979 A CN105553979 A CN 105553979A CN 201510933323 A CN201510933323 A CN 201510933323A CN 105553979 A CN105553979 A CN 105553979A
Authority
CN
China
Prior art keywords
user
information
key
privacy
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510933323.0A
Other languages
Chinese (zh)
Inventor
张涛
周诚
汪晨
李伟伟
何高峰
邵志鹏
张波
管小娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Tianjin Electric Power Co Ltd
Smart Grid Research Institute of SGCC
Original Assignee
State Grid Corp of China SGCC
State Grid Tianjin Electric Power Co Ltd
Smart Grid Research Institute of SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Tianjin Electric Power Co Ltd, Smart Grid Research Institute of SGCC filed Critical State Grid Corp of China SGCC
Priority to CN201510933323.0A priority Critical patent/CN105553979A/en
Publication of CN105553979A publication Critical patent/CN105553979A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an encryption publishing method for privacy information in a smart power grid. The method comprises the following steps: registering to a social network through a user, and verifying user information; performing key management on the user information; establishing a two-level privacy information word library; and operating a friend list and publishing information. Through adoption of the method provided by the invention, the user is automatically prompted to protect personal privacy information; the personal safety of the user can be ensured practically; and visitors of the social network are increased. The privacy information of the user is encrypted, and a public key is relevant to user identity information and easy to acquire, so that trouble in generating a key, managing the key and authenticating the public key and user consistency by a trusted third party is omitted compared with other public-key cryptosystems. Meanwhile, overhead caused by a public-key cryptosystem encryption algorithm is saved.

Description

The encryption dissemination method of privacy information in a kind of intelligent grid
Technical field
The present invention relates to network security and anonymous communication field, be specifically related to the encryption dissemination method of privacy information in a kind of intelligent grid.
Background technology
21 century whole world intelligent grid construction high speed development, electric network data rapid expanding.Convenient and swift along with network, the information such as word, picture, sound, video can exchange and propagate by user more fast, popularizing especially along with various intelligent terminal, user's line duration gets more and more, the information content spread through the internet is more and more abundanter, and in intelligent grid, various social networks, forum etc. just merge with real world.
Instantly China is under the environment of intelligent grid building-up work iterative method and development; the important leverage basis of smart grid security stable operation is then the safety of information; especially, after entering large data age, the large data security in intelligent grid and Privacy Protection highlight day by day.If can not effectively solve existing safety problem and take precautions against potential security risk, the Intelligent Process of China's electrical network certainly will will be had influence on.
The essence of social networks, forum is exactly by human relation network, and the open system that the information flowed on this relational network is formed.Two most important attributes in relation and information structure social networks, the maintenance of relation and the degree of opening of information, safety become and ensure social networks safety two large key factors.
Summary of the invention
In view of this, the encryption dissemination method of privacy information in a kind of intelligent grid provided by the invention, the method achieves automatically prompting user protection individual privacy information, conscientiously can ensure the personal security of user, increase the number of visiting people of social network sites; The privacy information of user is encrypted, and public-key cryptography is relevant to subscriber identity information, easy acquisition, relatively in other public-key encryptosystems, saves the conforming trouble being produced key, managing keys, certification public-key cryptography and user by trusted third party; Save the expense brought due to public-key encryptosystem cryptographic algorithm simultaneously.
The object of the invention is to be achieved through the following technical solutions:
An encryption dissemination method for privacy information in intelligent grid, described method comprises the steps:
Step 1. user registers at social networks and verifies its user profile;
Step 2. carries out key management to described user profile;
Step 3. sets up two-stage privacy information dictionary;
Step 4. operates buddy list;
Step 5. releases news.
Preferably, described step 1 comprises:
1-1. user registers its user profile at social networks;
1-2., according to the application of described social networks and level of security, judges that described information is real name information or non-real name information;
1-3. is the safe class of real name information or non-real name information according to described information, carries out note or mailbox checking to described information.
Preferably, described step 2 comprises:
Key management is issued one to one to described user profile, adds friend group issue key management or key management is published to everyone.
Preferably, the described key management of issue one to one comprises:
A. information sender user is by the public key encryption privacy information of receiving party user; Wherein, the public-key cryptography of described receiving party user is described receiving party's user ID;
B. described information sender user issues the described privacy information after encryption;
C. described receiving party user deciphers described privacy information with the secret key of individual private possession.
Preferably, add friend group issue key management described in comprise:
D. a pair public-key cryptography and private cipher key is issued for each friend group; Wherein, described public-key cryptography is group number, and private cipher key is generated by server and secret is sent to each crowd of users;
E. user's application adds friend group;
F. user receives and invites into group information and public key; Wherein, described public key is group number;
G. judge whether described user adheres to friend group;
If so, then generate the privately owned secret key of secret transmission by described server, enter step h;
If not, step 3 is entered;
H. described user becomes described group user; Described group user uses public key encryption privacy information, uses private cipher key decryption information.
Preferably, describedly key management published to everyone comprise:
Adopting random key encryption privacy information, all checking with having permission per family.
Preferably, described step 3 comprises:
Set up two-stage privacy dictionary to comprise and set up one-level privacy dictionary and set up secondary privacy dictionary;
Described one-level privacy dictionary comprises server and recommends word; Described server recommends word to be the keyword comprising privacy information that server is recommended;
Described secondary privacy dictionary comprises user's perfect information; Described user's perfect information comprises text message, picture, audio frequency and the video information that user adds, deletes or revises.
Preferably, described step 4 comprises:
Its good friend user is added into buddy list, deletes the user that loses faith in or set up friend group by described user.
Preferably, described friend group of setting up comprises:
I. judge whether user sets up friend group;
If so, then apply for group number, enter step j;
If not, then step 5 is entered;
J. described group number is set to public key, server sends privately owned secret key;
K. good friend is invited to enter group;
L. with described public key encryption privacy information, step 5 is entered.
Preferably, described step 5 comprises:
According to described privacy information dictionary, relate to the Partial encryption of privacy in the information that will issue, do not relate to the part of non-privacy and adopt mode expressly to issue.
As can be seen from above-mentioned technical scheme, the invention provides the encryption dissemination method of privacy information in a kind of intelligent grid, the method to be registered at social networks by user and is verified its user profile; Key management is carried out to user profile; Set up two-stage privacy information dictionary; Operate buddy list and release news.The method that the present invention proposes achieves automatically prompting user protection individual privacy information, conscientiously can ensure the personal security of user, increase the number of visiting people of social network sites; The privacy information of user is encrypted, and public-key cryptography is relevant to subscriber identity information, easy acquisition, relatively in other public-key encryptosystems, saves the conforming trouble being produced key, managing keys, certification public-key cryptography and user by trusted third party; Save the expense brought due to public-key encryptosystem cryptographic algorithm simultaneously.
With immediate prior art ratio, technical scheme provided by the invention has following excellent effect:
1, in technical scheme provided by the present invention, by setting up two-stage privacy information dictionary, automatically prompting user protection individual privacy information, conscientiously ensures the personal security of user, increases the number of visiting people of social network sites.
2, technical scheme provided by the present invention, the public-key encryptosystem of identity-based information is applied in social networks, the privacy information of user is encrypted, and public-key cryptography is relevant to subscriber identity information, easy acquisition, relatively in other public-key encryptosystems, save the conforming trouble being produced key, managing keys, certification public-key cryptography and user by trusted third party.
3, technical scheme provided by the present invention, in order to save the expense brought due to public-key encryptosystem cryptographic algorithm, good friend's listing function is safeguarded in this patent increase, for the good friend that trusting degree is high, user can select not encryption, otherwise, low for trusting degree, or stranger, user can select important privacy information to encrypt.
4, technical scheme provided by the invention, is widely used, and has significant Social benefit and economic benefit.
Accompanying drawing explanation
Fig. 1 is the flow chart of the encryption dissemination method of privacy information in a kind of intelligent grid of the present invention;
Fig. 2 is the schematic flow sheet of step 1 in encryption dissemination method of the present invention;
Fig. 3 is the encryption schematic diagram of the intimacy protection system released news in a kind of intelligent grid of the present invention;
Fig. 4 is that new user of the present invention obtains cipher key processes and the flow chart that releases news first;
Fig. 5 of the present inventionly newly enters crowd user and obtains cipher key processes and the flow chart that releases news first.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on embodiments of the invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 1, the invention provides the encryption dissemination method of privacy information in a kind of intelligent grid, comprise the steps:
Step 1. user registers at social networks and verifies its user profile;
Step 2. pair user profile carries out key management;
Step 3. sets up two-stage privacy information dictionary;
Step 4. operates buddy list;
Step 5. releases news.
As shown in Figure 2, step 1 comprises:
1-1. user registers its user profile at social networks;
1-2. is according to the application of social networks and level of security, and judgement information is real name information or non-real name information;
1-3. is the safe class of real name information or non-real name information according to information, carries out note or mailbox checking to information.
Wherein, carry out key management to user profile to comprise: issue key management one to one to user profile, add friend group issue key management or publish key management to everyone.
Wherein, issue key management one to one to comprise:
A. information sender user is by the public key encryption privacy information of receiving party user; Wherein, the public-key cryptography of receiving party user is receiving party's user ID;
B. information sender user issues the privacy information after encryption;
C. receiving party user deciphers privacy information with the secret key of individual private possession.
Wherein, add friend group issue key management to comprise:
D. a pair public-key cryptography and private cipher key is issued for each friend group; Wherein, public-key cryptography is group number, and private cipher key is generated by server and secret is sent to each crowd of users;
E. user's application adds friend group;
F. user receives and invites into group information and public key; Wherein, public key is group number;
G. judge whether user adheres to friend group;
If so, then generate the privately owned secret key of secret transmission by server, enter step h;
If not, step 3 is entered;
H. user becomes crowd user; Group user uses public key encryption privacy information, uses private cipher key decryption information.
Wherein, publish key management to everyone to comprise:
Adopting random key encryption privacy information, all checking with having permission per family.
Wherein, two-stage privacy dictionary comprises one-level privacy dictionary and secondary privacy dictionary;
One-level privacy dictionary comprises server and recommends word; Server recommends word to be the keyword comprising privacy information that server is recommended;
Secondary privacy dictionary comprises user's perfect information; User's perfect information comprises text message, picture, audio frequency and the video information that user adds, deletes or revises.
Wherein, operate buddy list to comprise: its good friend user is added into buddy list, deletes the user that loses faith in or set up friend group by user.
Wherein, set up friend group to comprise:
I. judge whether user sets up friend group;
If so, then apply for group number, enter step j;
If not, then step 5 is entered;
J. group number is set to public key, server sends privately owned secret key;
K. good friend is invited to enter group;
L. encrypt privacy information by public key, enter step 5.
Wherein, release news and comprise:
According to privacy information dictionary, relate to the Partial encryption of privacy in the information that will issue, do not relate to the part of non-privacy and adopt mode expressly to issue.
The invention provides the embody rule example of the encryption dissemination method of privacy information in a kind of intelligent grid, specific as follows:
From the viewpoint of relation and information two, the intimacy protection system released news in a kind of intelligent grid is proposed.This system mainly comprises following step, as shown in Figure 3:
Concrete steps:
(1) information of registered users.According to application and the level of security of social networks, user's registration information can be divided into real name and non-real name two class, determines the need of note or mailbox checking according to demand for security.
(2) key management.Because the present invention uses the public-key encryptosystem encryption privacy information of identity-based information, relate to key management link.Consider that social networks releases news and be divided into following several situation: distribute one to one, friend group is issued and everyone is published, discuss one by one below:
I) distribute one to one: send the public-key cryptography of user with reception user, i.e. user ID, encryption privacy information is issued, and receives user and is decrypted information with individual private key.
II) friend group is issued: be each mass-sending cloth a pair public-key cryptography and private cipher key, public-key cryptography is group number, private cipher key is generated by background server and secret is sent to each crowd of users, in this group, each user has public-key cryptography and the private cipher key of group simultaneously, use public key encryption privacy information, use private cipher key decryption information.New user and Xin enter crowd user and obtain cipher key processes and the flow process that releases news first respectively as shown in Figure 4 and Figure 5.
III) everyone is published: take random key to encrypt privacy information, any user can check, but cannot decipher for privacy information, can only obtain ciphertext form.
(3) two-stage privacy information dictionary is set up.Set up privacy information dictionary object not revealed unintentionally at utmost protect individual subscriber privacy information.Arrange the mode of two-stage privacy dictionary, one-level privacy dictionary is based on server is recommended, and secondary privacy dictionary comes perfect by user's interpolation, deletion, amendment.Server is recommended can based on some common privacy informations, such as common name, " Wang Yong ", " Zhang Hong "; " be born in "; " work unit "; " home address "; " so-and-so producer "; The keyword of privacy information may be there is in " so-and-so brand power equipment " etc.The keyword that server just recommends part common, more needs user perfect voluntarily.Except text message, the multimedia messages such as picture, audio frequency, video of some sensitivities also can be added into secondary privacy dictionary by user.
(4) buddy list is safeguarded.User adds familiar good friend user voluntarily, or deletes the user lost faith in, and also can set up group, invites good friend to enter group, release group information.
(5) Information issued.Once establish privacy information dictionary, can, by the privacy information that relates in information according to different reception objects, adopt the method in above-mentioned steps (2) to be encrypted, other non-privacy informations adopt mode expressly to issue.
Above embodiment is only in order to illustrate that technical scheme of the present invention is not intended to limit; although with reference to above-described embodiment to invention has been detailed description; those of ordinary skill in the field still can modify to the specific embodiment of the present invention or equivalent replacement; and these do not depart from any amendment of spirit and scope of the invention or equivalent replacement, it is all being applied within the claims of the present invention awaited the reply.

Claims (10)

1. the encryption dissemination method of privacy information in intelligent grid, it is characterized in that, described method comprises the steps:
Step 1. user registers at social networks and verifies its user profile;
Step 2. carries out key management to described user profile;
Step 3. sets up two-stage privacy information dictionary;
Step 4. operates buddy list;
Step 5. releases news.
2. the method for claim 1, is characterized in that, described step 1 comprises:
1-1. user registers its user profile at social networks;
1-2., according to the application of described social networks and level of security, judges that described information is real name information or non-real name information;
1-3. is the safe class of real name information or non-real name information according to described information, carries out note or mailbox checking to described information.
3. the method for claim 1, is characterized in that, described step 2 comprises:
Key management is issued one to one to described user profile, adds friend group issue key management or key management is published to everyone.
4. method as claimed in claim 3, is characterized in that, the described key management of issue one to one comprises:
A. information sender user is by the public key encryption privacy information of receiving party user; Wherein, the public-key cryptography of described receiving party user is described receiving party's user ID;
B. described information sender user issues the described privacy information after encryption;
C. described receiving party user deciphers described privacy information with the secret key of individual private possession.
5. method as claimed in claim 3, is characterized in that, described in add friend group and issue key management and comprise:
D. a pair public-key cryptography and private cipher key is issued for each friend group; Wherein, described public-key cryptography is group number, and private cipher key is generated by server and secret is sent to each crowd of users;
E. user's application adds friend group;
F. user receives and invites into group information and public key; Wherein, described public key is group number;
G. judge whether described user adheres to friend group;
If so, then generate the privately owned secret key of secret transmission by described server, enter step h;
If not, step 3 is entered;
H. described user becomes described group user; Described group user uses public key encryption privacy information, uses private cipher key decryption information.
6. method as claimed in claim 3, is characterized in that, describedly publishes key management to everyone and comprises:
Adopting random key encryption privacy information, all checking with having permission per family.
7. the method for claim 1, is characterized in that, described step 3 comprises:
Set up two-stage privacy dictionary to comprise and set up one-level privacy dictionary and set up secondary privacy dictionary;
Described one-level privacy dictionary comprises server and recommends word; Described server recommends word to be the keyword comprising privacy information that server is recommended;
Described secondary privacy dictionary comprises user's perfect information; Described user's perfect information comprises text message, picture, audio frequency and the video information that user adds, deletes or revises.
8. the method for claim 1, is characterized in that, described step 4 comprises:
Its good friend user is added into buddy list, deletes the user that loses faith in or set up friend group by described user.
9. method as claimed in claim 8, it is characterized in that, described friend group of setting up comprises:
I. judge whether user sets up friend group;
If so, then apply for group number, enter step j;
If not, then step 5 is entered;
J. described group number is set to public key, server sends privately owned secret key;
K. good friend is invited to enter group;
L. with described public key encryption privacy information, step 5 is entered.
10. the method for claim 1, is characterized in that, described step 5 comprises:
According to described privacy information dictionary, relate to the Partial encryption of privacy in the information that will issue, do not relate to the part of non-privacy and adopt mode expressly to issue.
CN201510933323.0A 2015-12-15 2015-12-15 Encryption publishing method for privacy information in smart power grid Pending CN105553979A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510933323.0A CN105553979A (en) 2015-12-15 2015-12-15 Encryption publishing method for privacy information in smart power grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510933323.0A CN105553979A (en) 2015-12-15 2015-12-15 Encryption publishing method for privacy information in smart power grid

Publications (1)

Publication Number Publication Date
CN105553979A true CN105553979A (en) 2016-05-04

Family

ID=55832915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510933323.0A Pending CN105553979A (en) 2015-12-15 2015-12-15 Encryption publishing method for privacy information in smart power grid

Country Status (1)

Country Link
CN (1) CN105553979A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360450A (en) * 2017-08-15 2017-11-17 浙江工商大学 A kind of kindergarten education net cast platform for protecting privacy of user
CN107690079A (en) * 2017-08-15 2018-02-13 浙江工商大学 Privacy of user guard method in live platform
CN107707510A (en) * 2016-08-09 2018-02-16 北京奇虎科技有限公司 A kind of information-pushing method, apparatus and system
CN108256345A (en) * 2016-12-28 2018-07-06 中移(杭州)信息技术有限公司 A kind of picture method for secret protection, apparatus and system
CN110532792A (en) * 2019-08-29 2019-12-03 冷杉云(北京)科技股份有限公司 A kind of inspection method and system of privacy information
CN111767576A (en) * 2020-06-30 2020-10-13 深圳前海微众银行股份有限公司 User matching method and system based on privacy information and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139314A1 (en) * 2000-06-15 2004-07-15 Cook David P. Automatic delivery selection for electronic content
CN102710623A (en) * 2012-05-23 2012-10-03 中国电力科学研究院 Intelligent grid electricity information privacy protection method based on multi-party interaction
CN103067918A (en) * 2012-12-25 2013-04-24 华为技术有限公司 Method, device and system of privacy data anonymization in communication network
CN103780457A (en) * 2014-01-02 2014-05-07 东南大学 Mobile intelligent terminal safety detection method based on boundary detection
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN105072180A (en) * 2015-08-06 2015-11-18 武汉科技大学 Cloud storage data security sharing method with permission time control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139314A1 (en) * 2000-06-15 2004-07-15 Cook David P. Automatic delivery selection for electronic content
CN102710623A (en) * 2012-05-23 2012-10-03 中国电力科学研究院 Intelligent grid electricity information privacy protection method based on multi-party interaction
CN103067918A (en) * 2012-12-25 2013-04-24 华为技术有限公司 Method, device and system of privacy data anonymization in communication network
CN103780457A (en) * 2014-01-02 2014-05-07 东南大学 Mobile intelligent terminal safety detection method based on boundary detection
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN105072180A (en) * 2015-08-06 2015-11-18 武汉科技大学 Cloud storage data security sharing method with permission time control

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707510A (en) * 2016-08-09 2018-02-16 北京奇虎科技有限公司 A kind of information-pushing method, apparatus and system
CN107707510B (en) * 2016-08-09 2020-11-10 北京奇虎科技有限公司 Information pushing method, device and system
CN108256345A (en) * 2016-12-28 2018-07-06 中移(杭州)信息技术有限公司 A kind of picture method for secret protection, apparatus and system
CN107360450A (en) * 2017-08-15 2017-11-17 浙江工商大学 A kind of kindergarten education net cast platform for protecting privacy of user
CN107690079A (en) * 2017-08-15 2018-02-13 浙江工商大学 Privacy of user guard method in live platform
CN110532792A (en) * 2019-08-29 2019-12-03 冷杉云(北京)科技股份有限公司 A kind of inspection method and system of privacy information
CN110532792B (en) * 2019-08-29 2022-03-15 冷杉云(北京)科技股份有限公司 Method and system for checking privacy information
CN111767576A (en) * 2020-06-30 2020-10-13 深圳前海微众银行股份有限公司 User matching method and system based on privacy information and readable storage medium

Similar Documents

Publication Publication Date Title
He et al. Certificateless public key authenticated encryption with keyword search for industrial internet of things
Choudhury et al. A strong user authentication framework for cloud computing
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN105553979A (en) Encryption publishing method for privacy information in smart power grid
Xi et al. ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV
US20190356496A1 (en) Public Key Infrastructure & Method of Distribution
CN106301788A (en) A kind of group key management method supporting authenticating user identification
Zhang et al. Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks
CN109962924B (en) Group chat construction method, group message sending method, group message receiving method and system
Yuan et al. EIMAKP: Heterogeneous cross-domain authenticated key agreement protocols in the EIM system
Anand et al. EECDH to prevent MITM attack in cloud computing
CN115396115B (en) Block chain data privacy protection method, device, equipment and readable storage medium
CN111049649A (en) Zero-interaction key negotiation security enhancement protocol based on identification password
CN114417309A (en) Bidirectional identity authentication method, device, equipment and storage medium
Wanda et al. Efficient message security based Hyper Elliptic Curve Cryptosystem (HECC) for mobile instant messenger
CN107104888B (en) Safe instant messaging method
Chai et al. Efficient password-based authentication and key exchange scheme preserving user privacy
KR101760376B1 (en) Terminal and method for providing secure messenger service
Shin et al. An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment
CN102387162A (en) Mail server access method and system based on digital certificate
Cho et al. Big data cloud deduplication based on verifiable hash convergent group signcryption
Zhou et al. Chaotic map‐based time‐aware multi‐keyword search scheme with designated server
AlSabah et al. PriviPK: Certificate-less and secure email communication
CN114301612A (en) Information processing method, communication apparatus, and encryption apparatus
Yang et al. High efficiency secure channels for a secure multiparty computation protocol based on signal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160504