CN109889541A - The mobile device authentication method for having anonymous reward distribution and privacy of identities protection - Google Patents
The mobile device authentication method for having anonymous reward distribution and privacy of identities protection Download PDFInfo
- Publication number
- CN109889541A CN109889541A CN201910227277.0A CN201910227277A CN109889541A CN 109889541 A CN109889541 A CN 109889541A CN 201910227277 A CN201910227277 A CN 201910227277A CN 109889541 A CN109889541 A CN 109889541A
- Authority
- CN
- China
- Prior art keywords
- data
- task
- message
- distribution center
- reward distribution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention proposes a kind of mobile device authentication methods for having anonymous reward distribution and privacy of identities protection; the association that anonymous bidirectional authentication protocol for solving the problem of under existing mobile environment can not describe between number and particular user can not achieve reward distribution and exchange.The present invention is accorded with using the temporary identifications that One-way Hash function and Pseudo-Random Number generate data picker as its assumed name, and the reward of specific data picker is generated using Message Authentication Code algorithm;The core verifying information authentication for the concrete application server grasped using benefit redemption center is exchanged the validity of voucher and then is exchanged.The present invention is able to verify that data picker's identity, it can also ensure that the confidentiality of the collected data uploaded simultaneously, the enthusiasm that user acquires related perception data using mobile device can be effectively improved, is needing that there is biggish application value using the application field of mobile device acquisition related data.
Description
Technical field
Have anonymous reward distribution the present invention relates to the technical field of mobile communication more particularly to one kind and privacy of identities is protected
The mobile device authentication method of shield realizes reward distribution function based on cryptography method, elliptic curve cryptography and secure hash function
Energy.
Background technique
With the rapid development of mobile communication technology, the various applications based on mobile Internet are increasingly by the blueness of people
It looks at.Wherein, a kind of smart phone held using large number of ordinary user acquires and uploads data, then by background service
Device data are further processed and generate new service application obtained quick development.This kind of application is also referred to as group
Intelligence aware application.The technology is widely used to the fields such as environmental monitoring, the magnitude of traffic flow and traffic information monitoring at present.Gunz sense
Hownet network provides a kind of completely new solution to complicated ubiquitous depth perception problem, possesses and is widely applied scene and wide
Wealthy application prospect.
However, it is limited to the lazy weight of data picker and the influence that the quality of data collected is irregular, this
The development of class application receives serious influence.For this problem, it is needed in such application by using excitation side appropriate
Formula, is encouraged and stimulus data supplier participates in perception task, and provides the perception of high quality, high reliability as much as possible
Data.However, user's data collected are easy to by illegal point during transmitting due to the open nature of wireless network
Son is intercepted and captured, and may include other privacy informations such as the position of picker oneself in these perception datas, so if picker
The recipient of perception data is distrusted, is also unwilling these perception datas passing to him.That is, perception data
Recipient, which also must be able to be verified its legitimacy, could receive data.Furthermore existing many bonusing methods for this problem
In the process of implementation, the true personal information for generally requiring user could complete the exchange of reward.And it is very quick as user
The privacy information of sense is often unwilling to go out the leakage of personal information of oneself.So needing user to participate in acquisition data
This kind of application face a problem in the process of implementation: how to guarantee that data picker privacy of identities do not reveal
In the case of realize two-way authentication between data picker and data processing server, while data picker can be rewarded
And it is able to carry out exchange.This is the key that this kind of at present using success implementation.
Currently, there are many under mobile network environment the user realized using cryptological technique and server it
Between anonymous bidirectional authentication protocol.This kind of general realization principle of agreement is some public affairs using a public trusted third party
Parameter and relevant secret value are opened, it is exclusive that some user is generated in the way of secure hash function and pseudo random number etc.
Service Ticket.Meanwhile server be also required between trusted third party by secure communication it is more relevant to generate server
Service Ticket.In actual verification process, user and server can be by exchange correlation data, with relevant cryptography thought
(common such as Diffie-Hellman method) makes user and server can use oneself exclusive Service Ticket to test
Demonstrate,prove the legitimacy of other side.There are also some researchers to pass through certain special unidirectional mapping for biological datas such as the fingerprints of human body
The data on another number field are converted thereof into, to realize the anonymity and uniqueness of user.However, this method depends on
The accuracy and reliability of biomedical information acquisition equipment, it is not easy to real on the terminal devices such as daily the held smart phone of people
It is existing.In addition, there are also several researchers have proposed the K- anonymous data gathering algorithms based on user geographical location.The core of this kind of algorithm
Thought want for the accurate geographic position of user to be substituted for include K users with par including the user area
Domain, to realize hiding for user identity.
Anonymous bidirectional authentication protocol under this kind of mobile environment although can be realized user privacy of identities protection and it is two-way
Certification, but it can not describe the association between the number and specific user.Therefore, such methods all cannot achieve prize mostly
The distribution and exchange encouraged.
Summary of the invention
The association between number and particular user can not be described for the anonymous bidirectional authentication protocol under existing mobile environment,
The technical issues of can not achieve reward distribution and exchanging, the present invention propose that one kind has anonymous reward distribution and privacy of identities protection
Mobile device authentication method, can be while realizing anonymous authentication, moreover it is possible to meet reward distribution and exchange function, be applicable in
The anonymous authentication in wireless network environment provides a kind of usability methods to need to implement the application of reward or excitation.
In order to achieve the above object, the technical scheme of the present invention is realized as follows: one kind have anonymous reward distribution and
The mobile device authentication method of privacy of identities protection, its step are as follows:
Step 1: task publication is with reward Distribution Center to used elliptic curve, message authentication code algorithm, Hash letter
Number and the scale of price table of acquisition data are initialized;Task publication is generated with reward Distribution Center using pseudo random number algorithm
Oneself private key and secret value are simultaneously saved, and the public key of oneself is initialized using elliptic curve;
Step 2: several application servers and data picker issue in task and infuse at reward Distribution Center
Volume;
Step 3: it when application server, which generates mobile application, lacks certain categorical data in some region, is sent out to task
Cloth and reward Distribution Center send type, precision and the task requests of position message comprising needing to acquire data;Task publication
With the legitimacy of reward distribution central authentication application server, then adopted to the publication data of region specified by task requests message
Set task;
Step 4: after receiving data acquisition session, data picker acquires data according to the requirement of task requests message
And data collected are passed into application server together with random assumed name generated;
Step 5: application server determines whether data picker is registration user, if it is receives the data, then
It calculates the reward voucher of perception data according to the random assumed name of data picker and reward voucher is returned into corresponding data and adopt
Collection person;If it is not, then return step four;
Step 6: data picker receive reward voucher after, using reward voucher and random assumed name generate benefit redemption with
It demonstrate,proves and is sent to task publication and reward Distribution Center;Task publication is with reward Distribution Center to data picker according to acquisition number
According to scale of price table benefit redemption voucher is cashed.
The method using elliptic curve initialization public key is:
Step S11: task publication selects a big prime number p with reward Distribution Center, and selects what is be made of prime number p to have
Elliptic curve E on confinement GF (p)p(a, b): y1 2=x1 3+ax1+ b and meet 4a3+27b2≠ 0 (mod p), x1And y1It indicates
Elliptic curve EpThe independent variable and dependent variable of (a, b);Then, task publication is with reward Distribution Center in elliptic curve EpOn (a, b)
Choose the basic point P that a rank is q;Wherein, a and b is finite fieldOn constant;
Step S12: task publication generates random number by pseudo random number algorithm with reward Distribution CenterAnd made
For the private key of oneself;Reward Distribution Center calculates its public key P using private key spub=sP;Wherein, finite fieldThen, task publication regenerates random number by pseudo random number algorithm with reward Distribution Center
And secret value x, y are properly saved.
The message authentication algorithm is the comercial message authentication code algorithm of MD5 or SHA-1;In task publication and reward distribution
The hash function of heart selection includes safe hash function h (), Hash function H () and Map-to-point hash function H1
(), and:Wherein, 0 l, 1 character string
Length;The scale of price table is G={ G1, G2..., Gn, G1, G2..., GnIndicate n scale of price;Reward Distribution Center
By the parameter { E of generationp(a,b),P,Ppub, h (), H () } and open.
The register method of the application server are as follows:
Step S1: application server SjBy its identification identifier SIDjIt is sent to task publication and reward Distribution Center;Using
Server SjRandom number is generated using pseudo random number algorithmAnd as the private key of oneself, while utilizing private key ajMeter
Calculate its public key Pj=aj·P;
Step S2: task publication receives application server S with reward Distribution CenterjIdentification identifier SIDjAfterwards, h is calculated
(SIDj| | y) andWherein, y indicates that task publication carries out each application server with reward Distribution Center
Secret value used in authenticating;Task publication distributes center construction with reward and passes through secure communication channel for messagePass to application server Sj;
Step S3: application server SjReceive messageAfterwards, by the message
With private key ajIt is saved, wherein MACk() is message authentication code algorithm, and k is key.
The register method of the data picker are as follows:
Step U1: data picker uiChoose its identifier PIDiAnd corresponding password PWiThen, data picker uiBenefit
Random number is generated with pseudo random number algorithmAnd intermediate variable is calculated using random number bData picker ui
It generates and by registration messageTask publication is passed to by exit passageway to be infused with reward Distribution Center
Volume;
Step U2: it is issued when task and receives data picker u with reward Distribution CenteriRegistration messageAfterwards, following intermediate variable: A is calculatedi=h (PIDi| | x), HAi=h (Ai), Wherein, x indicates task publication and reward score
Hair center carries out authenticating used secret value to each data picker;Then, task publication is centrally generated with reward distribution
Message { Vi,HAi,Bi, and by message { Vi,HAi,BiPass to data picker ui;
Step U3: data picker uiReceive message { Vi,HAi,BiAfter, data picker uiBy message { Vi,HAi,BiIn
Parameter and random number b constitute parameter set { V togetheri,HAi,Bi, b } and save.
The method of application server publication data acquisition session is in the step 3:
Step TR1: application server SjGenerate time stamp TsAnd utilize its private key ajCalculate intermediate variable Dj=H (aj·
Ppub) andApplication server SjGenerate message { TASKs,SIDj,Pj,Qj,Ts, and will disappear
Cease { TASKs,SIDj,Pj,Qj,TsIt is sent to task publication and reward Distribution Center;Wherein, TASKsIt is data acquisition session,
Data acquisition session TASKsIncluding acquire the regional scopes of data, data class and or various types data accuracy rating;
SIDjAnd PjRespectively application server SjIdentification identifier and public key;
Step TR2: task publication receives application server S with reward Distribution CenterjTransmitted data harvesting request
Message { TASKs,SIDj,Pj,Qj,Ts, task publication and reward distribution center calculation intermediate variableAnd judge intermediate variableIt is whether true, such as set up, task publication with
Reward Distribution Center thinks application server SjIt is a legal application server, and calculates intermediate variable Sigj=sH1
(TASKs||SIDj||Ts);Task publication is centrally generated data acquisition session message { TASK with reward distributions,SIDj,Pj,
Sigj,TsAnd data acquisition session message is broadcast to data acquisition session TASKsSpecified region.
The method that data picker acquires data in the step 4 is:
Step TR3: data picker uiReceive data acquisition session message { TASKs,SIDj,Pj,Sigj,TsAfter, it looks into
See whether its equipment has data required by data acquisition session, if had, data picker uiCalculate intermediate variable Pexam
=H1(TASKs||SIDj||Ts) and judge equationIt is whether true, if the equation is set up, number
According to picker uiAccording to data acquisition session TASKsRequirement acquire data;Wherein, PpubIt is issued for task and rewards Distribution Center
Public key;
Step TR4: data picker uiMobile terminal according to data acquisition session TASKsRequirement acquire and generate symbol
Close desired perception data SDATAi;Data picker uiMobile terminal generate time stamp TiAnd utilize time stamp TiWith its body
Part identifier PIDiGenerate random number mr;Data picker uiUtilize random number mrCalculate random assumed name h (mr) and intermediate variable
H(mr·Ppub);Data picker uiCalculate following intermediate variable: Pm=mrP, Data
Picker uiGenerate message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsAnd transmit the message to application server Sj;Meanwhile
Data picker uiBy random number mrIt is saved;Wherein, BiIt is data picker uiWhen registration in task publication and reward distribution
The intermediate variable that the heart generates, b are the random number PW that data picker generatesiIt is the password of data picker.
The method that application server calculates reward voucher in the step 5 is:
Step V1: application server SjReceive data picker uiMessage { the SID of transmissionj,h(mr),Pm,Ri,CDATAi,
Ti,TsAfter, pass through Tc1-Ti≤ Δ T judges the freshness of message;If meeting the freshness requirement of message, application server
SjFrom message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsIn extract encrypted perception data CDATAi, data picker
uiAssumed name h (mr) and intermediate variable Pm;Application server SjBy message { SIDj,h(mr),Pm,Ri,Ti,TsIt is sent to task
Publication and reward Distribution Center;Wherein, Tc1It is application server SjThe time of this message is received, Δ T is permitted maximum
Time delay;
Step V2: task publication receives message { SID with reward Distribution Centerj,h(mr),Pm,Ri,Ti,TsAfter, by not
Equation Tc2-Ti≤ Δ T judges the freshness of message, if meet the freshness of message, task publication and reward Distribution Center
Calculated resultAnd from calculated result W*In extract and data picker uiRelevant information identity mark
Know symbol PIDi, intermediate variableAnd intermediate variable Ci;Task publication and reward distribution center calculation intermediate variableAnd judge equationIt is whether true, if set up, appoint
Business publication and reward distribution center calculation intermediate variableAnd it generates
Message { h (mr),Verj,Ti,Ts, task is issued and rewards Distribution Center for message { h (mr),Verj,Ti,TsPass to application
Server Sj;If equation Ci *=CiInvalid, task publication informs application server S with reward Distribution CenterjData acquisition
Person uiFor invalid data picker;Wherein, Tc2The time that the message is received with reward Distribution Center is issued for task;
Step V3: application server SjReceive message { h (mr),Ver,Ti,TsAfter, calculate intermediate variableAnd judge equation Ver*Whether=Ver is true, if the equation is set up, using clothes
Be engaged in device SjUtilize the private key a of oneselfjWith encrypted perception data CDATAiCalculate intermediate variable:And it is taken out perception data;Application server SjAccording to task publication and reward score
Standard provided by hair center is divided into grade G to the scale of price of acquisition datai;
Step V4: application server SjCalculate intermediate variable km=aj·Ppub, according to the grade G for acquiring dataiAnd data
Picker uiAssumed name h (mr) and using intermediate variable km as the prize voucher Token of cipher key calculation perception datai=MACkm
(Gi,h(mr),h(SIDj||y),Ti);Application server SjGenerate message { h (mr),Tokeni,SIDj,Gi,Ti,Pj, and will disappear
Cease { h (mr),Tokeni,SIDj,Gi,Ti,PjBy communication channel pass to assumed name be h (mr) data picker ui。
Carrying out the method that reward is cashed to benefit redemption voucher in the step 6 is:
Step 61: data picker uiReceive message { h (mr),Tokeni,SIDj,Gi,Ti,PjAfter, it extracts in outbound message
Benefit redemption voucher TokeniAnd by the random number m of itself and replyr, time stamp TiAnd purpose application server SjIdentity
Identifier SIDjAnd its public key PjForm a redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>;Data picker uiIt saves
Redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>;
Step 62: data picker uiBy the redemption token < m of preservationr,Tokeni,Gi,SIDj,Pj,Ti> passes through communication
Channel transfer is issued to task and rewards Distribution Center;
Step 63: task publication receives redemption token < m with reward Distribution Centerr,Tokeni,Gi,SIDj,Pj,TiAfter >,
Calculate intermediate variable km=sPjAnd h (mr);Task publication and reward distribution center calculation intermediate variable Tokeni *=
MACkm(Gi,h(mr),h(SIDj||y),Ti), and by intermediate variable Tokeni *With the benefit redemption voucher in redemption token
TokeniIt is compared, if equal, task publication is with reward Distribution Center according to the price pair of scale of price table G defined
Redemption token is cashed.
The identification identifier SIDjApplication server using sequence number provided by server machine production firm or
The MAC Address of network interface card;The identifier PIDiIt is data picker uiPhone number, password PWiIt is data picker ui's
The product ID of mobile terminal;Task publication is cashed table PLT with one token of maintenance in reward Distribution Center and is converted to save
The token information paid, when each data picker cashes reward, task publication is inquired token with reward Distribution Center and is converted
Table PLT is paid no longer to be cashed if cashed.
Beneficial effects of the present invention: facing for data picker is generated using One-way Hash function and Pseudo-Random Number
When identification identifier as its assumed name, the reward of specific data picker is generated using Message Authentication Code algorithm;Utilize reward
The core verifying information authentication for the concrete application server that redemption center is grasped is exchanged the validity of voucher and then is exchanged.
The generation rewarded is completed present invention utilizes random assumed name and One-way Hash function and successfully protects the identity of data picker
Privacy;It is able to verify that data picker's identity, while can also ensure that the confidentiality of the collected data uploaded, it can be effective
Improve the enthusiasm that user acquires related perception data using mobile device;Be highly suitable for instantly those need by motivate come
Obtain ordinary user institute collected data mobile application scene, needing using mobile device acquire related data application
Field has biggish application value.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is system model figure of the invention.
Fig. 2 is registration phase flow chart of the invention, wherein (a) is application server registers, (b) is data picker
Registration.
Fig. 3 is certification and reward distribution phase flow figure of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under that premise of not paying creative labor
Embodiment shall fall within the protection scope of the present invention.
A kind of mobile device authentication method having anonymous reward distribution and privacy of identities protection, specifically includes that A. is corresponding
It is defined with scene, including specific system architecture model, the initialization of system and data picker and application server
Registration;B. the method for the publication of data acquisition session and the acquisition of perception data, the generation of reward and distribution;C. to prize
Encourage the method that voucher is verified and exchanged.System architecture model mainly includes data picker: U={ ui| i=1,2 ...,
M }, one group of application server: S={ Sj| j=1,2 ..., N } and task is issued and reward Distribution Center (Task Release
Center) TRC, wherein M is the quantity of data picker, and N is the quantity of application server.System tray used in the present invention
Structure and data acquisition flow figure are as shown in Figure 1, include the following main stage: the initial phase of system, registration phase,
The publication of data acquisition session and data upload stage, certification and reward distribution phase, reward voucher exchanges the stage.It is specific to be described in detail
It is as follows:
The symbol paraphrase used in the present invention of table 1
(1) initial phase of system
At this stage, task publication needs to carry out various Encryption Algorithm used in system with reward Distribution Center TRC
Selection needs to carry out Initialize installation to its parameter.
Step I1: task publication selects a big prime number p (need to reach commercial security grade with reward Distribution Center TRC
Not);And select elliptic curve E of the building on the finite field gf (p) for thering is the prime number to constitutep(a, b): y1 2=x1 3+ax1+b
And meet 4a3+27b2≠ 0 (mod p), x1And y1Respectively indicate elliptic curve EpThe independent variable and dependent variable of (a, b).Then, appoint
Business publication is with reward Distribution Center TRC in elliptic curve EpThe basic point P that a rank is q is chosen on (a, b).Elliptic curve Ep(a,b)
Should have enough safeties, to guarantee not broken through by opponent using Brute Force.
Step I2: task publication generates random number by common pseudo random number algorithm with reward Distribution Center TRC
And as the private key of oneself.Then, task publication utilizes the corresponding public key P of private key s calculating with reward Distribution Center TRCpub
=sP.Then, task publication generates using pseudo random number algorithm with reward Distribution Center TRC and selects two random numbersAnd it is properly saved as the secret value of oneself.Common pseudo random number algorithm usually selects current compare
Popular Mason's Rotation Algorithm (Mersenne twister).The algorithm opens up scholar's exploitation in 1997 villages Nian Yousong reality He Xi,
The matrix linear recurrence being based primarily upon on limited binary field can make up many defects of classic random number generation algorithm.
Step I3: task publication selects a message authentication code algorithm MAC appropriate with reward Distribution Center TRCk(),
Wherein, k is key.Message authentication code algorithm MACk() can select such as MD5 SHA-1 quotient of current comparative maturity
With message authentication code algorithm.Then, task publication selects two safe Hash function h () and H with reward Distribution Center TRC
(), whereinL is the length of 0,1 character string.Finally, task is issued
The Map-to-point hash function H of a safety is selected with reward Distribution Center TRC1(), and
Step I4: the scale of price table G=of acquired data is set as needed with reward Distribution Center TRC for task publication
{G1, G2..., Gn}.Scale of price table G be it is subsequent reward cash the stage carry out foundation is provided.Scale of price table G middle grade master
It to be determined according to correlative factors such as the type of acquired data, acquisition time, place, precision.For example, same kind of data essence
It is high to spend the high natural price lower than precision.In same place, the time-division in morning, data collected were centainly more collected than daytime
Data price is high.The specific rules and embodiment of the part need each application service provider to make according to their own needs
It is fixed.Scale of price table is made with reward Distribution Center TRC current invention assumes that issuing in task, in subsequent steps directly
It connects and uses scale of price table G.
Step I5: task is issued and rewards Distribution Center TRC for front parameter { E generatedp(a,b),P,Ppub,h
(), H () } it is open, and its private key s and secret value x and y are properly saved, with leakage-preventing.
(2) registration phase of system
In the present invention, any communication entity for desiring to participate in mobile application system, including providing answering for mobile application
It requires to register at task publication and reward Distribution Center TRC with server and the user for participating in data acquisition.Registration
Phase flow figure is as shown in Fig. 2, the existing user i.e. note of data picker introduced application server respectively and participate in data acquisition
Volume process.
The registration of application server:
Step S1: application server SjBy the identification identifier SID of oneselfjIt is sent to task publication and reward Distribution Center
TRC.In order to guarantee the uniqueness of identification identifier, application server can use sequence provided by server machine production firm
MAC Address of row number or network interface card etc. constructs oneself identification identifier.In addition, application server utilizes pseudo random number algorithm
Generate random numberAnd as the private key of oneself, while utilizing private key ajCalculate its corresponding public key Pj=aj·P。
Step S2: task publication receives application server S with reward Distribution Center TRCjIdentification identifier SIDjAfterwards, TRC
Calculate h (SIDj| | y) andWherein, y indicates task publication with reward Distribution Center to each application server
It carries out authenticating used secret value.Then, task publication constructs message with reward Distribution Center TRCAnd it is passed into application server by secure communication channel.
Step S3: when receiving messageAfterwards, application server SjThis is disappeared
BreathTogether with the private key a of oneselfjIt is properly saved together and prevents from revealing.
The registration of data picker:
Step U1: data picker uiChoose the identifier PID of oneselfiAnd corresponding password PWi.In order to guarantee to identify
The uniqueness of symbol, data picker should choose as far as possible the phone number for having uniqueness and product ID etc. to construct.With
Afterwards, data picker uiA random number is generated using pseudo random number algorithmAnd it is calculated using random number bIt connects
Get off, data picker uiGenerate registration messageAnd it is passed into task publication by exit passageway
It is registered with reward Distribution Center TRC.
Step U2: it is issued when task and receives data picker u with reward Distribution Center TRCiLogin request message after, it is first
It first carries out calculating following intermediate variable:
Ai=h (PIDi| | x),
HAi=h (Ai),
Wherein, x indicates that task publication carries out authenticating used secret with reward Distribution Center to each data picker
Value.Then, task publication generates message { V with reward Distribution Center TRCi,HAi,BiAnd pass to it by way of safety
Data picker ui。
Step U3: as data picker uiReceive message { Vi,HAi,BiAfter, data picker connects the parameter in message
Parameter set { V is constituted together with front random number b generatedi,HAi,Bi, b } and properly save it with anti-leak.
(3) the upload stage of the publication of data acquisition session and perception data
It, must be to task publication and reward score when application server needs a certain or several data in some region
The publication of hair center TRC application progress data acquisition session.Details are as follows for the detailed operation process in the stage:
Step TR1: firstly, application server SjGenerate time stamp TsAnd utilize its private key ajCalculate intermediate variable Dj=H
(aj·Ppub) andThen, application server SjGenerate message { TASKs,SIDj,Pj,
Qj,TsAnd task publication is transmitted the message to reward Distribution Center TRC to request publication data acquisition session.Wherein,
TASKsIt refers to data acquisition session, here includes application server SjSpecific requirement to acquired data, such as adopted
Collect accuracy rating required for the regional scopes of data, required data class, various types data etc.. SIDjAnd PjPoint
It Wei not application server SjIdentification identifier and public key.
Step TR2: when receiving application server SjAfter transmitted data harvesting request, in task publication and reward distribution
Heart TRC first needs to verify application server SjIdentification identifier SIDjLegitimacy.Firstly, task publication and reward Distribution Center
TRC calculates intermediate variableAnd judge intermediate variableIt is whether true.Such as
Not at then terminating verification process;As set up, task publication thinks application server S with reward Distribution Center TRCjIt is one legal
Application server and calculate intermediate variable: Sigj=sH1(TASKs||SIDj||Ts).Then, task publication is distributed with reward
Center TRC generates data acquisition session message { TASKs,SIDj,Pj,Sigj,TsAnd be broadcast to the data acquisition session message
Data acquisition session TASKsSpecified region is to remind data picker to acquire relevant data.
Step TR3: after receiving the data acquisition session message, data picker uiFirst look at the equipment energy of oneself
Data required by no offer data acquisition session (this part executes inspection by mobile terminal software automatically).If its equipment has
Standby data acquisition ability, then data picker uiCalculate intermediate variable Pexam=H1(TASKs||SIDj||Ts) and judge equationIt is whether true.Wherein, PpubThe public key with reward Distribution Center TRC is issued for task.If not at
Then return;If the equation is set up, data picker uiThink that the acquisition tasks are issued by task and reward Distribution Center TRC
It is issued, it can be according to data acquisition session TASKsRequirement acquire relevant data.
Step TR4: data picker uiMobile terminal according to data acquisition session TASKsRequirement acquire and generate symbol
Close desired perception data SDATAi.Then, data picker uiMobile terminal generate time stamp TiAnd utilize the time stamp Ti
With the identification identifier PID of oneselfiGenerate random number mr.Then, data picker uiUtilize random number mrCalculate random assumed name
h(mr) and intermediate variable H (mr·Ppub).Then, data picker uiIt carries out calculating following intermediate variable:
Pm=mrP,
Then, data picker uiGenerate message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsAnd by this with encryption after
The message of perception data be sent to application server SjIdentification identifier SIDj.Meanwhile data picker uiBy generation with
Machine number mrProperly save with leakage-preventing.
(4) verifying and reward distribution phase of data are acquired
Step V1: when receiving data picker uiAfter the transmitted message to come, application server SjPass through T firstc1-Ti
≤ Δ T judges message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsFreshness.Wherein, Tc1It is application server SjIt receives
To the time of this message, Δ T is the permitted maximum delay of system.If conditions are not met, then directly abandoning the message;If should
Message meets freshness requirement, then application server SjEncrypted perception data CDATA is extracted from the messagei, data adopt
Collection person uiAssumed name h (mr) and intermediate variable Pm.Then, application server SjBy message { SIDj,h(mr),Pm,Ri,Ti,Ts}
It is sent to the legitimacy that data picker's identity is verified in task publication with reward Distribution Center TRC.
Step V2: message { SID is being receivedj,h(mr),Pm,Ri,Ti,TsAfter, task publication and reward Distribution Center TRC are first
First pass through inequality Tc2-Ti≤ Δ T judges the freshness of the message, wherein Tc2It is issued for task and rewards Distribution Center TRC
Receive the time of the message.Application server is notified to abandon the message if being unsatisfactory for;If the message meets freshness
It is required that then task is issued and reward Distribution Center TRC calculated resultAnd from calculated result W*Middle extraction
Out with data picker uiRelevant information identity identifier PIDi, intermediate variableAnd intermediate variable Ci。
Then, task publication calculates intermediate variable with reward Distribution Center TRCAnd judge equationIt is whether true.If set up, appoint
Business publication thinks data picker u with reward Distribution Center TRCiFor legitimate user.Then, in task publication and reward distribution
Heart TRC calculates intermediate variableAnd generate message { h (mr),
Verj,Ti,Ts}.Subsequent task publication passes the message to application server S with reward Distribution Center TRCj.If above formula Ci *
=CiInvalid, then task publication will inform application server data picker u with reward Distribution Center TRCiFor invalid data
Picker.
Step V3: when receiving message { h (mr),Ver,Ti,TsAfter, application server SjIt needs to verify using the message
Data picker uiLegitimacy.Firstly, application server SjCalculate intermediate variable
And judge equation Ver*Whether=Ver meets.If equation is invalid, the verification process is terminated;If the equation is set up
Application server SjThink that assumed name is h (mr) data picker uiFor legitimate user.Then, application server SjUtilize oneself
Private key ajTo encrypted perception data CDATAiCarry out calculating intermediate variable:
And it is taken out perception data.Then, application server SjIt is issued according to task and rewards standard provided by Distribution Center TRC
Scale of price division is carried out to the acquisition data.It is assumed herein that its obtained grade is Gi∈G。
Step V4: firstly, application server SjCalculate intermediate variable km=aj·Ppub.Then, according to the acquisition data
Grade GiAnd the assumed name h (m of data pickerr), and this perception data is calculated as key using intermediate variable km
Prize voucher Tokeni=MACkm(Gi,h(mr),h(SIDj||y),Ti).Then, application server SjGenerate message { h (mr),
Tokeni,SIDj,Gi,Ti,PjAnd it is passed into assumed name by normal communication channel as h (mr) data picker ui。
Step V5: when receiving above-mentioned message { h (mr),Tokeni,SIDj,Gi,Ti,PjAfter, data picker uiIt extracts
Benefit redemption voucher Token in the messageiAnd by the random number m of itself and replyr, time stamp TiAnd purpose application server
SjIdentification identifier SIDjAnd its public key PjForm a redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>.Data acquisition
Person uiIt needs to keep properly the redemption token with anti-leak or be stolen.The data flowchart of Qualify Phase such as Fig. 3 institute
Show.
(5) stage is cashed in reward
Data picker uiCan hold that oneself redemption token rewarded at any time cashes.The flow chart in the stage is such as
Shown in Fig. 3.Details are as follows for the step of token is cashed:
Step P1: data picker uiThe redemption token < m that oneself is savedr,Tokeni,Gi,SIDj,Pj,Ti> is logical
It crosses secure communication channel and passes to task publication and reward Distribution Center TRC.
Step P2: task publication is receiving redemption token < m with reward Distribution Center TRCr,Tokeni,Gi,SIDj,Pj,Ti
After >, calculating intermediate variable km=sP firstjAnd h (mr).Then, task publication calculates intermediate with reward Distribution Center TRC
Variable Tokeni *=MACkm(Gi,h(mr),h(SIDj||y),Ti) and by itself and the benefit redemption voucher in redemption token
TokeniIt is compared.If they are equal, task publication is with reward Distribution Center TRC according to scale of price table G defined
Price the token is cashed.
If data picker uiHave it is multiple with above-mentioned similar redemption token, can be using above-mentioned steps to being held
Redemption token cashed one by one.In addition, task publication also needs to safeguard that a token cashes table with reward Distribution Center TRC
The token information that PLT was cashed to save.Every time when there is data picker to come to cash reward, task publication with
Reward Distribution Center TRC inquires token first and cashes table PLT.If cashed, no longer cashed.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of mobile device authentication method for having anonymous reward distribution and privacy of identities protection, which is characterized in that its step
It is as follows:
Step 1: task publication with reward Distribution Center to used elliptic curve, message authentication code algorithm, hash function and
The scale of price table of acquisition data is initialized;Task publication generates oneself using pseudo random number algorithm with reward Distribution Center
Private key and secret value and saved, and the public key of oneself is initialized using elliptic curve;
Step 2: several application servers and data picker issue in task and register at reward Distribution Center;
Step 3: when application server generate mobile application lack certain categorical data in some region when, to task publication with
Reward Distribution Center sends type, precision and the task requests of position message comprising needing to acquire data;Task publication and prize
The legitimacy of Distribution Center's verifying application server is encouraged, is then appointed to the publication of region specified by task requests message data acquisition
Business;
Step 4: after receiving data acquisition session, data picker acquires data according to the requirement of task requests message and will
Data collected pass to application server together with random assumed name generated;
Step 5: application server determines whether data picker is registration user, if it is receives the data, then basis
The random assumed name of data picker calculates the reward voucher of perception data and reward voucher is returned to corresponding data picker;
If it is not, then return step four;
Step 6: after data picker receives reward voucher, benefit redemption voucher is generated simultaneously using reward voucher and random assumed name
It is sent to task publication and reward Distribution Center;Task publication is with reward Distribution Center to data picker according to acquisition data
Scale of price table cashes benefit redemption voucher.
2. the mobile device authentication method according to claim 1 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the method using elliptic curve initialization public key is:
Step S11: task publication selects a big prime number p with reward Distribution Center, and selects the finite field being made of prime number p
Elliptic curve E on GF (p)p(a, b): y1 2=x1 3+ax1+ b and meet 4a3+27b2≠ 0 (mod p), x1And y1Indicate oval bent
Line EpThe independent variable and dependent variable of (a, b);Then, task publication is with reward Distribution Center in elliptic curve EpOne is chosen on (a, b)
A rank is the basic point P of q;Wherein, a and b is finite fieldOn constant;
Step S12: task publication generates random number by pseudo random number algorithm with reward Distribution CenterAnd as certainly
Oneself private key;Reward Distribution Center calculates its public key P using private key spub=sP;Wherein, finite fieldWith
Afterwards, task publication regenerates random number by pseudo random number algorithm with reward Distribution CenterAnd secret value x, y are carried out
Properly save.
3. the mobile device authentication method according to claim 2 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the message authentication algorithm is the comercial message authentication code algorithm of MD5 or SHA-1;Task publication is distributed with reward
The hash function of center selection includes safe hash function h (), Hash function H () and Map-to-point hash function H1
(), and:Wherein, 0 l, 1 character string
Length;The scale of price table is G={ G1, G2..., Gn, G1, G2..., GnIndicate n scale of price;Rewarding Distribution Center will
Parameter { the E of generationp(a,b),P,Ppub, h (), H () } and open.
4. the mobile device authentication method according to claim 3 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the register method of the application server are as follows:
Step S1: application server SjBy its identification identifier SIDjIt is sent to task publication and reward Distribution Center;Application service
Device SjRandom number is generated using pseudo random number algorithmAnd as the private key of oneself, while utilizing private key ajCalculate it
Public key Pj=aj·P;
Step S2: task publication receives application server S with reward Distribution CenterjIdentification identifier SIDjAfterwards, h (SID is calculatedj
| | y) andWherein, y indicates that task publication carries out certification institute to each application server with reward Distribution Center
The secret value used;Task publication distributes center construction with reward and passes through secure communication channel for messagePass to application server Sj;
Step S3: application server SjReceive messageAfterwards, by the message and private
Key ajIt is saved, wherein MACk() is message authentication code algorithm, and k is key.
5. the mobile device authentication method according to claim 3 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the register method of the data picker are as follows:
Step U1: data picker uiChoose its identifier PIDiAnd corresponding password PWiThen, data picker uiUsing puppet with
Machine figures method and generates random numberAnd intermediate variable is calculated using random number bData picker uiIt generates simultaneously
By registration messageTask publication is passed to by exit passageway to be registered with reward Distribution Center;
Step U2: it is issued when task and receives data picker u with reward Distribution CenteriRegistration message
Afterwards, following intermediate variable: A is calculatedi=h (PIDi| | x), HAi=h (Ai), Wherein, x indicates that task publication carries out each data picker with reward Distribution Center
Secret value used in authenticating;Then, task publication is centrally generated message { V with reward distributioni,HAi,Bi, and by message { Vi,
HAi,BiPass to data picker ui;
Step U3: data picker uiReceive message { Vi,HAi,BiAfter, data picker uiBy message { Vi,HAi,BiIn ginseng
Several and random number b constitutes parameter set { V togetheri,HAi,Bi, b } and save.
6. the mobile device authentication method according to claim 4 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the method for application server publication data acquisition session is in the step 3:
Step TR1: application server SjGenerate time stamp TsAnd utilize its private key ajCalculate intermediate variable Dj=H (aj·Ppub) andApplication server SjGenerate message { TASKs,SIDj,Pj,Qj,Ts, and by message
{TASKs,SIDj,Pj,Qj,TsIt is sent to task publication and reward Distribution Center;Wherein, TASKsIt is data acquisition session, data
Acquisition tasks TASKsIncluding acquire the regional scopes of data, data class and or various types data accuracy rating;SIDjWith
PjRespectively application server SjIdentification identifier and public key;
Step TR2: task publication receives application server S with reward Distribution CenterjThe message of transmitted data harvesting request
{TASKs,SIDj,Pj,Qj,Ts, task publication and reward distribution center calculation intermediate variableAnd judge intermediate variableIt is whether true, it such as sets up, task publication and prize
It encourages Distribution Center and thinks application server SjIt is a legal application server, and calculates intermediate variable Sigj=sH1
(TASKs||SIDj||Ts);Task publication is centrally generated data acquisition session message { TASK with reward distributions,SIDj,Pj,
Sigj,TsAnd data acquisition session message is broadcast to data acquisition session TASKsSpecified region.
7. the mobile device authentication method according to claim 6 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the method that data picker acquires data in the step 4 is:
Step TR3: data picker uiReceive data acquisition session message { TASKs,SIDj,Pj,Sigj,TsAfter, check it
Whether equipment has data required by data acquisition session, if had, data picker uiCalculate intermediate variable Pexam=H1
(TASKs||SIDj||Ts) and judge equationWhether true, if the equation is set up, data are adopted
Collection person uiAccording to data acquisition session TASKsRequirement acquire data;Wherein, PpubThe public affairs with reward Distribution Center are issued for task
Key;
Step TR4: data picker uiMobile terminal according to data acquisition session TASKsRequirement acquire and generate and conform to
The perception data SDATA askedi;Data picker uiMobile terminal generate time stamp TiAnd utilize time stamp TiWith its identity mark
Know symbol PIDiGenerate random number mr;Data picker uiUtilize random number mrCalculate random assumed name h (mr) and intermediate variable H
(mr·Ppub);Data picker uiCalculate following intermediate variable: Pm=mrP, Data
Picker uiGenerate message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsAnd transmit the message to application server Sj;Meanwhile
Data picker uiBy random number mrIt is saved;Wherein, BiIt is data picker uiWhen registration in task publication and reward distribution
The intermediate variable that the heart generates, b are the random number PW that data picker generatesiIt is the password of data picker.
8. the mobile device authentication method according to claim 7 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the method that application server calculates reward voucher in the step 5 is:
Step V1: application server SjReceive data picker uiMessage { the SID of transmissionj,h(mr),Pm,Ri,CDATAi,Ti,Ts}
Afterwards, pass through Tc1-Ti≤ Δ T judges the freshness of message;If meeting the freshness requirement of message, application server SjFrom disappearing
Cease { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsIn extract encrypted perception data CDATAi, data picker uiVacation
Name h (mr) and intermediate variable Pm;Application server SjBy message { SIDj,h(mr),Pm,Ri,Ti,TsBe sent to task publication with
Reward Distribution Center;Wherein, Tc1It is application server SjThe time of this message is received, Δ T is permitted maximum delay;
Step V2: task publication receives message { SID with reward Distribution Centerj,h(mr),Pm,Ri,Ti,TsAfter, pass through inequality
Tc2-Ti≤ Δ T judges the freshness of message, if meet the freshness of message, task publication and reward distribution center calculation
As a resultAnd from calculated result W*In extract and data picker uiRelevant information identity identifier
PIDi, intermediate variableAnd intermediate variable Ci;Task publication and reward distribution center calculation intermediate variableAnd judge equation Ci *=CiIt is whether true, if set up, task
Publication and reward distribution center calculation intermediate variableAnd it generates and disappears
Cease { h (mr),Verj,Ti,Ts, task is issued and rewards Distribution Center for message { h (mr),Verj,Ti,TsPass to using clothes
Be engaged in device Sj;If equation Ci *=CiInvalid, task publication informs application server S with reward Distribution CenterjData picker
uiFor invalid data picker;Wherein, Tc2The time that the message is received with reward Distribution Center is issued for task;
Step V3: application server SjReceive message { h (mr),Ver,Ti,TsAfter, calculate intermediate variableAnd judge equation Ver*Whether=Ver is true, if the equation is set up, using clothes
Be engaged in device SjUtilize the private key a of oneselfjWith encrypted perception data CDATAiCalculate intermediate variable:And it is taken out perception data;Application server SjAccording to task publication and reward score
Standard provided by hair center is divided into grade G to the scale of price of acquisition datai;
Step V4: application server SjCalculate intermediate variable km=aj·Ppub, according to the grade G for acquiring dataiAnd data acquisition
Person uiAssumed name h (mr) and using intermediate variable km as the prize voucher Token of cipher key calculation perception datai=MACkm(Gi,h
(mr),h(SIDj||y),Ti);Application server SjGenerate message { h (mr),Tokeni,SIDj,Gi,Ti,Pj, and by message { h
(mr),Tokeni,SIDj,Gi,Ti,PjBy communication channel pass to assumed name be h (mr) data picker ui。
9. the mobile device authentication method according to claim 8 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, carrying out the method that reward is cashed to benefit redemption voucher in the step 6 is:
Step 61: data picker uiReceive message { h (mr),Tokeni,SIDj,Gi,Ti,PjAfter, extract the reward in outbound message
Exchange voucher TokeniAnd by the random number m of itself and replyr, time stamp TiAnd purpose application server SjIdentification identifier
SIDjAnd its public key PjForm a redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>;Data picker uiIt saves to exchange and enable
Board < mr,Tokeni,Gi,SIDj,Pj,Ti>;
Step 62: data picker uiBy the redemption token < m of preservationr,Tokeni,Gi,SIDj,Pj,Ti> is passed by communication channel
Pass task publication and reward Distribution Center;
Step 63: task publication receives redemption token < m with reward Distribution Centerr,Tokeni,Gi,SIDj,Pj,TiAfter >, calculate
Intermediate variable km=sPjAnd h (mr);Task publication and reward distribution center calculation intermediate variable Tokeni *=MACkm(Gi,
h(mr),h(SIDj||y),Ti), and by intermediate variable Tokeni *With the benefit redemption voucher Token in redemption tokeniCompared
Compared with if equal, task publication carries out redemption token according to the price of scale of price table G defined with reward Distribution Center
It cashes.
10. the mobile device authentication method according to claim 9 for having anonymous reward distribution and privacy of identities protection,
It is characterized in that, the identification identifier SIDjApplication server using sequence number provided by server machine production firm or
The MAC Address of network interface card;The identifier PIDiIt is data picker uiPhone number, password PWiIt is data picker uiShifting
The product ID of dynamic terminal;Task publication is cashed table PLT with one token of maintenance in reward Distribution Center and is cashed to save
The token information crossed, when each data picker cashes reward, task publication is inquired token with reward Distribution Center and is cashed
Table PLT is no longer cashed if cashed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910227277.0A CN109889541A (en) | 2019-03-25 | 2019-03-25 | The mobile device authentication method for having anonymous reward distribution and privacy of identities protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910227277.0A CN109889541A (en) | 2019-03-25 | 2019-03-25 | The mobile device authentication method for having anonymous reward distribution and privacy of identities protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109889541A true CN109889541A (en) | 2019-06-14 |
Family
ID=66934102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910227277.0A Pending CN109889541A (en) | 2019-03-25 | 2019-03-25 | The mobile device authentication method for having anonymous reward distribution and privacy of identities protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889541A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116506845A (en) * | 2023-06-19 | 2023-07-28 | 暨南大学 | Privacy-protected Internet of vehicles crowd sensing excitation method and system |
CN116506226B (en) * | 2023-06-27 | 2023-09-19 | 杭州金智塔科技有限公司 | Private data processing system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834861A (en) * | 2010-04-16 | 2010-09-15 | 华中师范大学 | Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service |
WO2015127736A1 (en) * | 2014-02-27 | 2015-09-03 | 华为技术有限公司 | Method, device and system for user privacy protection |
CN105847235A (en) * | 2016-03-14 | 2016-08-10 | 安徽大学 | Identity-based efficient anonymous batch authentication method in Internet of vehicles environment |
CN107947913A (en) * | 2017-11-15 | 2018-04-20 | 武汉大学 | The anonymous authentication method and system of a kind of identity-based |
-
2019
- 2019-03-25 CN CN201910227277.0A patent/CN109889541A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834861A (en) * | 2010-04-16 | 2010-09-15 | 华中师范大学 | Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service |
WO2015127736A1 (en) * | 2014-02-27 | 2015-09-03 | 华为技术有限公司 | Method, device and system for user privacy protection |
CN105847235A (en) * | 2016-03-14 | 2016-08-10 | 安徽大学 | Identity-based efficient anonymous batch authentication method in Internet of vehicles environment |
CN107947913A (en) * | 2017-11-15 | 2018-04-20 | 武汉大学 | The anonymous authentication method and system of a kind of identity-based |
Non-Patent Citations (1)
Title |
---|
张俊松等: "群智感知环境下支持激励机制实施的匿名身份认证协议研究", 《小型微型计算机系统》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116506845A (en) * | 2023-06-19 | 2023-07-28 | 暨南大学 | Privacy-protected Internet of vehicles crowd sensing excitation method and system |
CN116506845B (en) * | 2023-06-19 | 2023-09-15 | 暨南大学 | Privacy-protected Internet of vehicles crowd sensing excitation method and system |
CN116506226B (en) * | 2023-06-27 | 2023-09-19 | 杭州金智塔科技有限公司 | Private data processing system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Privacy-preserving raw data collection without a trusted authority for IoT | |
Zhu et al. | Privacy-preserving authentication and data aggregation for fog-based smart grid | |
CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
CN105871869B (en) | Hash function and false identity anonymous bidirectional authentication method are based in mobile social networking | |
CN102171969B (en) | A method for operating a network, a system management device, a network and a computer program therefor | |
CN110225016A (en) | A kind of data hiding transmission method based on block chain network | |
CN108769023A (en) | A kind of method for secret protection and system applied to intelligent perception | |
CN101834853B (en) | Method and system for sharing anonymous resource | |
CN107749836A (en) | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability | |
Yu et al. | Privacy-preserving power request in smart grid networks | |
CN110932854B (en) | Block chain key distribution system and method for Internet of things | |
CN103236933B (en) | For on-line real name Verification System and the authentication method thereof of online medical system | |
CN101282216B (en) | Method for switching three-partner key with privacy protection based on password authentication | |
CN102594820B (en) | Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things | |
CN108833373A (en) | The instant messaging and anonymous access method of facing relation secret protection social networks | |
CN107155113A (en) | The method and server of a kind of protection barrage information | |
Wang et al. | One-round privacy-preserving meeting location determination for smartphone applications | |
CN101908961A (en) | Multi-party secret handshaking method in short key environment | |
CN103281180B (en) | User is protected to access the bill generation method of privacy in a kind of network service | |
Yang et al. | Group time-based one-time passwords and its application to efficient privacy-preserving proof of location | |
CN109889541A (en) | The mobile device authentication method for having anonymous reward distribution and privacy of identities protection | |
Chai et al. | Threshold password authentication against guessing attacks in Ad hoc networks | |
CN107615704A (en) | A kind of device, method and system of the anti-fishing of network | |
Tai et al. | Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments. | |
JP2004328293A (en) | Electronic ticket, electronic ticket system, authentication system, and information processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190614 |
|
RJ01 | Rejection of invention patent application after publication |