CN109889541A - The mobile device authentication method for having anonymous reward distribution and privacy of identities protection - Google Patents

The mobile device authentication method for having anonymous reward distribution and privacy of identities protection Download PDF

Info

Publication number
CN109889541A
CN109889541A CN201910227277.0A CN201910227277A CN109889541A CN 109889541 A CN109889541 A CN 109889541A CN 201910227277 A CN201910227277 A CN 201910227277A CN 109889541 A CN109889541 A CN 109889541A
Authority
CN
China
Prior art keywords
data
task
message
distribution center
reward distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910227277.0A
Other languages
Chinese (zh)
Inventor
张俊松
李志刚
吉星
甘勇
蒋永丛
贺蕾
张启坤
蔡增玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Light Industry
Original Assignee
Zhengzhou University of Light Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Light Industry filed Critical Zhengzhou University of Light Industry
Priority to CN201910227277.0A priority Critical patent/CN109889541A/en
Publication of CN109889541A publication Critical patent/CN109889541A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention proposes a kind of mobile device authentication methods for having anonymous reward distribution and privacy of identities protection; the association that anonymous bidirectional authentication protocol for solving the problem of under existing mobile environment can not describe between number and particular user can not achieve reward distribution and exchange.The present invention is accorded with using the temporary identifications that One-way Hash function and Pseudo-Random Number generate data picker as its assumed name, and the reward of specific data picker is generated using Message Authentication Code algorithm;The core verifying information authentication for the concrete application server grasped using benefit redemption center is exchanged the validity of voucher and then is exchanged.The present invention is able to verify that data picker's identity, it can also ensure that the confidentiality of the collected data uploaded simultaneously, the enthusiasm that user acquires related perception data using mobile device can be effectively improved, is needing that there is biggish application value using the application field of mobile device acquisition related data.

Description

The mobile device authentication method for having anonymous reward distribution and privacy of identities protection
Technical field
Have anonymous reward distribution the present invention relates to the technical field of mobile communication more particularly to one kind and privacy of identities is protected The mobile device authentication method of shield realizes reward distribution function based on cryptography method, elliptic curve cryptography and secure hash function Energy.
Background technique
With the rapid development of mobile communication technology, the various applications based on mobile Internet are increasingly by the blueness of people It looks at.Wherein, a kind of smart phone held using large number of ordinary user acquires and uploads data, then by background service Device data are further processed and generate new service application obtained quick development.This kind of application is also referred to as group Intelligence aware application.The technology is widely used to the fields such as environmental monitoring, the magnitude of traffic flow and traffic information monitoring at present.Gunz sense Hownet network provides a kind of completely new solution to complicated ubiquitous depth perception problem, possesses and is widely applied scene and wide Wealthy application prospect.
However, it is limited to the lazy weight of data picker and the influence that the quality of data collected is irregular, this The development of class application receives serious influence.For this problem, it is needed in such application by using excitation side appropriate Formula, is encouraged and stimulus data supplier participates in perception task, and provides the perception of high quality, high reliability as much as possible Data.However, user's data collected are easy to by illegal point during transmitting due to the open nature of wireless network Son is intercepted and captured, and may include other privacy informations such as the position of picker oneself in these perception datas, so if picker The recipient of perception data is distrusted, is also unwilling these perception datas passing to him.That is, perception data Recipient, which also must be able to be verified its legitimacy, could receive data.Furthermore existing many bonusing methods for this problem In the process of implementation, the true personal information for generally requiring user could complete the exchange of reward.And it is very quick as user The privacy information of sense is often unwilling to go out the leakage of personal information of oneself.So needing user to participate in acquisition data This kind of application face a problem in the process of implementation: how to guarantee that data picker privacy of identities do not reveal In the case of realize two-way authentication between data picker and data processing server, while data picker can be rewarded And it is able to carry out exchange.This is the key that this kind of at present using success implementation.
Currently, there are many under mobile network environment the user realized using cryptological technique and server it Between anonymous bidirectional authentication protocol.This kind of general realization principle of agreement is some public affairs using a public trusted third party Parameter and relevant secret value are opened, it is exclusive that some user is generated in the way of secure hash function and pseudo random number etc. Service Ticket.Meanwhile server be also required between trusted third party by secure communication it is more relevant to generate server Service Ticket.In actual verification process, user and server can be by exchange correlation data, with relevant cryptography thought (common such as Diffie-Hellman method) makes user and server can use oneself exclusive Service Ticket to test Demonstrate,prove the legitimacy of other side.There are also some researchers to pass through certain special unidirectional mapping for biological datas such as the fingerprints of human body The data on another number field are converted thereof into, to realize the anonymity and uniqueness of user.However, this method depends on The accuracy and reliability of biomedical information acquisition equipment, it is not easy to real on the terminal devices such as daily the held smart phone of people It is existing.In addition, there are also several researchers have proposed the K- anonymous data gathering algorithms based on user geographical location.The core of this kind of algorithm Thought want for the accurate geographic position of user to be substituted for include K users with par including the user area Domain, to realize hiding for user identity.
Anonymous bidirectional authentication protocol under this kind of mobile environment although can be realized user privacy of identities protection and it is two-way Certification, but it can not describe the association between the number and specific user.Therefore, such methods all cannot achieve prize mostly The distribution and exchange encouraged.
Summary of the invention
The association between number and particular user can not be described for the anonymous bidirectional authentication protocol under existing mobile environment, The technical issues of can not achieve reward distribution and exchanging, the present invention propose that one kind has anonymous reward distribution and privacy of identities protection Mobile device authentication method, can be while realizing anonymous authentication, moreover it is possible to meet reward distribution and exchange function, be applicable in The anonymous authentication in wireless network environment provides a kind of usability methods to need to implement the application of reward or excitation.
In order to achieve the above object, the technical scheme of the present invention is realized as follows: one kind have anonymous reward distribution and The mobile device authentication method of privacy of identities protection, its step are as follows:
Step 1: task publication is with reward Distribution Center to used elliptic curve, message authentication code algorithm, Hash letter Number and the scale of price table of acquisition data are initialized;Task publication is generated with reward Distribution Center using pseudo random number algorithm Oneself private key and secret value are simultaneously saved, and the public key of oneself is initialized using elliptic curve;
Step 2: several application servers and data picker issue in task and infuse at reward Distribution Center Volume;
Step 3: it when application server, which generates mobile application, lacks certain categorical data in some region, is sent out to task Cloth and reward Distribution Center send type, precision and the task requests of position message comprising needing to acquire data;Task publication With the legitimacy of reward distribution central authentication application server, then adopted to the publication data of region specified by task requests message Set task;
Step 4: after receiving data acquisition session, data picker acquires data according to the requirement of task requests message And data collected are passed into application server together with random assumed name generated;
Step 5: application server determines whether data picker is registration user, if it is receives the data, then It calculates the reward voucher of perception data according to the random assumed name of data picker and reward voucher is returned into corresponding data and adopt Collection person;If it is not, then return step four;
Step 6: data picker receive reward voucher after, using reward voucher and random assumed name generate benefit redemption with It demonstrate,proves and is sent to task publication and reward Distribution Center;Task publication is with reward Distribution Center to data picker according to acquisition number According to scale of price table benefit redemption voucher is cashed.
The method using elliptic curve initialization public key is:
Step S11: task publication selects a big prime number p with reward Distribution Center, and selects what is be made of prime number p to have Elliptic curve E on confinement GF (p)p(a, b): y1 2=x1 3+ax1+ b and meet 4a3+27b2≠ 0 (mod p), x1And y1It indicates Elliptic curve EpThe independent variable and dependent variable of (a, b);Then, task publication is with reward Distribution Center in elliptic curve EpOn (a, b) Choose the basic point P that a rank is q;Wherein, a and b is finite fieldOn constant;
Step S12: task publication generates random number by pseudo random number algorithm with reward Distribution CenterAnd made For the private key of oneself;Reward Distribution Center calculates its public key P using private key spub=sP;Wherein, finite fieldThen, task publication regenerates random number by pseudo random number algorithm with reward Distribution Center And secret value x, y are properly saved.
The message authentication algorithm is the comercial message authentication code algorithm of MD5 or SHA-1;In task publication and reward distribution The hash function of heart selection includes safe hash function h (), Hash function H () and Map-to-point hash function H1 (), and:Wherein, 0 l, 1 character string Length;The scale of price table is G={ G1, G2..., Gn, G1, G2..., GnIndicate n scale of price;Reward Distribution Center By the parameter { E of generationp(a,b),P,Ppub, h (), H () } and open.
The register method of the application server are as follows:
Step S1: application server SjBy its identification identifier SIDjIt is sent to task publication and reward Distribution Center;Using Server SjRandom number is generated using pseudo random number algorithmAnd as the private key of oneself, while utilizing private key ajMeter Calculate its public key Pj=aj·P;
Step S2: task publication receives application server S with reward Distribution CenterjIdentification identifier SIDjAfterwards, h is calculated (SIDj| | y) andWherein, y indicates that task publication carries out each application server with reward Distribution Center Secret value used in authenticating;Task publication distributes center construction with reward and passes through secure communication channel for messagePass to application server Sj
Step S3: application server SjReceive messageAfterwards, by the message With private key ajIt is saved, wherein MACk() is message authentication code algorithm, and k is key.
The register method of the data picker are as follows:
Step U1: data picker uiChoose its identifier PIDiAnd corresponding password PWiThen, data picker uiBenefit Random number is generated with pseudo random number algorithmAnd intermediate variable is calculated using random number bData picker ui It generates and by registration messageTask publication is passed to by exit passageway to be infused with reward Distribution Center Volume;
Step U2: it is issued when task and receives data picker u with reward Distribution CenteriRegistration messageAfterwards, following intermediate variable: A is calculatedi=h (PIDi| | x), HAi=h (Ai), Wherein, x indicates task publication and reward score Hair center carries out authenticating used secret value to each data picker;Then, task publication is centrally generated with reward distribution Message { Vi,HAi,Bi, and by message { Vi,HAi,BiPass to data picker ui
Step U3: data picker uiReceive message { Vi,HAi,BiAfter, data picker uiBy message { Vi,HAi,BiIn Parameter and random number b constitute parameter set { V togetheri,HAi,Bi, b } and save.
The method of application server publication data acquisition session is in the step 3:
Step TR1: application server SjGenerate time stamp TsAnd utilize its private key ajCalculate intermediate variable Dj=H (aj· Ppub) andApplication server SjGenerate message { TASKs,SIDj,Pj,Qj,Ts, and will disappear Cease { TASKs,SIDj,Pj,Qj,TsIt is sent to task publication and reward Distribution Center;Wherein, TASKsIt is data acquisition session, Data acquisition session TASKsIncluding acquire the regional scopes of data, data class and or various types data accuracy rating; SIDjAnd PjRespectively application server SjIdentification identifier and public key;
Step TR2: task publication receives application server S with reward Distribution CenterjTransmitted data harvesting request Message { TASKs,SIDj,Pj,Qj,Ts, task publication and reward distribution center calculation intermediate variableAnd judge intermediate variableIt is whether true, such as set up, task publication with Reward Distribution Center thinks application server SjIt is a legal application server, and calculates intermediate variable Sigj=sH1 (TASKs||SIDj||Ts);Task publication is centrally generated data acquisition session message { TASK with reward distributions,SIDj,Pj, Sigj,TsAnd data acquisition session message is broadcast to data acquisition session TASKsSpecified region.
The method that data picker acquires data in the step 4 is:
Step TR3: data picker uiReceive data acquisition session message { TASKs,SIDj,Pj,Sigj,TsAfter, it looks into See whether its equipment has data required by data acquisition session, if had, data picker uiCalculate intermediate variable Pexam =H1(TASKs||SIDj||Ts) and judge equationIt is whether true, if the equation is set up, number According to picker uiAccording to data acquisition session TASKsRequirement acquire data;Wherein, PpubIt is issued for task and rewards Distribution Center Public key;
Step TR4: data picker uiMobile terminal according to data acquisition session TASKsRequirement acquire and generate symbol Close desired perception data SDATAi;Data picker uiMobile terminal generate time stamp TiAnd utilize time stamp TiWith its body Part identifier PIDiGenerate random number mr;Data picker uiUtilize random number mrCalculate random assumed name h (mr) and intermediate variable H(mr·Ppub);Data picker uiCalculate following intermediate variable: Pm=mrP, Data Picker uiGenerate message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsAnd transmit the message to application server Sj;Meanwhile Data picker uiBy random number mrIt is saved;Wherein, BiIt is data picker uiWhen registration in task publication and reward distribution The intermediate variable that the heart generates, b are the random number PW that data picker generatesiIt is the password of data picker.
The method that application server calculates reward voucher in the step 5 is:
Step V1: application server SjReceive data picker uiMessage { the SID of transmissionj,h(mr),Pm,Ri,CDATAi, Ti,TsAfter, pass through Tc1-Ti≤ Δ T judges the freshness of message;If meeting the freshness requirement of message, application server SjFrom message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsIn extract encrypted perception data CDATAi, data picker uiAssumed name h (mr) and intermediate variable Pm;Application server SjBy message { SIDj,h(mr),Pm,Ri,Ti,TsIt is sent to task Publication and reward Distribution Center;Wherein, Tc1It is application server SjThe time of this message is received, Δ T is permitted maximum Time delay;
Step V2: task publication receives message { SID with reward Distribution Centerj,h(mr),Pm,Ri,Ti,TsAfter, by not Equation Tc2-Ti≤ Δ T judges the freshness of message, if meet the freshness of message, task publication and reward Distribution Center Calculated resultAnd from calculated result W*In extract and data picker uiRelevant information identity mark Know symbol PIDi, intermediate variableAnd intermediate variable Ci;Task publication and reward distribution center calculation intermediate variableAnd judge equationIt is whether true, if set up, appoint Business publication and reward distribution center calculation intermediate variableAnd it generates Message { h (mr),Verj,Ti,Ts, task is issued and rewards Distribution Center for message { h (mr),Verj,Ti,TsPass to application Server Sj;If equation Ci *=CiInvalid, task publication informs application server S with reward Distribution CenterjData acquisition Person uiFor invalid data picker;Wherein, Tc2The time that the message is received with reward Distribution Center is issued for task;
Step V3: application server SjReceive message { h (mr),Ver,Ti,TsAfter, calculate intermediate variableAnd judge equation Ver*Whether=Ver is true, if the equation is set up, using clothes Be engaged in device SjUtilize the private key a of oneselfjWith encrypted perception data CDATAiCalculate intermediate variable:And it is taken out perception data;Application server SjAccording to task publication and reward score Standard provided by hair center is divided into grade G to the scale of price of acquisition datai
Step V4: application server SjCalculate intermediate variable km=aj·Ppub, according to the grade G for acquiring dataiAnd data Picker uiAssumed name h (mr) and using intermediate variable km as the prize voucher Token of cipher key calculation perception datai=MACkm (Gi,h(mr),h(SIDj||y),Ti);Application server SjGenerate message { h (mr),Tokeni,SIDj,Gi,Ti,Pj, and will disappear Cease { h (mr),Tokeni,SIDj,Gi,Ti,PjBy communication channel pass to assumed name be h (mr) data picker ui
Carrying out the method that reward is cashed to benefit redemption voucher in the step 6 is:
Step 61: data picker uiReceive message { h (mr),Tokeni,SIDj,Gi,Ti,PjAfter, it extracts in outbound message Benefit redemption voucher TokeniAnd by the random number m of itself and replyr, time stamp TiAnd purpose application server SjIdentity Identifier SIDjAnd its public key PjForm a redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>;Data picker uiIt saves Redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>;
Step 62: data picker uiBy the redemption token < m of preservationr,Tokeni,Gi,SIDj,Pj,Ti> passes through communication Channel transfer is issued to task and rewards Distribution Center;
Step 63: task publication receives redemption token < m with reward Distribution Centerr,Tokeni,Gi,SIDj,Pj,TiAfter >, Calculate intermediate variable km=sPjAnd h (mr);Task publication and reward distribution center calculation intermediate variable Tokeni *= MACkm(Gi,h(mr),h(SIDj||y),Ti), and by intermediate variable Tokeni *With the benefit redemption voucher in redemption token TokeniIt is compared, if equal, task publication is with reward Distribution Center according to the price pair of scale of price table G defined Redemption token is cashed.
The identification identifier SIDjApplication server using sequence number provided by server machine production firm or The MAC Address of network interface card;The identifier PIDiIt is data picker uiPhone number, password PWiIt is data picker ui's The product ID of mobile terminal;Task publication is cashed table PLT with one token of maintenance in reward Distribution Center and is converted to save The token information paid, when each data picker cashes reward, task publication is inquired token with reward Distribution Center and is converted Table PLT is paid no longer to be cashed if cashed.
Beneficial effects of the present invention: facing for data picker is generated using One-way Hash function and Pseudo-Random Number When identification identifier as its assumed name, the reward of specific data picker is generated using Message Authentication Code algorithm;Utilize reward The core verifying information authentication for the concrete application server that redemption center is grasped is exchanged the validity of voucher and then is exchanged. The generation rewarded is completed present invention utilizes random assumed name and One-way Hash function and successfully protects the identity of data picker Privacy;It is able to verify that data picker's identity, while can also ensure that the confidentiality of the collected data uploaded, it can be effective Improve the enthusiasm that user acquires related perception data using mobile device;Be highly suitable for instantly those need by motivate come Obtain ordinary user institute collected data mobile application scene, needing using mobile device acquire related data application Field has biggish application value.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is system model figure of the invention.
Fig. 2 is registration phase flow chart of the invention, wherein (a) is application server registers, (b) is data picker Registration.
Fig. 3 is certification and reward distribution phase flow figure of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under that premise of not paying creative labor Embodiment shall fall within the protection scope of the present invention.
A kind of mobile device authentication method having anonymous reward distribution and privacy of identities protection, specifically includes that A. is corresponding It is defined with scene, including specific system architecture model, the initialization of system and data picker and application server Registration;B. the method for the publication of data acquisition session and the acquisition of perception data, the generation of reward and distribution;C. to prize Encourage the method that voucher is verified and exchanged.System architecture model mainly includes data picker: U={ ui| i=1,2 ..., M }, one group of application server: S={ Sj| j=1,2 ..., N } and task is issued and reward Distribution Center (Task Release Center) TRC, wherein M is the quantity of data picker, and N is the quantity of application server.System tray used in the present invention Structure and data acquisition flow figure are as shown in Figure 1, include the following main stage: the initial phase of system, registration phase, The publication of data acquisition session and data upload stage, certification and reward distribution phase, reward voucher exchanges the stage.It is specific to be described in detail It is as follows:
The symbol paraphrase used in the present invention of table 1
(1) initial phase of system
At this stage, task publication needs to carry out various Encryption Algorithm used in system with reward Distribution Center TRC Selection needs to carry out Initialize installation to its parameter.
Step I1: task publication selects a big prime number p (need to reach commercial security grade with reward Distribution Center TRC Not);And select elliptic curve E of the building on the finite field gf (p) for thering is the prime number to constitutep(a, b): y1 2=x1 3+ax1+b And meet 4a3+27b2≠ 0 (mod p), x1And y1Respectively indicate elliptic curve EpThe independent variable and dependent variable of (a, b).Then, appoint Business publication is with reward Distribution Center TRC in elliptic curve EpThe basic point P that a rank is q is chosen on (a, b).Elliptic curve Ep(a,b) Should have enough safeties, to guarantee not broken through by opponent using Brute Force.
Step I2: task publication generates random number by common pseudo random number algorithm with reward Distribution Center TRC And as the private key of oneself.Then, task publication utilizes the corresponding public key P of private key s calculating with reward Distribution Center TRCpub =sP.Then, task publication generates using pseudo random number algorithm with reward Distribution Center TRC and selects two random numbersAnd it is properly saved as the secret value of oneself.Common pseudo random number algorithm usually selects current compare Popular Mason's Rotation Algorithm (Mersenne twister).The algorithm opens up scholar's exploitation in 1997 villages Nian Yousong reality He Xi, The matrix linear recurrence being based primarily upon on limited binary field can make up many defects of classic random number generation algorithm.
Step I3: task publication selects a message authentication code algorithm MAC appropriate with reward Distribution Center TRCk(), Wherein, k is key.Message authentication code algorithm MACk() can select such as MD5 SHA-1 quotient of current comparative maturity With message authentication code algorithm.Then, task publication selects two safe Hash function h () and H with reward Distribution Center TRC (), whereinL is the length of 0,1 character string.Finally, task is issued The Map-to-point hash function H of a safety is selected with reward Distribution Center TRC1(), and
Step I4: the scale of price table G=of acquired data is set as needed with reward Distribution Center TRC for task publication {G1, G2..., Gn}.Scale of price table G be it is subsequent reward cash the stage carry out foundation is provided.Scale of price table G middle grade master It to be determined according to correlative factors such as the type of acquired data, acquisition time, place, precision.For example, same kind of data essence It is high to spend the high natural price lower than precision.In same place, the time-division in morning, data collected were centainly more collected than daytime Data price is high.The specific rules and embodiment of the part need each application service provider to make according to their own needs It is fixed.Scale of price table is made with reward Distribution Center TRC current invention assumes that issuing in task, in subsequent steps directly It connects and uses scale of price table G.
Step I5: task is issued and rewards Distribution Center TRC for front parameter { E generatedp(a,b),P,Ppub,h (), H () } it is open, and its private key s and secret value x and y are properly saved, with leakage-preventing.
(2) registration phase of system
In the present invention, any communication entity for desiring to participate in mobile application system, including providing answering for mobile application It requires to register at task publication and reward Distribution Center TRC with server and the user for participating in data acquisition.Registration Phase flow figure is as shown in Fig. 2, the existing user i.e. note of data picker introduced application server respectively and participate in data acquisition Volume process.
The registration of application server:
Step S1: application server SjBy the identification identifier SID of oneselfjIt is sent to task publication and reward Distribution Center TRC.In order to guarantee the uniqueness of identification identifier, application server can use sequence provided by server machine production firm MAC Address of row number or network interface card etc. constructs oneself identification identifier.In addition, application server utilizes pseudo random number algorithm Generate random numberAnd as the private key of oneself, while utilizing private key ajCalculate its corresponding public key Pj=aj·P。
Step S2: task publication receives application server S with reward Distribution Center TRCjIdentification identifier SIDjAfterwards, TRC Calculate h (SIDj| | y) andWherein, y indicates task publication with reward Distribution Center to each application server It carries out authenticating used secret value.Then, task publication constructs message with reward Distribution Center TRCAnd it is passed into application server by secure communication channel.
Step S3: when receiving messageAfterwards, application server SjThis is disappeared BreathTogether with the private key a of oneselfjIt is properly saved together and prevents from revealing.
The registration of data picker:
Step U1: data picker uiChoose the identifier PID of oneselfiAnd corresponding password PWi.In order to guarantee to identify The uniqueness of symbol, data picker should choose as far as possible the phone number for having uniqueness and product ID etc. to construct.With Afterwards, data picker uiA random number is generated using pseudo random number algorithmAnd it is calculated using random number bIt connects Get off, data picker uiGenerate registration messageAnd it is passed into task publication by exit passageway It is registered with reward Distribution Center TRC.
Step U2: it is issued when task and receives data picker u with reward Distribution Center TRCiLogin request message after, it is first It first carries out calculating following intermediate variable:
Ai=h (PIDi| | x),
HAi=h (Ai),
Wherein, x indicates that task publication carries out authenticating used secret with reward Distribution Center to each data picker Value.Then, task publication generates message { V with reward Distribution Center TRCi,HAi,BiAnd pass to it by way of safety Data picker ui
Step U3: as data picker uiReceive message { Vi,HAi,BiAfter, data picker connects the parameter in message Parameter set { V is constituted together with front random number b generatedi,HAi,Bi, b } and properly save it with anti-leak.
(3) the upload stage of the publication of data acquisition session and perception data
It, must be to task publication and reward score when application server needs a certain or several data in some region The publication of hair center TRC application progress data acquisition session.Details are as follows for the detailed operation process in the stage:
Step TR1: firstly, application server SjGenerate time stamp TsAnd utilize its private key ajCalculate intermediate variable Dj=H (aj·Ppub) andThen, application server SjGenerate message { TASKs,SIDj,Pj, Qj,TsAnd task publication is transmitted the message to reward Distribution Center TRC to request publication data acquisition session.Wherein, TASKsIt refers to data acquisition session, here includes application server SjSpecific requirement to acquired data, such as adopted Collect accuracy rating required for the regional scopes of data, required data class, various types data etc.. SIDjAnd PjPoint It Wei not application server SjIdentification identifier and public key.
Step TR2: when receiving application server SjAfter transmitted data harvesting request, in task publication and reward distribution Heart TRC first needs to verify application server SjIdentification identifier SIDjLegitimacy.Firstly, task publication and reward Distribution Center TRC calculates intermediate variableAnd judge intermediate variableIt is whether true.Such as Not at then terminating verification process;As set up, task publication thinks application server S with reward Distribution Center TRCjIt is one legal Application server and calculate intermediate variable: Sigj=sH1(TASKs||SIDj||Ts).Then, task publication is distributed with reward Center TRC generates data acquisition session message { TASKs,SIDj,Pj,Sigj,TsAnd be broadcast to the data acquisition session message Data acquisition session TASKsSpecified region is to remind data picker to acquire relevant data.
Step TR3: after receiving the data acquisition session message, data picker uiFirst look at the equipment energy of oneself Data required by no offer data acquisition session (this part executes inspection by mobile terminal software automatically).If its equipment has Standby data acquisition ability, then data picker uiCalculate intermediate variable Pexam=H1(TASKs||SIDj||Ts) and judge equationIt is whether true.Wherein, PpubThe public key with reward Distribution Center TRC is issued for task.If not at Then return;If the equation is set up, data picker uiThink that the acquisition tasks are issued by task and reward Distribution Center TRC It is issued, it can be according to data acquisition session TASKsRequirement acquire relevant data.
Step TR4: data picker uiMobile terminal according to data acquisition session TASKsRequirement acquire and generate symbol Close desired perception data SDATAi.Then, data picker uiMobile terminal generate time stamp TiAnd utilize the time stamp Ti With the identification identifier PID of oneselfiGenerate random number mr.Then, data picker uiUtilize random number mrCalculate random assumed name h(mr) and intermediate variable H (mr·Ppub).Then, data picker uiIt carries out calculating following intermediate variable:
Pm=mrP,
Then, data picker uiGenerate message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsAnd by this with encryption after The message of perception data be sent to application server SjIdentification identifier SIDj.Meanwhile data picker uiBy generation with Machine number mrProperly save with leakage-preventing.
(4) verifying and reward distribution phase of data are acquired
Step V1: when receiving data picker uiAfter the transmitted message to come, application server SjPass through T firstc1-Ti ≤ Δ T judges message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsFreshness.Wherein, Tc1It is application server SjIt receives To the time of this message, Δ T is the permitted maximum delay of system.If conditions are not met, then directly abandoning the message;If should Message meets freshness requirement, then application server SjEncrypted perception data CDATA is extracted from the messagei, data adopt Collection person uiAssumed name h (mr) and intermediate variable Pm.Then, application server SjBy message { SIDj,h(mr),Pm,Ri,Ti,Ts} It is sent to the legitimacy that data picker's identity is verified in task publication with reward Distribution Center TRC.
Step V2: message { SID is being receivedj,h(mr),Pm,Ri,Ti,TsAfter, task publication and reward Distribution Center TRC are first First pass through inequality Tc2-Ti≤ Δ T judges the freshness of the message, wherein Tc2It is issued for task and rewards Distribution Center TRC Receive the time of the message.Application server is notified to abandon the message if being unsatisfactory for;If the message meets freshness It is required that then task is issued and reward Distribution Center TRC calculated resultAnd from calculated result W*Middle extraction Out with data picker uiRelevant information identity identifier PIDi, intermediate variableAnd intermediate variable Ci
Then, task publication calculates intermediate variable with reward Distribution Center TRCAnd judge equationIt is whether true.If set up, appoint Business publication thinks data picker u with reward Distribution Center TRCiFor legitimate user.Then, in task publication and reward distribution Heart TRC calculates intermediate variableAnd generate message { h (mr), Verj,Ti,Ts}.Subsequent task publication passes the message to application server S with reward Distribution Center TRCj.If above formula Ci * =CiInvalid, then task publication will inform application server data picker u with reward Distribution Center TRCiFor invalid data Picker.
Step V3: when receiving message { h (mr),Ver,Ti,TsAfter, application server SjIt needs to verify using the message Data picker uiLegitimacy.Firstly, application server SjCalculate intermediate variable And judge equation Ver*Whether=Ver meets.If equation is invalid, the verification process is terminated;If the equation is set up Application server SjThink that assumed name is h (mr) data picker uiFor legitimate user.Then, application server SjUtilize oneself Private key ajTo encrypted perception data CDATAiCarry out calculating intermediate variable: And it is taken out perception data.Then, application server SjIt is issued according to task and rewards standard provided by Distribution Center TRC Scale of price division is carried out to the acquisition data.It is assumed herein that its obtained grade is Gi∈G。
Step V4: firstly, application server SjCalculate intermediate variable km=aj·Ppub.Then, according to the acquisition data Grade GiAnd the assumed name h (m of data pickerr), and this perception data is calculated as key using intermediate variable km Prize voucher Tokeni=MACkm(Gi,h(mr),h(SIDj||y),Ti).Then, application server SjGenerate message { h (mr), Tokeni,SIDj,Gi,Ti,PjAnd it is passed into assumed name by normal communication channel as h (mr) data picker ui
Step V5: when receiving above-mentioned message { h (mr),Tokeni,SIDj,Gi,Ti,PjAfter, data picker uiIt extracts Benefit redemption voucher Token in the messageiAnd by the random number m of itself and replyr, time stamp TiAnd purpose application server SjIdentification identifier SIDjAnd its public key PjForm a redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>.Data acquisition Person uiIt needs to keep properly the redemption token with anti-leak or be stolen.The data flowchart of Qualify Phase such as Fig. 3 institute Show.
(5) stage is cashed in reward
Data picker uiCan hold that oneself redemption token rewarded at any time cashes.The flow chart in the stage is such as Shown in Fig. 3.Details are as follows for the step of token is cashed:
Step P1: data picker uiThe redemption token < m that oneself is savedr,Tokeni,Gi,SIDj,Pj,Ti> is logical It crosses secure communication channel and passes to task publication and reward Distribution Center TRC.
Step P2: task publication is receiving redemption token < m with reward Distribution Center TRCr,Tokeni,Gi,SIDj,Pj,Ti After >, calculating intermediate variable km=sP firstjAnd h (mr).Then, task publication calculates intermediate with reward Distribution Center TRC Variable Tokeni *=MACkm(Gi,h(mr),h(SIDj||y),Ti) and by itself and the benefit redemption voucher in redemption token TokeniIt is compared.If they are equal, task publication is with reward Distribution Center TRC according to scale of price table G defined Price the token is cashed.
If data picker uiHave it is multiple with above-mentioned similar redemption token, can be using above-mentioned steps to being held Redemption token cashed one by one.In addition, task publication also needs to safeguard that a token cashes table with reward Distribution Center TRC The token information that PLT was cashed to save.Every time when there is data picker to come to cash reward, task publication with Reward Distribution Center TRC inquires token first and cashes table PLT.If cashed, no longer cashed.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of mobile device authentication method for having anonymous reward distribution and privacy of identities protection, which is characterized in that its step It is as follows:
Step 1: task publication with reward Distribution Center to used elliptic curve, message authentication code algorithm, hash function and The scale of price table of acquisition data is initialized;Task publication generates oneself using pseudo random number algorithm with reward Distribution Center Private key and secret value and saved, and the public key of oneself is initialized using elliptic curve;
Step 2: several application servers and data picker issue in task and register at reward Distribution Center;
Step 3: when application server generate mobile application lack certain categorical data in some region when, to task publication with Reward Distribution Center sends type, precision and the task requests of position message comprising needing to acquire data;Task publication and prize The legitimacy of Distribution Center's verifying application server is encouraged, is then appointed to the publication of region specified by task requests message data acquisition Business;
Step 4: after receiving data acquisition session, data picker acquires data according to the requirement of task requests message and will Data collected pass to application server together with random assumed name generated;
Step 5: application server determines whether data picker is registration user, if it is receives the data, then basis The random assumed name of data picker calculates the reward voucher of perception data and reward voucher is returned to corresponding data picker; If it is not, then return step four;
Step 6: after data picker receives reward voucher, benefit redemption voucher is generated simultaneously using reward voucher and random assumed name It is sent to task publication and reward Distribution Center;Task publication is with reward Distribution Center to data picker according to acquisition data Scale of price table cashes benefit redemption voucher.
2. the mobile device authentication method according to claim 1 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the method using elliptic curve initialization public key is:
Step S11: task publication selects a big prime number p with reward Distribution Center, and selects the finite field being made of prime number p Elliptic curve E on GF (p)p(a, b): y1 2=x1 3+ax1+ b and meet 4a3+27b2≠ 0 (mod p), x1And y1Indicate oval bent Line EpThe independent variable and dependent variable of (a, b);Then, task publication is with reward Distribution Center in elliptic curve EpOne is chosen on (a, b) A rank is the basic point P of q;Wherein, a and b is finite fieldOn constant;
Step S12: task publication generates random number by pseudo random number algorithm with reward Distribution CenterAnd as certainly Oneself private key;Reward Distribution Center calculates its public key P using private key spub=sP;Wherein, finite fieldWith Afterwards, task publication regenerates random number by pseudo random number algorithm with reward Distribution CenterAnd secret value x, y are carried out Properly save.
3. the mobile device authentication method according to claim 2 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the message authentication algorithm is the comercial message authentication code algorithm of MD5 or SHA-1;Task publication is distributed with reward The hash function of center selection includes safe hash function h (), Hash function H () and Map-to-point hash function H1 (), and:Wherein, 0 l, 1 character string Length;The scale of price table is G={ G1, G2..., Gn, G1, G2..., GnIndicate n scale of price;Rewarding Distribution Center will Parameter { the E of generationp(a,b),P,Ppub, h (), H () } and open.
4. the mobile device authentication method according to claim 3 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the register method of the application server are as follows:
Step S1: application server SjBy its identification identifier SIDjIt is sent to task publication and reward Distribution Center;Application service Device SjRandom number is generated using pseudo random number algorithmAnd as the private key of oneself, while utilizing private key ajCalculate it Public key Pj=aj·P;
Step S2: task publication receives application server S with reward Distribution CenterjIdentification identifier SIDjAfterwards, h (SID is calculatedj | | y) andWherein, y indicates that task publication carries out certification institute to each application server with reward Distribution Center The secret value used;Task publication distributes center construction with reward and passes through secure communication channel for messagePass to application server Sj
Step S3: application server SjReceive messageAfterwards, by the message and private Key ajIt is saved, wherein MACk() is message authentication code algorithm, and k is key.
5. the mobile device authentication method according to claim 3 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the register method of the data picker are as follows:
Step U1: data picker uiChoose its identifier PIDiAnd corresponding password PWiThen, data picker uiUsing puppet with Machine figures method and generates random numberAnd intermediate variable is calculated using random number bData picker uiIt generates simultaneously By registration messageTask publication is passed to by exit passageway to be registered with reward Distribution Center;
Step U2: it is issued when task and receives data picker u with reward Distribution CenteriRegistration message Afterwards, following intermediate variable: A is calculatedi=h (PIDi| | x), HAi=h (Ai), Wherein, x indicates that task publication carries out each data picker with reward Distribution Center Secret value used in authenticating;Then, task publication is centrally generated message { V with reward distributioni,HAi,Bi, and by message { Vi, HAi,BiPass to data picker ui
Step U3: data picker uiReceive message { Vi,HAi,BiAfter, data picker uiBy message { Vi,HAi,BiIn ginseng Several and random number b constitutes parameter set { V togetheri,HAi,Bi, b } and save.
6. the mobile device authentication method according to claim 4 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the method for application server publication data acquisition session is in the step 3:
Step TR1: application server SjGenerate time stamp TsAnd utilize its private key ajCalculate intermediate variable Dj=H (aj·Ppub) andApplication server SjGenerate message { TASKs,SIDj,Pj,Qj,Ts, and by message {TASKs,SIDj,Pj,Qj,TsIt is sent to task publication and reward Distribution Center;Wherein, TASKsIt is data acquisition session, data Acquisition tasks TASKsIncluding acquire the regional scopes of data, data class and or various types data accuracy rating;SIDjWith PjRespectively application server SjIdentification identifier and public key;
Step TR2: task publication receives application server S with reward Distribution CenterjThe message of transmitted data harvesting request {TASKs,SIDj,Pj,Qj,Ts, task publication and reward distribution center calculation intermediate variableAnd judge intermediate variableIt is whether true, it such as sets up, task publication and prize It encourages Distribution Center and thinks application server SjIt is a legal application server, and calculates intermediate variable Sigj=sH1 (TASKs||SIDj||Ts);Task publication is centrally generated data acquisition session message { TASK with reward distributions,SIDj,Pj, Sigj,TsAnd data acquisition session message is broadcast to data acquisition session TASKsSpecified region.
7. the mobile device authentication method according to claim 6 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the method that data picker acquires data in the step 4 is:
Step TR3: data picker uiReceive data acquisition session message { TASKs,SIDj,Pj,Sigj,TsAfter, check it Whether equipment has data required by data acquisition session, if had, data picker uiCalculate intermediate variable Pexam=H1 (TASKs||SIDj||Ts) and judge equationWhether true, if the equation is set up, data are adopted Collection person uiAccording to data acquisition session TASKsRequirement acquire data;Wherein, PpubThe public affairs with reward Distribution Center are issued for task Key;
Step TR4: data picker uiMobile terminal according to data acquisition session TASKsRequirement acquire and generate and conform to The perception data SDATA askedi;Data picker uiMobile terminal generate time stamp TiAnd utilize time stamp TiWith its identity mark Know symbol PIDiGenerate random number mr;Data picker uiUtilize random number mrCalculate random assumed name h (mr) and intermediate variable H (mr·Ppub);Data picker uiCalculate following intermediate variable: Pm=mrP, Data Picker uiGenerate message { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsAnd transmit the message to application server Sj;Meanwhile Data picker uiBy random number mrIt is saved;Wherein, BiIt is data picker uiWhen registration in task publication and reward distribution The intermediate variable that the heart generates, b are the random number PW that data picker generatesiIt is the password of data picker.
8. the mobile device authentication method according to claim 7 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the method that application server calculates reward voucher in the step 5 is:
Step V1: application server SjReceive data picker uiMessage { the SID of transmissionj,h(mr),Pm,Ri,CDATAi,Ti,Ts} Afterwards, pass through Tc1-Ti≤ Δ T judges the freshness of message;If meeting the freshness requirement of message, application server SjFrom disappearing Cease { SIDj,h(mr),Pm,Ri,CDATAi,Ti,TsIn extract encrypted perception data CDATAi, data picker uiVacation Name h (mr) and intermediate variable Pm;Application server SjBy message { SIDj,h(mr),Pm,Ri,Ti,TsBe sent to task publication with Reward Distribution Center;Wherein, Tc1It is application server SjThe time of this message is received, Δ T is permitted maximum delay;
Step V2: task publication receives message { SID with reward Distribution Centerj,h(mr),Pm,Ri,Ti,TsAfter, pass through inequality Tc2-Ti≤ Δ T judges the freshness of message, if meet the freshness of message, task publication and reward distribution center calculation As a resultAnd from calculated result W*In extract and data picker uiRelevant information identity identifier PIDi, intermediate variableAnd intermediate variable Ci;Task publication and reward distribution center calculation intermediate variableAnd judge equation Ci *=CiIt is whether true, if set up, task Publication and reward distribution center calculation intermediate variableAnd it generates and disappears Cease { h (mr),Verj,Ti,Ts, task is issued and rewards Distribution Center for message { h (mr),Verj,Ti,TsPass to using clothes Be engaged in device Sj;If equation Ci *=CiInvalid, task publication informs application server S with reward Distribution CenterjData picker uiFor invalid data picker;Wherein, Tc2The time that the message is received with reward Distribution Center is issued for task;
Step V3: application server SjReceive message { h (mr),Ver,Ti,TsAfter, calculate intermediate variableAnd judge equation Ver*Whether=Ver is true, if the equation is set up, using clothes Be engaged in device SjUtilize the private key a of oneselfjWith encrypted perception data CDATAiCalculate intermediate variable:And it is taken out perception data;Application server SjAccording to task publication and reward score Standard provided by hair center is divided into grade G to the scale of price of acquisition datai
Step V4: application server SjCalculate intermediate variable km=aj·Ppub, according to the grade G for acquiring dataiAnd data acquisition Person uiAssumed name h (mr) and using intermediate variable km as the prize voucher Token of cipher key calculation perception datai=MACkm(Gi,h (mr),h(SIDj||y),Ti);Application server SjGenerate message { h (mr),Tokeni,SIDj,Gi,Ti,Pj, and by message { h (mr),Tokeni,SIDj,Gi,Ti,PjBy communication channel pass to assumed name be h (mr) data picker ui
9. the mobile device authentication method according to claim 8 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, carrying out the method that reward is cashed to benefit redemption voucher in the step 6 is:
Step 61: data picker uiReceive message { h (mr),Tokeni,SIDj,Gi,Ti,PjAfter, extract the reward in outbound message Exchange voucher TokeniAnd by the random number m of itself and replyr, time stamp TiAnd purpose application server SjIdentification identifier SIDjAnd its public key PjForm a redemption token < mr,Tokeni,Gi,SIDj,Pj,Ti>;Data picker uiIt saves to exchange and enable Board < mr,Tokeni,Gi,SIDj,Pj,Ti>;
Step 62: data picker uiBy the redemption token < m of preservationr,Tokeni,Gi,SIDj,Pj,Ti> is passed by communication channel Pass task publication and reward Distribution Center;
Step 63: task publication receives redemption token < m with reward Distribution Centerr,Tokeni,Gi,SIDj,Pj,TiAfter >, calculate Intermediate variable km=sPjAnd h (mr);Task publication and reward distribution center calculation intermediate variable Tokeni *=MACkm(Gi, h(mr),h(SIDj||y),Ti), and by intermediate variable Tokeni *With the benefit redemption voucher Token in redemption tokeniCompared Compared with if equal, task publication carries out redemption token according to the price of scale of price table G defined with reward Distribution Center It cashes.
10. the mobile device authentication method according to claim 9 for having anonymous reward distribution and privacy of identities protection, It is characterized in that, the identification identifier SIDjApplication server using sequence number provided by server machine production firm or The MAC Address of network interface card;The identifier PIDiIt is data picker uiPhone number, password PWiIt is data picker uiShifting The product ID of dynamic terminal;Task publication is cashed table PLT with one token of maintenance in reward Distribution Center and is cashed to save The token information crossed, when each data picker cashes reward, task publication is inquired token with reward Distribution Center and is cashed Table PLT is no longer cashed if cashed.
CN201910227277.0A 2019-03-25 2019-03-25 The mobile device authentication method for having anonymous reward distribution and privacy of identities protection Pending CN109889541A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910227277.0A CN109889541A (en) 2019-03-25 2019-03-25 The mobile device authentication method for having anonymous reward distribution and privacy of identities protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910227277.0A CN109889541A (en) 2019-03-25 2019-03-25 The mobile device authentication method for having anonymous reward distribution and privacy of identities protection

Publications (1)

Publication Number Publication Date
CN109889541A true CN109889541A (en) 2019-06-14

Family

ID=66934102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910227277.0A Pending CN109889541A (en) 2019-03-25 2019-03-25 The mobile device authentication method for having anonymous reward distribution and privacy of identities protection

Country Status (1)

Country Link
CN (1) CN109889541A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506845A (en) * 2023-06-19 2023-07-28 暨南大学 Privacy-protected Internet of vehicles crowd sensing excitation method and system
CN116506226B (en) * 2023-06-27 2023-09-19 杭州金智塔科技有限公司 Private data processing system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
WO2015127736A1 (en) * 2014-02-27 2015-09-03 华为技术有限公司 Method, device and system for user privacy protection
CN105847235A (en) * 2016-03-14 2016-08-10 安徽大学 Identity-based efficient anonymous batch authentication method in Internet of vehicles environment
CN107947913A (en) * 2017-11-15 2018-04-20 武汉大学 The anonymous authentication method and system of a kind of identity-based

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
WO2015127736A1 (en) * 2014-02-27 2015-09-03 华为技术有限公司 Method, device and system for user privacy protection
CN105847235A (en) * 2016-03-14 2016-08-10 安徽大学 Identity-based efficient anonymous batch authentication method in Internet of vehicles environment
CN107947913A (en) * 2017-11-15 2018-04-20 武汉大学 The anonymous authentication method and system of a kind of identity-based

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张俊松等: "群智感知环境下支持激励机制实施的匿名身份认证协议研究", 《小型微型计算机系统》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506845A (en) * 2023-06-19 2023-07-28 暨南大学 Privacy-protected Internet of vehicles crowd sensing excitation method and system
CN116506845B (en) * 2023-06-19 2023-09-15 暨南大学 Privacy-protected Internet of vehicles crowd sensing excitation method and system
CN116506226B (en) * 2023-06-27 2023-09-19 杭州金智塔科技有限公司 Private data processing system and method

Similar Documents

Publication Publication Date Title
Liu et al. Privacy-preserving raw data collection without a trusted authority for IoT
Zhu et al. Privacy-preserving authentication and data aggregation for fog-based smart grid
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
CN105871869B (en) Hash function and false identity anonymous bidirectional authentication method are based in mobile social networking
CN102171969B (en) A method for operating a network, a system management device, a network and a computer program therefor
CN110225016A (en) A kind of data hiding transmission method based on block chain network
CN108769023A (en) A kind of method for secret protection and system applied to intelligent perception
CN101834853B (en) Method and system for sharing anonymous resource
CN107749836A (en) User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability
Yu et al. Privacy-preserving power request in smart grid networks
CN110932854B (en) Block chain key distribution system and method for Internet of things
CN103236933B (en) For on-line real name Verification System and the authentication method thereof of online medical system
CN101282216B (en) Method for switching three-partner key with privacy protection based on password authentication
CN102594820B (en) Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things
CN108833373A (en) The instant messaging and anonymous access method of facing relation secret protection social networks
CN107155113A (en) The method and server of a kind of protection barrage information
Wang et al. One-round privacy-preserving meeting location determination for smartphone applications
CN101908961A (en) Multi-party secret handshaking method in short key environment
CN103281180B (en) User is protected to access the bill generation method of privacy in a kind of network service
Yang et al. Group time-based one-time passwords and its application to efficient privacy-preserving proof of location
CN109889541A (en) The mobile device authentication method for having anonymous reward distribution and privacy of identities protection
Chai et al. Threshold password authentication against guessing attacks in Ad hoc networks
CN107615704A (en) A kind of device, method and system of the anti-fishing of network
Tai et al. Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
JP2004328293A (en) Electronic ticket, electronic ticket system, authentication system, and information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190614

RJ01 Rejection of invention patent application after publication