User attribution verification method and device based on group signature and computer equipment

A verification method and group signature technology, applied in the computer field, can solve the problems of deception, lack of automatic verification of work certificates, cumbersome verification of attribution, etc., and achieve the effect of automatic attribution verification.

Active Publication Date: 2019-10-08
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This invention relates to an algorithm for validating users' rights based on their own signatures or other factors like location (geographic) where they are located. It allows these signs to be used without being copied onto another system with which it cannot communicate directly. By comparing this code against existing codes stored locally at different locations, we can verify who has access granted them while preventing others from accessing those systems.

Problems solved by technology

The technical problem addressed in this patented text relating to improving trustworthiness during legal transactions related to certifications or loans made through traditional methods such as paper checks with no means to prevent forgery. Current systems rely heavily on human judgement and are prone to errors due to subjective factors like fatigue overlooking outdated documentation that may have been used without permission beforehand.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User attribution verification method and device based on group signature and computer equipment
  • User attribution verification method and device based on group signature and computer equipment
  • User attribution verification method and device based on group signature and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0050] refer to figure 1 , the embodiment of the present application provides a user attribution verification method based on group signature, which is applied to the attribution verification server, including:

[0051] S1. Receive the attribution verification application encrypted by the first private key sent by the user terminal, wherein the attribution verification application carries the terminal information of the attribution party corresponding to the user signature and the user, and the attribution verification server pre-stores information related to the attribution v

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user affiliation verification method and device based on a group signature, computer equipment and a storage medium. The method comprises the steps of receiving an affiliation verification application encrypted by a first private key and sent by a user terminal; decrypting the affiliation verification application by using a first public key corresponding to the first private key, thereby obtaining the user signature and terminal information of an affiliation party corresponding to the user; sending a group signature obtaining requirement to a terminal of a home party;receiving a group signature sent by a terminal of a home party, and decrypting the group signature by using a second public key corresponding to the second private key to obtain a group signature plaintext; judging whether the group signature plaintext is matched with the user signature or not; and if the group signature plaintext is matched with the user signature, judging that the user belongsto the home party. Therefore, accurate and automatic affiliation verification is realized.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products