CN112035855A - Access control system based on privacy information on crowd funding platform - Google Patents
Access control system based on privacy information on crowd funding platform Download PDFInfo
- Publication number
- CN112035855A CN112035855A CN202010816890.9A CN202010816890A CN112035855A CN 112035855 A CN112035855 A CN 112035855A CN 202010816890 A CN202010816890 A CN 202010816890A CN 112035855 A CN112035855 A CN 112035855A
- Authority
- CN
- China
- Prior art keywords
- user
- mobile terminal
- crowd
- local server
- crowd funding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 10
- 239000004576 sand Substances 0.000 claims abstract description 9
- 238000013507 mapping Methods 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 3
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Automation & Control Theory (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of private information access control, and discloses an access control system based on private information on a crowd-funding platform, which comprises: cloud authentication server S running with client information access system software and erected on crowd-funding cloud platformCAMobile terminal MT running crowd funding cloud platform system software and used for uploading customer informationSLocal server LS running crowd funding cloud platform system software and used for collecting customer informationR(ii) a Cloud authentication server SCARespectively with mobile terminal MTSAnd a local server LSRMaking a communication connection, the local server LSRWith mobile terminal MTSCarrying out communication connection; when the mobile terminal MTSUser U ofSWhen customer information M is input on crowd funding cloud platform, MT (mobile terminal)SUser U ofSEncrypting the client information M on the client information access system, andand specifies a local server LSRCrowd funding project management user URIs the only decryptor. The invention solves the problem that how to prevent the client information from being leaked when the crowd funding platform collects the client information in legal compliance.
Description
Technical Field
The invention relates to the technical field of private information access control, in particular to an access control system based on private information on a crowd funding platform.
Background
With the rapid development of the internet financial industry, crowd funding becomes a popular financing mode, a crowd funding platform attracts more and more entrepreneurship-type enterprises, a plurality of individual entrepreneurs start to meet the capital requirements of entrepreneurship development through the crowd funding platform, and the internet enterprises and financial institutions also have a lot of online crowd funding platforms. When investors and financers enter a crowd funding platform to use real identity information for registration and need to bind mobile phone numbers and bank cards, how to collect customer information on the basis of legal regulations is achieved, leakage of the customer information is prevented, and purposes except for crowd funding projects which are not approved by customers to use the customer information without permission are avoided.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an access control system based on privacy information on a crowd-funding platform, which aims to solve the problem of how to prevent the leakage of client information when the crowd-funding platform collects the client information in legal compliance.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
an access control system based on privacy information on crowd funding platform, comprising: cloud authentication server S running client information access system softwareCAMobile terminal MT for uploading customer informationSLocal server LS for collecting client informationR;
Cloud authentication server SCARespectively with mobile terminal MTSAnd a local server LSRMaking a communication connection, the local server LSRWith mobile terminal MTSCarrying out communication connection;
mobile terminal MTSUser U ofSEncrypting the client information M on the client information access system and specifying a local server LSRCrowd funding project management user URThe method is a unique decryptor and specifically comprises the following steps:
(ii) the customer information access system to the mobile terminal MTSUser U ofSThe following parameters are disclosed: group G, G1Is a prime number q, bilinear mappingG×G→G1The order of point P is q;
② mobile terminal MTSUser U ofSSelecting s as ZqCalculating QSD, and Q isSSend to local server LSRCrowd funding project management user UR;
③ local Server LSRCrowd funding project management userURSelecting r epsilon ZqCalculating QRrP, and QRTo a mobile terminal MTSUser U ofS;
Mobile terminal MTSUser U ofSComputing and sending shared secret keysTo the local server LSRCrowd funding project management user UR;
Local server LSRCrowd funding project management user URComputing and sending shared secret keysFor mobile terminal MTSUser U ofS;
After the data exchange of the round, the MTSUser U ofSAnd a local server LSRCrowd funding project management user URGet the same key
Seventhly, moving the terminal MTSUser U ofSThe prime numbers kappa and pi are selected so that kappa x pi becomes K and so that χ satisfies
Movable terminal MT |)SUser U ofSSelectingAnd starts to calculate the customer information M ═ (M, …, M)s)∈{0,1}sIs (C) is the encrypted ciphertext C ═ C1,…,Cl) Wherein
Sending the ciphertext C to the local Server LSRCrowd funding project management user UR。
Further, the local server LSRCrowd funding project management user URThe ciphertext C of the client information M is decrypted to calculate the plaintext
Further, the cloud authentication server SCAAnd the cloud platform is erected on the crowd funding cloud platform.
Further, the mobile terminal MTSAnd a local server LSRThe crowd funding cloud platform system software is operated on the cloud platform.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
according to the invention, the cloud authentication server running the client information access system is erected on the crowd-funding cloud platform, when a client inputs real identity information, binds a mobile phone number and a bank card on the crowd-funding cloud platform, a user encrypts the client information on the client information access system, and designates a crowd-funding project management user on the local server as a unique decryptor, and the user and the crowd-funding project management user on the local server generate the same secret key in a mutual verification modeI.e. only possession of the keyThe crowd funding project management user on the local server can recover the ciphertext of the client information of the user into correct plaintext, and other users cannot decrypt the correct plaintext information even if the client information ciphertext is illegally obtained, so that the problem of client information leakage is solved.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An access control system based on privacy information on crowd funding platform, comprising: cloud authentication server S running with client information access system software and erected on crowd-funding cloud platformCAMobile terminal MT running crowd funding cloud platform system software and used for uploading customer informationSLocal server LS running crowd funding cloud platform system software and used for collecting customer informationR;
Cloud authentication server SCARespectively communicating with mobile terminal MT through network communication equipmentSAnd a local server LSRMaking a communication connection, the local server LSRWith mobile terminal MTSPerforming communication connection through network communication equipment;
when the mobile terminal MTSUser U ofSWhen customer information M is input on crowd funding cloud platform, MT (mobile terminal)SUser U ofSEncrypting the client information M on the client information access system and specifying a local server LSRCrowd funding project management user URThe method is a unique decryptor and specifically comprises the following steps:
(ii) the customer information access system to the mobile terminal MTSUser U ofSThe following parameters are disclosed: group G, G1Is a prime number q, bilinear mappingG×G→G1The order of point P is q;
② mobile terminal MTSUser U ofSSelecting s as ZqCalculating QSD, and Q isSSend to local server LSRCrowd funding project management user UR;
③ local Server LSRCrowd funding project management user URSelecting r epsilon ZqCalculating QRrP, and QRTo a mobile terminal MTSUser U ofS;
Mobile terminal MTSUser U ofSComputing and sending shared secret keysTo the local server LSRCrowd funding project management user UR;
Local server LSRCrowd funding project management user URComputing and sending shared secret keysFor mobile terminal MTSUser U ofS;
After the data exchange of the round, the MTSUser U ofSAnd a local server LSRCrowd funding project management user URGet the same key
Seventhly, moving the terminal MTSUser U ofSThe prime numbers kappa and pi are selected so that kappa x pi becomes K and so that χ satisfies
Movable terminal MT |)SUser U ofSSelectingAnd starts to calculate the customer information M ═ (M, …, M)s)∈{0,1}sIs (C) is the encrypted ciphertext C ═ C1,…,Cl) Wherein
The ciphertext C is then sent to the local server LSRCrowd funding project management user UR;
Ninthly local server LSRCrowd funding project management user URThe ciphertext C of the client information M is decrypted to calculate the plaintext
When the mobile terminal MTSUser U ofSSpecifying a local Server LSRCrowd funding project management user URAs the only decryptor, the mobile terminal MTSUser U ofSWith local servers LSRCrowd funding project management user URGenerating the same key by adopting interactive verification modeI.e. only possession of the keyLocal server LS ofRCrowd funding project management user URCan MT be movedSUser U ofSRecovering correct plaintext M from ciphertext C of client information Mi′。
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. An access control system based on privacy information on crowd funding platform, comprising: cloud authentication server S running client information access system softwareCAMobile terminal MT for uploading customer informationSLocal server LS for collecting client informationR;
Cloud authentication server SCARespectively with mobile terminal MTSAnd a local server LSRMaking a communication connection, the local server LSRWith mobile terminal MTSCarrying out communication connection;
mobile terminal MTSUser U ofSEncrypting the client information M on the client information access system and specifying a local server LSRCrowd funding project management user URThe method is a unique decryptor and specifically comprises the following steps:
(ii) the customer information access system to the mobile terminal MTSUser U ofSThe following parameters are disclosed: group G, G1Is a prime number q, bilinear mappingThe order of point P is q;
② mobile terminal MTSUser U ofSSelecting s as ZqCalculating QSD, and Q isSSend to local server LSRCrowd funding project management user UR;
③ local Server LSRCrowd funding project management user URSelecting r epsilon ZqCalculating QRrP, and QRTo a mobile terminal MTSUser U ofS;
Mobile terminal MTSUser U ofSComputing and sending shared secret keysTo the local server LSRCrowd funding project management user UR;
Local server LSRCrowd funding project management user URComputing and sending shared secret keysFor mobile terminal MTSUser U ofS;
After the data exchange of the round, the MTSUser U ofSAnd a local server LSRCrowd funding project management user URGet the same key
Seventhly, moving the terminal MTSUser U ofSThe prime numbers kappa and pi are selected so that kappa x pi becomes K and so that χ satisfies
Movable terminal MT |)SUser U ofSSelectingAnd starts to calculate the customer information M ═ (M, …, M)s)∈{0,1}sIs (C) is the encrypted ciphertext C ═ C1,…,Cl) Wherein
Sending the ciphertext C to the local Server LSRCrowd funding project management user UR。
2. The crowd-funding platform privacy information based access control system of claim 1, wherein the local server LS is configured to provide privacy information to the crowd-funding platformRCrowd funding project management user URThe ciphertext C of the client information M is decrypted to calculate the plaintext
3. The crowd funding platform privacy information based access control system of claim 2, wherein the cloud authentication server SCAAnd the cloud platform is erected on the crowd funding cloud platform.
4. The crowd-funding platform privacy-based access control system of claim 3, wherein the MT is configured to perform operations on the mobile terminal MTSAnd a local server LSRThe crowd funding cloud platform system software is operated on the cloud platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010816890.9A CN112035855A (en) | 2020-08-14 | 2020-08-14 | Access control system based on privacy information on crowd funding platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010816890.9A CN112035855A (en) | 2020-08-14 | 2020-08-14 | Access control system based on privacy information on crowd funding platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112035855A true CN112035855A (en) | 2020-12-04 |
Family
ID=73577339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010816890.9A Pending CN112035855A (en) | 2020-08-14 | 2020-08-14 | Access control system based on privacy information on crowd funding platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112035855A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1596521A (en) * | 2001-11-30 | 2005-03-16 | 国际商业机器公司 | Information content distribution based on privacy and/or personal information |
CN1777097A (en) * | 2004-10-01 | 2006-05-24 | 深谷博美 | Enciphered data issuing method, enciphering device and programe, deciphering device and programe, |
CN108512662A (en) * | 2018-04-12 | 2018-09-07 | 上海海事大学 | The hiding multimachine structure encryption method of support policy on a kind of lattice |
US20190007423A1 (en) * | 2017-06-30 | 2019-01-03 | Fortinet, Inc. | Automatic electronic mail (email) encryption by email servers |
CN110086804A (en) * | 2019-04-25 | 2019-08-02 | 广州大学 | A kind of internet of things data method for secret protection based on block chain and reliable hardware |
-
2020
- 2020-08-14 CN CN202010816890.9A patent/CN112035855A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1596521A (en) * | 2001-11-30 | 2005-03-16 | 国际商业机器公司 | Information content distribution based on privacy and/or personal information |
CN1777097A (en) * | 2004-10-01 | 2006-05-24 | 深谷博美 | Enciphered data issuing method, enciphering device and programe, deciphering device and programe, |
US20190007423A1 (en) * | 2017-06-30 | 2019-01-03 | Fortinet, Inc. | Automatic electronic mail (email) encryption by email servers |
CN108512662A (en) * | 2018-04-12 | 2018-09-07 | 上海海事大学 | The hiding multimachine structure encryption method of support policy on a kind of lattice |
CN110086804A (en) * | 2019-04-25 | 2019-08-02 | 广州大学 | A kind of internet of things data method for secret protection based on block chain and reliable hardware |
Non-Patent Citations (1)
Title |
---|
邓宇乔 等: "一种新的密码学原语研究――流程加密", 软件学报, no. 10 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108418680B (en) | Block chain key recovery method and medium based on secure multi-party computing technology | |
CN100477833C (en) | Authentication method | |
CN111431713B (en) | Private key storage method and device and related equipment | |
CN107528688A (en) | A kind of keeping of block chain key and restoration methods, device based on encryption commission technology | |
WO2020051710A1 (en) | System and process for managing digitized security tokens | |
WO2018133674A1 (en) | Method of verifying and feeding back bank payment permission authentication information | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
CN108876593A (en) | A kind of online transaction method and apparatus | |
CN112419021B (en) | Electronic invoice verification method, system, storage medium, computer equipment and terminal | |
CN112434026B (en) | Secure intellectual property mortgage financing method based on hash chain | |
CN110138548A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system | |
CN115913513B (en) | Distributed trusted data transaction method, system and device supporting privacy protection | |
CN108805574A (en) | Method of commerce based on secret protection and system | |
CN110098925A (en) | Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system | |
CN113673893A (en) | Retired power battery management method and system | |
CN110266483A (en) | Based on unsymmetrical key pond to and the quantum communications service station cryptographic key negotiation method of QKD, system, equipment | |
CN116401697A (en) | Electronic bidding privacy protection method based on blockchain | |
CN112911018A (en) | Block chain-based network community credit investigation management method | |
CN109389503A (en) | Block chain account model and implementation method | |
CN112035855A (en) | Access control system based on privacy information on crowd funding platform | |
CN111369251B (en) | Block chain transaction supervision method based on user secondary identity structure | |
Maram | Bitcoin generation using Blockchain technology | |
CN113656829A (en) | Medical data security sharing method based on lattice code and alliance chain | |
KR102475434B1 (en) | Security method and system for crypto currency | |
CN114493556B (en) | Receiver offline digital currency anonymous transaction method based on ID cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20201204 |