Bidirectional access authentication method

一种认证方法、双向接入的技术,应用在用户身份/权限验证、安全装置、计算机安全装置等方向,能够解决手动建立、管理复杂、难用户身份有效性验证等问题

Active Publication Date: 2008-04-09
CHINA IWNCOMM
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 3. Each access point must establish a secure channel with the background authentication server in advance, and this secure channel generally needs to be manually established, which is not conducive to system expansion
[0008] 4. Poor security reliability
[0013] 3. Key management adopts time synchronization method, and state management is complicated
The enabling and disabling of new keys depends on time judgment, and maintaining a synchronized clock in a distributed system is more complicated
Multiple system states and complicated management
[0014] The Chinese national standard GB15629.11 overcomes some disadvantages of the above-mentioned security protocols, but it cannot be directly used to solve the security access problem of RFID. It mainly has the following shortcomings: because it is based on the digital certificate mechanism, the excessive communication and management load Not suitable for RFID field
[0016] However, the identity-based public key mechanism also has its own shortcomings, that is, the identity of the other party is the public key, which cannot be changed arbitrarily, lacks an effective mechanism for management, cannot manage entity identities flexibly, and is difficult to verify the validity of user identities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional access authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The method of the present invention is realized by a trusted third party (TTP), and the trusted third party can be an authentication server or other devices that can realize authentication. The trusted third party is responsible for the physical authentication of user entity identity, system parameter generation and User parameter establishment process.

[0104] Referring to Fig. 1, the specific implementation method of the present invention is as follows:

[0105] 1) First, a trusted third party establishes system parameters, which include:

[0106] N: the product of two large prime numbers;

[0107] e: an integer and satisfy gcd(e, φ(N))=1;

[0108] d: an integer that satisfies ed≡1(modφ(N));

[0109] Strong one-way hash function h: {0, 1} * → Z φ(N) .

[0110] Among them, the private key of the system is d(master-key), and the parameters that the system can disclose are (N, e, h).

[0111] A trusted third party is responsible for keeping the system private key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mutual access authentication method, which comprises the following steps: 1) a first entity sends an access authentication request group to a second entity, the second entity verifies whether the sign of the first entity is correct, if it is, calculates the shared primary key of the second entity; 2) the second entity generates an access response group and sends to the first entity, the first entity verifies whether the sign of the access response group is correct, if it is, calculates the shared primary key of the first entity; 3) the first entity sends an access authentication acknowledgement group to the second entity, the second entity verifies the integrity of the access authentication acknowledgement; if the verification succeeds, the shared primary keys of the first and second entities are consistent, completing the access authentication. The access authentication method of mutual authentication, provided in this invention, is based on the identity mechanism and can be used for the verification of identity validity with simple operation and wide application range.

Description

field of invention [0001] The invention relates to a two-way access authentication method. Background technique [0002] For wireless networks, such as wireless local area network or wireless metropolitan area network, etc., its security problems are far more serious than wired Ethernet. For example, radio frequency identification tags (RFID), mobile terminals and access points of wireless personal area networks also face security issues. Before secure communication, the security authentication problem between the reader and the electronic tag in RFID must be effectively solved. Security authentication between mobile terminal and access point of wireless personal area network. Now the information of the electronic tag can be read as long as the card reader with the same function is used, and the same problem exists between the mobile terminal and the access point. Currently, there is no effective security solution in the field of RFID to solve this problem. [0003] The A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L2209/80H04L9/3271H04L9/0847H04L9/3247H04L9/321G06F21/445G06Q20/3823G06Q20/388G06Q20/4097H04L63/0869H04W12/069
Inventor 庞辽军曹军铁满霞黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products