Identification authentication method of open network base on dynamic credible third-party

A technology of identity authentication and open network, applied in user identity/authority verification, public key for secure communication, special data processing applications, etc. The effect of controlling identity authentication, improving reliability, and enhancing controllability

Active Publication Date: 2009-03-04
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The private key production center knows the private keys of all entities in the domain, and there is a possibility that the entity may maliciously impersonate or read the interaction information between entities, but the entity cannot file an effective complaint against its fraudulent behavior, which makes the entity provide services to a trusted third party. not controllable
Although some scholars in the research field of cryptography have proposed to distribute the tasks of the certificate authority or private key production center to two or one group through the idea of ​​trapping to achieve the function of apportioning or weakening their functions, these authentication schemes are established. The preconditions are that one or more third parties relied on are completely credible before entity interaction, and they are also credible in the entire network service. This static trust assumption is not in line with the open network environment. Due to the dynamic characteristics of entities, the dynamic behavior of trusted third parties must be considered when implementing identity authentication between entities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method of open network base on dynamic credible third-party
  • Identification authentication method of open network base on dynamic credible third-party
  • Identification authentication method of open network base on dynamic credible third-party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to illustrate the implementation scheme of authentication described in the present invention, we give the following best example, and describe in more detail the implementation scheme of identity authentication based on a dynamic trusted third party in an open network.

[0036] according to figure 1 Given the identity authentication architecture diagram in , it is assumed that the interactive entities participating in identity authentication in the open network are A and B, where: A is the resource requester, B is the resource provider, and their domains are D a and D b . And, suppose that within a certain period of time, domain D a The selected dynamic trusted third party is denoted as C a , domain D b The selected dynamic trusted third party is denoted as C b , the specific implementation scheme of identity authentication between entities A and B described in the present invention is:

[0037] The first stage: identity authentication information collect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method based on a dynamic trusted third party in an open network. By constructing an authentication system structure containing a trust decision-making database, the dynamic trusted third party and an entity joining the network service, the proposal leads an interactive entity not only to obtain necessary information related to identity authentication but also to obtain a trust feedback set of the trusted third party depended by the interactive entity when the interactive entity is carried out identity authentication; and according to the trust feedback set, the entity independently selects a trust decision-making function and calculates the reliability thereof. The proposal consists of four phases of identity authentication information collecting, identity authentication reliability calculating and judging, identity authentication information mutual judging and identity authentication information feed backing. The invention not only realizes dynamic control to the behavior of the trusted third party by the identity authentication entity in the open network, but also improves the reliability of identity authentication by carrying out reliability calculating and judging.

Description

technical field [0001] The invention relates to an implementation scheme for realizing identity authentication in an open network, which mainly uses distributed computing technology, trusted computing technology and trust management technology to solve the problem of identity authentication between entities in an open network, and belongs to distributed computing, information security , instant messaging cross-technical application fields. Background technique [0002] The deep popularization and continuous expansion of the network has prompted the emergence of new application requirements and application models. The open network with the main goal of resource sharing and collaborative services is gradually becoming an attractive research field at home and abroad. The open network is more complex than the general network, mainly manifested in: the dynamic change of the participating entities, the large number of them, the majority of them do not know each other, the strong h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06G06F17/30
Inventor 王汝传王海艳张琳王杨李捷
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products