Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system and method based on key management protocol

A key management protocol and key management technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc. The effect of improving safety performance

Inactive Publication Date: 2016-02-10
GLOBAL INNOVATION AGGREGATORS LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide an authentication system and method based on a key management protocol, to at least solve the problem in the prior art that communication parties cannot authenticate each other, thus reducing the security of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method based on key management protocol
  • Authentication system and method based on key management protocol
  • Authentication system and method based on key management protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] image 3 It is a preferred flowchart of an authentication method based on a key management protocol according to an embodiment of the present invention, which includes the following steps:

[0058] Step S302: The key management module receives identity information (ID information).

[0059] Step S304: the key management module sends an authentication request to the authentication module.

[0060] Step S306: the authentication module interacts with the long-term key storage module to acquire authentication information.

[0061] Step S308: the authentication module sends an authentication response to the key management module.

[0062] Step S310: the key management module generates a session key.

[0063] Step S312: the key management module sends the session key to the short-term key storage module.

[0064] Step S314: the short-term key storage module sends the session key to the routing protocol module.

[0065] Step S316: the routing protocol module uses the sess...

Embodiment 2

[0067] Figure 4 is another preferred flowchart of an authentication method based on a key management protocol according to an embodiment of the present invention, which includes the following steps:

[0068] Step S402: the routing protocol module sends a request session key message to the short-term key storage module.

[0069] Step S404: the short-term key storage module sends a session key request message to the key management module.

[0070] Step S406: the key management module interacts with the identity module to obtain identity information.

[0071] Step S408: The key management module interacts with the long-term key storage module to acquire authentication information.

[0072] Step S410: the key management module performs an authentication process.

[0073] Step S412: the key management module generates a session key.

[0074] Step S414: the key management module sends the session key to the short-term key storage module.

[0075] Step S416: the short-term key ...

Embodiment 3

[0078] Figure 5 It is another preferred flowchart of the authentication method based on the key management protocol according to the embodiment of the present invention, which includes the following steps:

[0079] Step S502: the routing protocol module sends a session key request message to the key management module.

[0080] Step S504: the key management module interacts with the identity module to obtain identity information.

[0081] Step S506: The key management module interacts with the long-term key storage module to acquire authentication information.

[0082] Step S508: the key management module performs the authentication process.

[0083] Step S510: the key management module generates a session key.

[0084] Step S512: the key management module sends the session key to the short-term key management module.

[0085] Step S514: the short-term key management module sends the encrypted session key to the routing protocol module.

[0086] Step S516: the routing pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication system and method based on a key management protocol are disclosed. The authentication system based on the key management protocol comprises an identity module, a key management module, an authentication module, a key storage module and a routing protocol module. The authentication module is connected to the key storage module for acquiring authentication information from the key storage module, and then authenticating communication entities with the authentication information. The technical scheme resolves the problem in prior art that neither of the communicating parties can authenticate each other, thus ensuring the security of the communication.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular, to an authentication system and method based on Key Management Protocol (Key Management Protocol, KMP for short). Background technique [0002] The security of the routing protocol is a key technology. There are many working groups in the IETF to study and standardize it. Among them, the KARP working group mainly studies the authentication technology in the routing technology and the key management required in the authentication. In the KARP working group, a concept of KMP is proposed, in which KMP runs between two communication entities implementing routing protocols, provides authentication for these two communication entities, generates session keys and updates session keys. The reason why KMP is important is that the manual key management scheme is more dependent on the work of the administrator. Once the network scale becomes larger, the administrator wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3234
Inventor 端时立王鸿彦韦银星陈浩然周晨
Owner GLOBAL INNOVATION AGGREGATORS LLC