Unlock instant, AI-driven research and patent intelligence for your innovation.

An entity authentication method, device and system

An entity and authentication request technology, applied in transmission systems, security devices, digital transmission systems, etc., can solve the problems of inability to execute authentication protocols and increase the burden on network entities, and achieve the effects of saving computing costs and improving operating efficiency

Active Publication Date: 2018-09-28
CHINA IWNCOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current authentication methods are generally based on cryptographic operations, requiring entities in the network to preset corresponding cryptographic algorithms, otherwise the authentication protocol cannot be executed; moreover, even if the entity presets cryptographic algorithms, this type of authentication protocol will also fail when executed. Causes computational overhead to entities in the network, such as authentication methods based on symmetric and asymmetric cryptographic algorithms, all require entities to perform encryption and decryption operations, thus increasing the resource burden on network entities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An entity authentication method, device and system
  • An entity authentication method, device and system
  • An entity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The entity authentication method, device and system provided by the present invention will be described in more detail below with reference to the accompanying drawings and embodiments.

[0026] In order to solve the above-mentioned technical problems in the background technology, the present invention provides a lightweight entity authentication method, device and system, such as figure 1 , figure 2 As shown, the entity authentication method provided by the embodiment of the present invention includes the following steps:

[0027] Step 1, entity A sends an authentication request message to entity B, and the authentication request message includes the data N1 locally generated by entity A and the result SN1 of the XOR operation of PSK, where PSK is a shared key between A and B;

[0028] In the embodiment of the present invention, before the authentication, the entity A and the entity B have shared a key, which is called a pre-shared key PSK (Pre-Shared key) in this em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an entity authentication method, device and system. The method includes: entity A sends an authentication request message to entity B, and the authentication request message includes data N1 locally generated by entity A and result SN1 of PSK XOR operation, PSK is the key shared by A and B; Entity B receives the authentication request message sent by entity A, XORs SN1 in the authentication request message with PSK, processes the result of the XOR operation according to the agreed rules, and performs XOR operation with PSK again Get SON1, send SON1 to entity A through the authentication response message; entity A receives the authentication response message sent by entity B, performs XOR operation between SON1 and PSK in the authentication response message, and compares the result of XOR operation with N1 according to the agreed rules Compare the processed results, and identify whether the entity B is legal according to the comparison results. The invention effectively saves the calculation overhead in the identification process and improves the operation efficiency of the identification process.

Description

technical field [0001] The invention relates to the application field of network security in information security technology, in particular to an entity authentication method, device and system. Background technique [0002] Resource-constrained wireless networks, including SN (Sensor Network, sensor network), MFAN (Magnetic Field Area Network, magnetic domain network), RFID (Radio Frequency Identification, radio frequency identification) network, etc., are used in military, environmental monitoring, forest fire prevention, health Medical, logistics and other fields have broad application prospects, and are playing an increasingly important role in these fields. Due to the wireless and broadcast characteristics of this type of network during communication, it is vulnerable to attacks such as eavesdropping, tampering, forgery, and entity capture and duplication. It is necessary to introduce low-overhead authentication and message confidentiality mechanisms to ensure Entity l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04W12/04H04W12/06H04W12/0431H04W12/069
CPCH04L9/3271H04W4/80H04W12/041H04W12/069
Inventor 杜志强侯宇铁满霞胡亚楠张国强李琴
Owner CHINA IWNCOMM