Customizable network identity authentication method based on SM2 algorithm

A network identity and authentication method technology, applied in the field of network identity authentication, can solve problems such as low encryption strength, identity forgery, and threats to information system security, and achieve the effect of protecting security and eliminating the risk of identity forgery

Active Publication Date: 2015-04-08
ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Network information security issues first need to solve the problem of information network identity authentication. Most of the existing network identity authentication methods use the RSA algorithm, which has low encryption strength, and there is a risk of identity forgery during network data transmission, which threatens the security of information systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Customizable network identity authentication method based on SM2 algorithm
  • Customizable network identity authentication method based on SM2 algorithm
  • Customizable network identity authentication method based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The invention proposes a self-defining identity authentication method based on the SM2 cipher algorithm, defines the content of the identity authentication data packet, and makes an agreement on the identity authentication process.

[0044] The identity authentication method embodiment that can be customized based on the SM2 cryptographic algorithm of the present invention includes the following parts:

[0045] S1 Entity A sends data packet 1 to entity B;

[0046] S2 Entity B processes data packet 1;

[0047] S3 Entity B sends data packet 2 to entity A;

[0048] S4 Entity A processes data packet 2;

[0049] S5 Entity A sends data packet 3 to entity B;

[0050] S6 Entity B processes data packet 3;

[0051] The present invention achieves the purpose of identity authentication by sending 3 data packets and correspondingly processing the data packets. The communication parties realize identity authentication by sending three identity authentication data packets. The dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A customizable network identity authentication method based on SM2 algorithm can realize the identity authentication by exchanging three data packets between an entity A and an entity B through communication and by processing the data packets. Based on TCP / IP (transmission control protocol / internet protocol), the data packets can be certificated by subjecting the contents of the data packets to encryption and signature by use of SM2 algorithm. The aim of customizable identity authentication can be realized by defining the value of a reserved word X in the data packets. The SM2 algorithm used in the invention has high encryption strength; and the method for realizing customizable identity authentication based on the reversed word can realize the identity authentication of a data communication party at the initial stage of a session, and can be used for agreement of encrypted data transmission symmetric keys, thereby eliminating the risk of identity fraud during network data transmission and protecting the security of the information system.

Description

technical field [0001] The invention relates to a self-definable network identity authentication method based on the SM2 algorithm. Background technique [0002] In recent years, network security issues have become increasingly prominent, and hacker intrusions and network attacks are increasing. With the continuous popularization of computer network technology, the public uses computers more and more. In particular, the construction of public information infrastructure has promoted government and enterprise Increasingly dependent on information systems, some businesses and systems related to the national economy and people’s livelihood have encountered unprecedented security challenges, such as the WikiLeaks website leaking a large amount of government confidential information; The attack resulted in the leakage of more than 6 million user data. These accidents fully illustrate the importance of network security to countries, governments and enterprises. [0003] The infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 胡朝辉梁智强江泽鑫陈炯聪梁志宏周强峰石炜君梁毅成骆书剑
Owner ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products