Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Direct anonymous attestation method applied to credible mobile terminal platform

A mobile terminal and platform technology, applied in wireless communications, electrical components, security devices, etc., can solve problems such as large computational load, long key length, system security and performance bottlenecks, and achieve reduced computational overhead and high security and reliability. Effect

Active Publication Date: 2013-03-13
BEIHANG UNIV
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution has the disadvantage that every communication process needs to go through Privacy-CA, and Privacy-CA becomes the bottleneck of system security and performance
In order to make up for the above deficiencies, the TPMv1.2 specification adopts the Direct Anonymous Attestation (DAA) scheme proposed by Brickell et al. for the first time. Through the assumption of mathematical problems and the principle of knowledge proof signature, it satisfies the controllable anonymity and Under the premise of untraceability, the verification of the authenticity of the trusted platform is completed, and the participation of a trusted third party is not required in the process of signing and verification. However, the DAA scheme adopts the RSA cryptographic system and the key is too long, and the endorsement key pair ( Endorsement Key, EK) certificate management is complex, the authentication protocol interaction is complicated, and the amount of calculation is large. It is not suitable for mobile terminals with limited computing power and storage capacity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Direct anonymous attestation method applied to credible mobile terminal platform
  • Direct anonymous attestation method applied to credible mobile terminal platform
  • Direct anonymous attestation method applied to credible mobile terminal platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention mainly includes four entities: 1) Terminal manufacturer (Company, C); 2) Identity authority (Identity authority, I); 3) Trusted terminal equipment (S, H); 4) Verifier (Verifier, V ). Described technical method will be described in detail below in conjunction with accompanying drawing, figure 1 is a system architecture diagram; figure 2 Build a process map for identity; image 3 Diagram for the authentication process.

[0037] The main symbols and algorithm explanations are shown in Table 2.

[0038] Table 2 Main symbols

[0039]

[0040] Our approach can be divided into three phases: system initialization, identity establishment process, and identity verification process. Mathematical calculation in the method can call the function in the PBC storehouse to complete calculation, and wherein hash function can select the hash function in the OpenSSL storehouse, as MD5, SHA-1 etc., the detailed execution process of the present invention is as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a direct anonymous attestation method applied to a credible mobile terminal platform, which can realize the generation of a platform endorsement key (EK) pair, the establishment and revocation of a platform identity and the authentication of a mobile terminal identity by adopting a method based on identity signature and zero-knowledge proof signature. The method is divided into three stages, namely a system initialization stage, an identity establishment stage and an identity verification stage and comprises 9 steps in total, and the method is specifically as follows: stage 1: system initialization: step 1: performing the system initialization on a manufacturer; step 2: performing the system initialization on an identity authoritative institution; step 3: initializing an equipment EK pair; stage 2: identity establishment: step 4: sending a challenge number; step 5: making a response by terminal equipment; step 6: verifying and issuing an identity certificate; and the stage 3: identity verification: step 7: sending a challenge number; step 8: responding by the terminal equipment; and step 9: verifying the legitimacy of the identity certificate. The method provided by the invention meets the requirements of anonymous authentication for correctness, unforgeability and untraceability, and is suitable for a mobile terminal platform which has limited computational resources and is embedded with a TPM (trusted platform module).

Description

(1) Technical field [0001] The present invention relates to a direct anonymous certification method for embedding a trusted platform module (Trusted Platform Module, TPM) mobile terminal platform. The method belongs to the field of wireless local area network trusted access security. (2) Background technology [0002] With the continuous development of wireless local area network technology and the increasing popularity of mobile terminal equipment, it has gradually become a reality to access the network anytime and anywhere to obtain services. However, the security issues brought about by the openness of wireless network transmission media have become the bottleneck of applications. One of the security threats is In the wireless local area network environment, users can use any terminal device (mobile phone, Pad, notebook, etc.) Information is tampered with or stolen, etc. For example, a user uses a laptop that has been attacked to access some secret information through a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/069
Inventor 王世帅刘建伟赵朋川陈杰刘哲
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products