Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication and key agreement method suitable for electricity consumption information collection system

A technology of identity authentication and key negotiation, which is applied in the field of information security, can solve problems such as inapplicability, and achieve the effects of enhancing security, preventing illegal monitoring or interception, and strict identity authentication and key negotiation processes

Active Publication Date: 2013-05-08
CHINA ELECTRIC POWER RES INST +2
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems that the traditional SSL protocol and digital certificate authentication methods are not applicable in the electricity consumption information collection system, the present invention provides an identity authentication and key agreement method suitable for the electricity consumption information collection system. The specific scheme is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication and key agreement method suitable for electricity consumption information collection system
  • Identity authentication and key agreement method suitable for electricity consumption information collection system
  • Identity authentication and key agreement method suitable for electricity consumption information collection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0057] Such as figure 1 In this embodiment, the signature authentication mechanism for digital certificate validity query by an authority is as follows: a CRL certificate server is configured at the master station, and the CRL certificate server signs the digital certificate information query result of the master station or the collection terminal; the collection terminal Need to verify master digital certificate C M At the same time, a set of random numbers is first generated, encrypted and then sent to the master station. The master station uploads the random number ciphertext generated by the collection terminal and the serial number of the digital certificate of the master station to the CRL certificate server, and the CRL certificate server queries the serial number of the certificate. Corresponding digital certificate status, and sign the random number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication and key agreement method suitable for an electricity consumption information collection system. On the basis of a traditional identity authentication and key agreement method, a digital certificate identity identification mechanism, a signature authentication mechanism using an authoritative institution to inquire the validity of a digital certificate, and a challenge response mechanism based on a symmetric key are introduced to achieve the identity authentication and key agreement of a master station and terminals. The method can effectively resist attacks such as faking of the master station, communication service flow analysis, password analysis and the like, and enhances the safety of the electricity consumption information collection system.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an identity authentication and key negotiation method suitable for an electricity consumption information collection system. Background technique [0002] The electricity consumption information collection system is a system that collects, processes and monitors electricity consumption information of power users in real time. The electricity, electricity charges, rates and other information involved in the system are related to the national economy and the people's livelihood, and the illegal use and leakage of information will cause national Security, social economy, and power grid operation pose great threats. Therefore, the electricity consumption information collection system should adopt relatively secure identity authentication and key agreement methods to ensure the confidentiality and integrity of transmitted data. At present, SSL communication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 翟峰赵兵刘鹰吕英杰付义伦岑炜李保丰孙志强梁晓兵
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products