Unlock instant, AI-driven research and patent intelligence for your innovation.
Slave device authentication method and system for master device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An authentication method and master device technology, which is applied in user identity/authority verification and key distribution, can solve the problems that counterfeiters are difficult to imitate, only consider authentication, increase manufacturing costs, etc.
Inactive Publication Date: 2015-03-04
JINAN UNIVERSITY
View PDF2 Cites 24 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
The second method mainly relies on the relevant algorithms of the cryptographic system; the security properties of these algorithms only depend on the secrecy of the key, rather than on the idea that the manufacturer's technology is superior to the counterfeiter; its anti-counterfeiting protection level mainly depends on The length of the key used in the cryptographic algorithm makes it difficult for counterfeiters to imitate by expanding the length of the key
However, the authentication of devices and data disclosed in this patent has the following defects: (1) In order to calculate the shared key SK, both the slave device and the master device require the scalar multiplication calculation of points on the elliptic curve, so the authentication of the slave device is required The integrated circuit (IC) must configure the chip to realize the calculation, which increases the manufacturing cost of the general slave device; (2) this patent only considers the authentication of one master device to one slave device, and many master devices are often configured with multiple slaves, sometimes several slaves need to be authenticated at the same time
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0074] Such as figure 1 and 2 As shown, this embodiment discloses a method for authenticating a master device to its slave devices, wherein the steps for the master device to authenticate a slave device are as follows:
[0075] (1) Generate key: generate public parameter pps and pseudo-random function of the system The symmetric key K and the private key / public key pair (sk, PK) between the slave device and the master device that need to be authenticated; specifically:
[0076] In this step, public parameter pps={G, P, p, q}, symmetric key space are generated based on the public key cryptosystem on the elliptic curve and a pseudorandom function Among them, p and q are two large prime numbers in the public parameters, which are respectively 1024 bits and 160 bits in the present embodiment, satisfying p=αq+1, and α is a large prime number factor, and G is based on E(F on the elliptic curve p ) on an additive group, P is a generator of order q of G;
[0077] Pick the priv...
Embodiment 2
[0123] In this embodiment, a method for authenticating a master device to its slave devices is disclosed. The difference between this embodiment and Embodiment 1 is that in this embodiment, the master device simultaneously targets multiple slave devices C 1 ,...,C L for authentication, such as Figure 7 As shown, the specific steps are as follows:
[0124] S1. Generate a key: select the public parameter pps of the system and a pseudo-random function A symmetric key K and each slave device C to be authenticated i Private key / public key pair (sk i , PK i), where 1≤i≤L, L is the total number of slave devices that need to be authenticated at the same time, L>1; specifically:
[0125] In this step, public parameter pps={G, P, p, q}, symmetric key space are generated based on the public key cryptosystem on the elliptic curve pseudorandom function and each slave device S i public key PK i ; Among the public parameters, p and q are two large prime numbers, satisfying p=αq+...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a slave device authentication method and system for a master device. The authentication method comprises the following steps: a common parameter, a symmetric key, a pseudo-random function, and a public key / private key between the master device and a slave device are generated, and the master device reads and records the data of the current state of the slave device and then sends challenge information to the slave device; the slave device outputs a random shared key corresponding to the challenge information and a data identifier by virtue of the pseudo-random function with a seed key, and then generates a digital signature corresponding to the read data according to the private key and the random shared key; after receiving response information containing the digital signature, the master device recovers the corresponding random shared key by virtue of the symmetric key and the pseudo-random function first and then authenticates the effectiveness of the response information in combination with the public key and the digital signature. The method can authenticate a plurality of slave devices at the same time and has the advantages of high computational efficiency and low communication cost.
Description
technical field [0001] The invention belongs to the technical field of authentication of electronic equipment, and in particular relates to a method and system for authenticating a master device to its slave devices. Background technique [0002] Electronic equipment and electronic accessories have been widely used in many fields, such as electronic communication equipment such as computers, smart phones, and network devices, electronic equipment and electronic accessories such as B-ultrasound, nuclear magnetic resonance imaging, and hyperbaric oxygen chambers in medical and health care. Generally speaking, brand-name electronic equipment and accessories with pure quality and good reputation are favored by consumers. At the same time, counterfeit well-known brand-name products made of inferior materials are increasingly becoming a major target for counterfeiters. In order to protect the interests of electronic equipment and its accessories companies and consumers, related i...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.