Slave device authentication method and system for master device

An authentication method and master device technology, which is applied in user identity/authority verification and key distribution, can solve the problems that counterfeiters are difficult to imitate, only consider authentication, increase manufacturing costs, etc.

Inactive Publication Date: 2015-03-04
JINAN UNIVERSITY
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The second method mainly relies on the relevant algorithms of the cryptographic system; the security properties of these algorithms only depend on the secrecy of the key, rather than on the idea that the manufacturer's technology is superior to the counterfeiter; its anti-counterfeiting protection level mainly depends on The length of the key used in the cryptographic algorithm makes it difficult for counterfeiters to imitate by expanding the length of the key
However, the authentication of devices and data disclosed in this patent has the following defects: (1) In order to calculate the shared key SK, both the slave device and the master device require the scalar multiplication calculation of points on the elliptic curve, so the authentication of the slave device is required The integrated circuit (IC) must configure the chip to realize the calculation, which increases the manufacturing cost of the general slave device; (2) this patent only considers the authentication of one master device to one slave device, and many master devices are often configured with multiple slaves, sometimes several slaves need to be authenticated at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Slave device authentication method and system for master device
  • Slave device authentication method and system for master device
  • Slave device authentication method and system for master device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] Such as figure 1 and 2 As shown, this embodiment discloses a method for authenticating a master device to its slave devices, wherein the steps for the master device to authenticate a slave device are as follows:

[0075] (1) Generate key: generate public parameter pps and pseudo-random function of the system The symmetric key K and the private key / public key pair (sk, PK) between the slave device and the master device that need to be authenticated; specifically:

[0076] In this step, public parameter pps={G, P, p, q}, symmetric key space are generated based on the public key cryptosystem on the elliptic curve and a pseudorandom function Among them, p and q are two large prime numbers in the public parameters, which are respectively 1024 bits and 160 bits in the present embodiment, satisfying p=αq+1, and α is a large prime number factor, and G is based on E(F on the elliptic curve p ) on an additive group, P is a generator of order q of G;

[0077] Pick the priv...

Embodiment 2

[0123] In this embodiment, a method for authenticating a master device to its slave devices is disclosed. The difference between this embodiment and Embodiment 1 is that in this embodiment, the master device simultaneously targets multiple slave devices C 1 ,...,C L for authentication, such as Figure 7 As shown, the specific steps are as follows:

[0124] S1. Generate a key: select the public parameter pps of the system and a pseudo-random function A symmetric key K and each slave device C to be authenticated i Private key / public key pair (sk i , PK i), where 1≤i≤L, L is the total number of slave devices that need to be authenticated at the same time, L>1; specifically:

[0125] In this step, public parameter pps={G, P, p, q}, symmetric key space are generated based on the public key cryptosystem on the elliptic curve pseudorandom function and each slave device S i public key PK i ; Among the public parameters, p and q are two large prime numbers, satisfying p=αq+...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a slave device authentication method and system for a master device. The authentication method comprises the following steps: a common parameter, a symmetric key, a pseudo-random function, and a public key / private key between the master device and a slave device are generated, and the master device reads and records the data of the current state of the slave device and then sends challenge information to the slave device; the slave device outputs a random shared key corresponding to the challenge information and a data identifier by virtue of the pseudo-random function with a seed key, and then generates a digital signature corresponding to the read data according to the private key and the random shared key; after receiving response information containing the digital signature, the master device recovers the corresponding random shared key by virtue of the symmetric key and the pseudo-random function first and then authenticates the effectiveness of the response information in combination with the public key and the digital signature. The method can authenticate a plurality of slave devices at the same time and has the advantages of high computational efficiency and low communication cost.

Description

technical field [0001] The invention belongs to the technical field of authentication of electronic equipment, and in particular relates to a method and system for authenticating a master device to its slave devices. Background technique [0002] Electronic equipment and electronic accessories have been widely used in many fields, such as electronic communication equipment such as computers, smart phones, and network devices, electronic equipment and electronic accessories such as B-ultrasound, nuclear magnetic resonance imaging, and hyperbaric oxygen chambers in medical and health care. Generally speaking, brand-name electronic equipment and accessories with pure quality and good reputation are favored by consumers. At the same time, counterfeit well-known brand-name products made of inferior materials are increasingly becoming a major target for counterfeiters. In order to protect the interests of electronic equipment and its accessories companies and consumers, related i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 卢建朱曾小飞周继鹏翁健王洁江俊晖
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products