Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication system and method for smart power terminal

A smart power and terminal security technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of limited computing power of equipment, inability to obtain unique chip identification, and inability to protect platform user privacy, etc., to ensure security. and efficient operation, the system and method are flexible and effective, and achieve the effect of reliable certification

Active Publication Date: 2016-05-04
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with the above method is that the platform user’s EK is fixed, and when he / she conducts the above agreement with different verifiers multiple times, the transaction records can be linked by a third party (linkable), thus failing to protect the platform user’s privacy
After the platform obtains this signature, it can send it to a third-party verifier. The verifier verifies whether the AIK is legal according to the public key of the privacy CA. The signature of the legitimate AIK to the PCR is regarded as the legal signature of the TPM. The fatal flaw of the PrivacyCA scheme is: It must ensure that PrivaCyCA is credible, and must also have high responsiveness, so its application will surely become the bottleneck of trusted platform verification
TCG defined the TPM specification version 1.2 and proposed the direct anonymous authentication (direct anonymous attestation, referred to as DAA) protocol [15]. This protocol not only realizes TPM chip authentication, but also guarantees the anonymity of the authentication, and the verifier cannot obtain the unique label of the chip. But The protocol is very complicated, including 4 zero-knowledge proofs, and the amount of calculation is very large, including a large number of calculations, and the efficiency is low
[0006] However, due to the large number of smart power devices and the limited computing power of the devices themselves, it is necessary to provide a flexible and complete terminal access control mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication system and method for smart power terminal
  • Security authentication system and method for smart power terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0057] Such as figure 1 As shown, the present invention provides an intelligent power terminal security authentication system, the system includes a security detection server, a power server, an online monitoring server and an address registration server;

[0058] The security detection server, power server, and online monitoring server communicate with the smart power terminal respectively;

[0059] The security detection server communicates with the onlin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication system and method for a smart power terminal. The system comprises a security detection server, a power server, an online monitoring server and an address registration server. The method comprises the following steps that: firstly, the address registration server performs uniqueness detection on the terminal, and generates a registration serial number and transmits the generated registration serial number to the security detection server if the terminal is legal; the security detection server judges whether terminal key object information is matched with power service permission allocation request information of the terminal or not, and generates unique terminal identity authentication information; and the terminal performs authentication and registration on the power server to obtain corresponding services. The system and the method provided by the invention are flexible and effective. Reliable authentication of software is realized without hardware authentication. Meanwhile, the terminal identity authentication information is protected from being stolen. A security detection method which is more efficient and economical than an existing hardware authentication method is provided for the power terminal, so that secure and efficient running of a smart power grid into which an Internet technology is introduced is ensured.

Description

technical field [0001] The invention relates to the field of network security and security access, in particular to an intelligent power terminal security authentication system and method. Background technique [0002] With the construction of a strong smart grid in the country, Internet technology has been widely used in the generation, transmission, transformation, distribution, utilization and dispatching of smart grids. The introduction of Internet technology into the smart grid will effectively integrate power system infrastructure resources and communication facility resources, promote advanced information and communication systems to serve the operation of the power system, improve the level of power grid informatization, and improve the utilization efficiency of existing power system infrastructure. It provides important technical support for the transmission, transmission, transformation, distribution, and utilization of the power grid. However, while Internet tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L63/0236H04L63/0876
Inventor 邵志鹏张涛马媛媛何高峰周诚汪晨李伟伟楚杰
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products