Light-weight authentication key negotiation method based on implicit certificate

An authentication key negotiation and lightweight authentication technology, which is applied to the public key and key distribution of secure communication, can solve the problems of slow calculation speed and reduced algorithm operation efficiency, and achieve the effect of low collision rate and high calculation speed.

Active Publication Date: 2017-02-15
KYLAND TECH CO LTD
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The increase of the key length of the RSA public key algorithm will reduce the operational efficiency of the algorithm, especially the slow calculation speed
This limits the use of the security policies in the OPC UA specification in resource-constrained embedded devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Light-weight authentication key negotiation method based on implicit certificate
  • Light-weight authentication key negotiation method based on implicit certificate
  • Light-weight authentication key negotiation method based on implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] A non-limiting embodiment is given below in conjunction with the accompanying drawings to further illustrate the present invention.

[0045] The invention relates to a light-weight authentication key agreement method based on an implicit certificate, which is used for establishing a secure channel and generating a session key between an OPC UA server and an OPC UA client. figure 1 For the OPC UA communication network architecture model, such as figure 1 As shown, the model consists of three parts: enterprise management layer, process control layer and field device layer. The information interaction of enterprise management is generally carried out through the Internet, and its functions include data management, customer management, generation scheduling, etc. The process control layer needs to have the ability to maintain two-way communication with the enterprise management layer and the field device layer, receive the production plan from the enterprise management lay...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a light-weight authentication key negotiation method based on an implicit certificate, and belongs to the technical field of identity authentication. The method is used for establishing a secure channel between an OPC UA server and an OPC UA client and generating of a session key. Three entities, a credible certification authority (CA), the OPC UA client A and the OPC UA server B, are involved in an authentication key negotiation process. The OPC UA server B and the OPC UA client A acquire the own implicit certificates after the CA completes identity registration. Then the OPC UA server B and the OPC UA client A complete bidirectional authentication and key negotiation between the entities by using a light-weight algorithm. According to the method provided by the invention, the light-weight authentication key negotiation method based on the implicit certificate is provided aiming at the problem that an existing OPC UA security mechanism is not applicable to a resource-constrained communication environment. The method provided by the invention can be efficiently and safely applicable to an industrial network with a large amount of resource-constrained embedded OPC UA equipment.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to an implicit certificate-based lightweight authentication key negotiation method. Background technique [0002] With the development of the Industrial Internet of Things, the scale of industrial networks and systems is increasing day by day. Users hope to effectively integrate and integrate information from equipment information at the bottom of the factory to high-level enterprise decision-making information, so that various automation and information in the factory All automation systems can effectively use the required information, and industrial automation systems have increasingly strong requirements for large-scale information sharing. However, in industrial automation systems, there are generally equipment from multiple manufacturers, and industrial network control systems use different communication technologies and information exchange standard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0844H04L9/3066H04L9/3242H04L9/3247H04L9/3263H04L9/3273
Inventor 魏旻张帅东曹志豪王平
Owner KYLAND TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products