Identity authentication method and system without CA

A technology for identity authentication and authentication results, applied in the field of identity authentication methods and systems without CA, can solve the problems of large communication flow, poor communication stability, and high interaction complexity, and achieve the effect of reducing communication flow and complexity.

Active Publication Date: 2017-06-13
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the industrial control system, if third-party certification is provided through CA, not only the communication traffic is large and the interaction complexity is high, but also for the industrial control system using 485, wireless and other communication methods, its communication bandwidth and communication stability are far less reliable than the Internet. Provide third-party certification, low communication rate, poor communication stability, unable to meet the certification requirements of industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system without CA
  • Identity authentication method and system without CA
  • Identity authentication method and system without CA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0072] figure 1 The flow of the identity authentication method without CA (certificate management authority) of the present invention in an embodiment is shown in Figure one In this embodiment, the processing process of a security chip (TPM, Trusted Platform Module) is taken as an example for description. Here, the security chip is a trusted platform module, which is a device that can independently perform key generation, encryption and decryption. The chip is installed in the terminal device.

[0073] Such as figure 1 As shown, in this embodiment, the processing proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and system without CA. The method comprises the following steps: receiving a master station public key in master station asymmetric keys and a pre-stored first signature of the master station public key sent by a master station after receiving an identity authentication instruction; performing secondary signature on the master station public key sent by the master station after receiving the identity authentication instruction by using a security chip private key to obtain a second signature of the master station public key; when the two signatures are the same, generating a first random number; encrypting the first random number by using the master station public key, and sending an encryption result of the first random number to the master station; receiving a second random number sent by the master station; and when the first random number and the second random number are the same, judging that the master station passes the identity authentication, and sending an identity authentication pass result to the master station. According to the identity authentication method and system disclosed by the invention, the participation of an online CA is not required in an authentication process, thereby reducing the communication flow, eliminating the role of the third party CA and reducing the complexity of interaction.

Description

Technical field [0001] The present invention relates to the technical field of trusted computing, in particular to a CA-free identity authentication method and system. Background technique [0002] The authentication of asymmetric keys usually adopts a certificate, and a third-party authentication is provided through a CA (Certificate Management Authority). In the Internet scenario, it is difficult for communication parties to exchange keys through other secure methods such as meetings, so a third-party CA is required to ensure the security of the keys. However, if third-party certification is provided through CA in the industrial control system, not only the communication traffic is large, the interaction complexity is high, but also the communication bandwidth and communication stability of the industrial control system using 485 and wireless communication methods are far less reliable than the Internet. Provide third-party certification, the communication rate is low, and the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L9/0861H04L9/0869H04L9/0891H04L9/0894H04L63/0442H04L63/068
Inventor 杨祎巍林伟斌李鹏肖勇
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products