CA-less identity authentication method and system

A technology of identity authentication and authentication results, which is applied in the field of CA-free identity authentication methods and systems, can solve problems such as poor communication stability, large communication traffic, communication bandwidth, and communication stability that is not as reliable as the Internet, so as to reduce complexity and reduce The effect of communication traffic

Active Publication Date: 2019-06-04
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the industrial control system, if third-party certification is provided through CA, not only the communication traffic is large and the interaction complexity is high, but also for the industrial control system using 485, wireless and other communication methods, its communication bandwidth and communication stability are far less reliable than the Internet. Provide third-party certification, low communication rate, poor communication stability, unable to meet the certification requirements of industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CA-less identity authentication method and system
  • CA-less identity authentication method and system
  • CA-less identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0072] figure 1 The flow chart of the identity authentication method without CA (Certificate Management Authority) of the present invention in one embodiment is shown in Figure 1 , in this embodiment, the processing process of a security chip (TPM, Trusted Platform Module) is taken as an example for illustration. Here, the security chip is a trusted platform module, which is a device that can independently generate keys and encrypt and decrypt. The chip is installed in the terminal device.

[0073] Such as figure 1 As shown, in this embodiment, the processing of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and system without CA. The method comprises the following steps: receiving a master station public key in master station asymmetric keys and a pre-stored first signature of the master station public key sent by a master station after receiving an identity authentication instruction; performing secondary signature on the master station public key sent by the master station after receiving the identity authentication instruction by using a security chip private key to obtain a second signature of the master station public key; when the two signatures are the same, generating a first random number; encrypting the first random number by using the master station public key, and sending an encryption result of the first random number to the master station; receiving a second random number sent by the master station; and when the first random number and the second random number are the same, judging that the master station passes the identity authentication, and sending an identity authentication pass result to the master station. According to the identity authentication method and system disclosed by the invention, the participation of an online CA is not required in an authentication process, thereby reducing the communication flow, eliminating the role of the third party CA and reducing the complexity of interaction.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a CA-free identity authentication method and system. Background technique [0002] The authentication of the asymmetric key usually adopts the way of certificate, and a third-party authentication is provided by CA (Certificate Management Authority). In the Internet scenario, it is difficult for communicating parties to exchange keys through other secure methods such as meetings, so a third-party CA is required to ensure the security of keys. However, in the industrial control system, if third-party certification is provided through CA, not only the communication traffic is large and the interaction complexity is high, but also for the industrial control system using 485, wireless and other communication methods, its communication bandwidth and communication stability are far less reliable than the Internet. Provide third-party certification, the communication rate is l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L9/0861H04L9/0869H04L9/0891H04L9/0894H04L63/0442H04L63/068
Inventor 杨祎巍林伟斌李鹏肖勇
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products