Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

State maintenance authorization management method and system

A technology of authorization management and state maintenance, which is applied to user identity/authority verification and key distribution, can solve problems such as inconvenient and complicated occasions, and achieve the effect of resisting dictionary attacks, defending against replay attacks, and expanding the search space

Active Publication Date: 2017-06-13
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a state-keeping authorization management method and system for the problem that the state of authorization is not recorded in the traditional authorization method, which is inconvenient to be used in complex occasions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • State maintenance authorization management method and system
  • State maintenance authorization management method and system
  • State maintenance authorization management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0037] figure 1 Shows the flow of the authorization management method for state maintenance of the present invention in an embodiment Figure 1 , in this embodiment, the processing process of a security chip (TPM, Trusted Platform Module) is taken as an example for illustration. Here, the security chip is a trusted platform module, which is a device that can independently generate keys and encrypt and decrypt.

[0038] Such as figure 1 As shown, in this embodiment, the processing of the security chip may include the following steps:

[0039]Step S101: receiving the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a state maintenance authorization management method and system. The method comprises the following steps: receiving a pre-stored first random number and a first hash message authentication code sent by a terminal after receiving an authorization instruction, and a generated second random number; when the authorization instruction is a first authorization instruction, and when the first hash message authentication code is verified to be correct according to the authentication code of a preset object, the received first random number, a pre-stored third random number and a salt, judging that the terminal passes the authorization, and generating a fourth random number; calculating a second hash message authentication code according to the authentication code of the preset object, the salt, the second random number and the fourth random number; and sending the fourth random number, the second hash message authentication code and a terminal authorization pass result to the terminal. According to the state maintenance authorization management method and system disclosed by the invention, every time when terminal passes the authorization, the random number is regenerated, a new hash message authentication code is calculated and is sent to the terminal for the next time authorization judgment, the authorization state is recorded, and the application demands of complex occasions are satisfied.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a state-keeping authorization management method and system. Background technique [0002] Trusted Computing (Trusted Computing) is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Trusted computing technology is a new generation of security technology. Authorization is an important part of trusted computing technology. It is used to check the terminal's access to resources. Only authorized commands can be executed. [0003] There are many traditional authorization methods, such as password authorization and password challenge / response authorization. In complex situations, each step requires authorization, and the authorization of each step is based on the authorization of the previous step. However, the status of authorization is not recorded in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 杨祎巍肖勇林伟斌赵云
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products