Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication key negotiation method for access of user in PKI domain to resource in IBC domain

A technology for authentication key negotiation and domain authentication, which is applied in the field of cross-heterogeneous domain authentication and key negotiation in information communication, can solve the problems of no solution process, low feasibility, and large resource consumption, and achieves low resource consumption, The effect of less information and security

Active Publication Date: 2017-06-20
芽米科技(广州)有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a large number of certificates are used many times in this document. The certificates will consume a lot of resources in the process of transmission and storage, which is inconsistent with the original intention of people to design the IBC cryptographic system; the way of identity mapping is not direct, and it is feasible in real applications. Sex is not high
Moreover, this document only uses identity mapping and trust transfer to realize the idea of ​​authentication. There is no specific solution process, and it can only be regarded as a new idea of ​​cross-domain authorization rather than a solution that can be directly realized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] An authentication key negotiation method for a user in a PKI domain to access resources in an IBC domain, the operation steps of which are:

[0036] A. Apply for access

[0037] The user U in the PKI domain sends a request to the authentication server CA in the PKI domain to access the resource S in the IBC domain, and the PKI domain authentication server CA authenticates the legality of the identity of the user U in the PKI domain; if the authentication fails, go to the step E; otherwise, forward the access request of the user U of the PKI domain to the IBC domain authentication server TA;

[0038] B. Generate user index and send

[0039] The IBC domain authentication server TA performs identity authentication on the PKI domain authentication server CA, and if the authentication fails, skip to step E; otherwise, the IBC domain authentication server TA generates the session key K for the user U in the PKI domain to access the resource S in the IBC domain The authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication key negotiation method for the access of a user in a PKI domain to a resource in an IBC domain, and the method comprises the main steps: A, applying for the access: a user in the PKI domain sends a request for access to the resource in the IBC domain to an authentication server in the domain, and the authentication server in the PKI domain transmits the access request of the user to an authentication server in the IBC domain after the identity of the user is determined to be legal; B, generating a user index and transmitting the user index; C, carrying out the bidirectional identity authentication and negotiation of a session key, wherein the session key is obtained by the XOR processing of an authentication server part of the session key and a filled user part; D, carrying out the re-authentication: carrying out the quick re-authentication when the user part of the session key exceeds a life cycle but the authentication server part of the session key is still in the life cycle if the user in the PKI domain still needs to access to the resource in the IBC domain; E, ending the session. The method can effectively achieve the authentication key negotiation for the user in the PKI domain for the access to the resource in the IBC domain, is small in consumed resources, and is high in safety.

Description

technical field [0001] The invention belongs to the technical field of cross-heterogeneous domain authentication and key agreement in information communication. Background technique [0002] For various applications in a distributed network environment, such as virtual enterprises, instant messaging systems, etc., users and the information resources they want to access are often in different trust domains. Different trust domains may be based on different cryptosystems, such as Kerberos-based cryptosystems, PKI (Public Key Infrastructure)-based cryptosystems, and IBC (Identity-Based Cryptography)-based cryptosystems. The authentication key agreement method between homogeneous domains has been researched a lot, and has been standardized and widely used. There are also many researches on the authentication key agreement method used between two domains of PKI and Kerberos. However, the authentication key agreement method when users in the PKI domain access resources in the IB...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08
Inventor 张文芳袁超王小敏
Owner 芽米科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products