Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication key negotiation method for users in the pki domain to access resources in the ibc domain

A technology for authentication key negotiation and domain authentication, which is applied in the field of cross-heterogeneous domain authentication and key negotiation in information communication, can solve the problems of no solution process, low feasibility, and large resource consumption, and achieves low resource consumption, The effect of less information and security

Active Publication Date: 2019-09-24
芽米科技(广州)有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a large number of certificates are used many times in this document. The certificates will consume a lot of resources in the process of transmission and storage, which is inconsistent with the original intention of people to design the IBC cryptographic system; the way of identity mapping is not direct, and it is feasible in real applications. Sex is not high
Moreover, this document only uses identity mapping and trust transfer to realize the idea of ​​authentication. There is no specific solution process, and it can only be regarded as a new idea of ​​cross-domain authorization rather than a solution that can be directly realized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] An authentication key negotiation method for a user in a PKI domain to access resources in an IBC domain, the operation steps of which are:

[0036] A. Apply for access

[0037] The user U in the PKI domain sends a request to the authentication server CA in the PKI domain to access the resource S in the IBC domain, and the PKI domain authentication server CA authenticates the legality of the identity of the user U in the PKI domain; if the authentication fails, go to the step E; otherwise, forward the access request of the user U of the PKI domain to the IBC domain authentication server TA;

[0038] B. Generate user index and send

[0039] The IBC domain authentication server TA performs identity authentication on the PKI domain authentication server CA, and if the authentication fails, skip to step E; otherwise, the IBC domain authentication server TA generates the session key K for the user U in the PKI domain to access the resource S in the IBC domain The authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication key negotiation method for users in the PKI domain to access resources in the IBC domain. The main operation steps are: A. Apply for access: the user in the PKI domain sends an authentication server in the domain to access the resources in the IBC domain request, the PKI domain authentication server authenticates the legitimacy of the user's identity and then forwards the user's access request to the authentication server in the IBC domain; B. Generate a user index and send it; C. Two-way identity authentication and negotiation session key: the session key is determined by the session key D. Re-authentication: When the user part of the session key exceeds its life cycle, but the authentication server part of the session key is still in its life cycle, If the user in the PKI domain still needs to access the resources in the IBC domain, fast re-authentication can be performed; E, the session is terminated. The method can effectively realize authentication key negotiation for users in the PKI domain to access resources in the IBC domain, consumes less resources and has high security.

Description

technical field [0001] The invention belongs to the technical field of cross-heterogeneous domain authentication and key agreement in information communication. Background technique [0002] For various applications in a distributed network environment, such as virtual enterprises, instant messaging systems, etc., users and the information resources they want to access are often in different trust domains. Different trust domains may be based on different cryptosystems, such as Kerberos-based cryptosystems, PKI (Public Key Infrastructure)-based cryptosystems, and IBC (Identity-Based Cryptography)-based cryptosystems. The authentication key agreement method between homogeneous domains has been researched a lot, and has been standardized and widely used. There are also many researches on the authentication key agreement method used between two domains of PKI and Kerberos. However, the authentication key agreement method when users in the PKI domain access resources in the IB...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08
Inventor 张文芳袁超王小敏
Owner 芽米科技(广州)有限公司