Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Lightweight access authentication method for integrated electronic system

An integrated electronic system and access authentication technology, applied in the field of access authentication, can solve the problem of limited computing resources, storage resources and other on-board resources, the inability to use access authentication technology, and the lack of research on integrated electronic system access authentication, etc. problems, to achieve the effect of improving security, improving authentication efficiency, and shortening authentication time.

Active Publication Date: 2018-09-04
EAST CHINA NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the particularity of the operating environment of the space-borne integrated electronic system, its computing resources, storage resources and other on-board resources are very limited. The traditional access authentication technology with high computing load cannot be applied to the space-borne integrated electronic system. Comprehensive electronic system access authentication has not been studied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight access authentication method for integrated electronic system
  • Lightweight access authentication method for integrated electronic system
  • Lightweight access authentication method for integrated electronic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described in detail in conjunction with the following specific embodiments and accompanying drawings. The process, conditions, experimental methods, etc. for implementing the present invention, except for the content specifically mentioned below, are common knowledge and common knowledge in this field, and the present invention has no special limitation content.

[0047] The implication that relevant technical term represents among the present invention is as follows:

[0048] tk means identity certificate

[0049] tk i Indicates the ith token of the current identity token array

[0050] ic represents the current subsystem pointer;

[0051] Indicates the k-th base pointer of the i-th subsystem;

[0052] represents the k-th base token of the i-th subsystem;

[0053] idx indicates the current subsystem index;

[0054] H(.) represents a one-way Greek function;

[0055] H(M) represents the one-way hash value of data item M; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lightweight access authentication method for an integrated electronic system, comprising the steps of subsystem determination, a first authentication and a second authentication, wherein the subsystem determination comprises: determining whether it is the first time for the subsystem to access the integrated electronic system, if so, performing the first authentication after preprocessing, or otherwise, directly performing the first authentication; the first authentication comprises: sending the identity credential to a central control unit by the subsystem, performing the second authentication if the subsystem passes the first authentication of the central control unit, or otherwise, ending the authentication; and the second authentication comprises: after the subsystem passes the first authentication, generating random numbers and challenge credential by the central control unit to perform the second authentication on the subsystem. By considering the circumstance of limited resources of the integrated electronic system, the invention uses a lightweight operation to realize access authentication of the integrated electronic system, thereby ensuring the system security, and effectively defending against replay attack, desynchronization attack as well as forgery attack.

Description

technical field [0001] The invention belongs to the technical field of access authentication, and in particular relates to an integrated electronic system identity authentication with limited resources and an access authentication method capable of resisting replay attacks and desynchronization attacks. Background technique [0002] At present, integrated electronic systems are widely used in aerospace, military and other fields. With the continuous development of communication technology and continuous breakthroughs in related key technologies, integrated electronic systems will occupy an increasingly important position in many fields in the future, so the security of integrated electronic systems is related to the strategic security of the entire country. However, security problems of integrated electronic systems occur frequently, and the security situation is becoming more and more severe. However, due to the special and closed application scenarios of integrated electr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/00
CPCH04L9/002H04L9/3213H04L63/08H04L63/0807
Inventor 何道敬杨肖齐维孔李明衣龙腾
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products