A Lightweight Identity Authentication and Platform Identification Evaluation Method

An identity authentication and lightweight technology, applied in the direction of encryption devices with shift registers/memory, electrical components, security devices, etc., can solve the problems of high network quality and terminal platform computing capabilities, frequent TCA protocol communication, and implementation Difficulty and other issues, to achieve the effect of enhancing confidentiality and resisting replay attacks, reducing the number of network data exchanges and reducing computing load

Active Publication Date: 2019-08-30
句容沣润塑料制品有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the TCA protocol communicates frequently and requires a large amount of calculation. It needs multiple rounds of calculation, data interaction and verification to complete. It requires high network quality and terminal platform computing capabilities. For mobile terminals and wireless communication networks, it is difficult to implement.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lightweight Identity Authentication and Platform Identification Evaluation Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] Such as figure 1 As shown, the present invention provides a lightweight identity authentication and platform identification evaluation method, comprising the following steps:

[0040] Step 1, when the access requester AR accesses the network for the first time, the identity authentication protocol between the access requester AR and the access controller AC adopts WAPI (WLAN Authentication and Privacy Infrastructure) three-element authentication protocol, and is verified by the policy manager PM The platform identity certificate and private key signature of the access requester AR and the access controller AC, confirm the platform identity, and return the verification result. If the verification is passed, go to step 2, otherwise, re-verify;

[0041] Step 2: Carry out the first platform credible authentication evaluation, if the evaluation is su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a light-weight identity authentication and platform identification evaluation method, which includes the following steps: Step 1, when the AR accesses the network for the first time, the PM verifies the platform identity certificate and private identity certificate of the access requester AR and the access controller AC. Key signature, if the verification is passed, go to step 2, otherwise re-verify; step 2, conduct the first platform credible authentication evaluation, if the evaluation is successful, the access requester AR saves the hash value M of the platform configuration information of the access controller AC AC , the controller AC saves the hash value M of the platform configuration information of the access requester AR AR , execute step 3, otherwise it is determined that the platform is untrustworthy; step 3, when the access requester AR needs to access the network again, implement a lightweight identity authentication method, if the authentication is successful, execute step 4, otherwise do not access the network; step 4 , implementing a lightweight platform trustworthiness identification and evaluation method for platform trustworthiness identification and evaluation.

Description

technical field [0001] The invention relates to a lightweight identity authentication and platform identification and evaluation method. Background technique [0002] When a mobile terminal accesses the network through a mobile communication network, air interception and eavesdropping may pose a serious threat to the transmitted sensitive information. Cyber ​​attacks, causing security threats. In order to ensure the security of terminals accessing the network, the Trusted Network Connection Architecture (TCA) has developed an identity authentication protocol and a platform authentication evaluation protocol to ensure that the information sent by the terminal accessing the network is credible and there is no The attacked terminal may provide false information. [0003] However, the TCA protocol communicates frequently and requires a large amount of calculation. It needs multiple rounds of calculation, data interaction and verification to complete. It requires high network q...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/02H04L9/08H04L9/06H04W12/069H04W12/10
CPCH04L9/0643H04L9/0838H04L9/085H04L9/0869H04W12/02H04W12/06
Inventor 王祖贤华加美
Owner 句容沣润塑料制品有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products