Unlock instant, AI-driven research and patent intelligence for your innovation.

Multiple identity authentication system and method based on group key pool

An identity authentication and key pool technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as timestamp replay attacks, high system time synchronization requirements, and inability to complete group identity authentication. The effect of reducing the likelihood of key theft

Active Publication Date: 2021-02-02
RUBAN QUANTUM TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) The existing quantum key card-based identity authentication technology can only complete one-to-one identity authentication, and cannot complete identity authentication with groups or identity authentication between groups
[0008] (2) The challenge information transmitted by identity authentication in the prior art is generally an exposed random number, which may be cracked by an attacker by researching the challenge and response
[0010] (4) Existing identity authentication technology based on the Kerberos authentication scheme uses time stamps, resulting in the possibility of replay attacks
The requirements of the Kerberos protocol are based on clock synchronization in the network, which has high requirements for the time synchronization of the entire system, which is difficult to achieve in large-scale distributed systems
[0011] (5) In the prior art, the client key is stored in the client memory, which can be stolen by malicious software or malicious operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple identity authentication system and method based on group key pool
  • Multiple identity authentication system and method based on group key pool
  • Multiple identity authentication system and method based on group key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] Embodiment 1, two client authentications that belong to the same quantum network service station in the local area network and generate session keys by the client

[0087] The quantum key structure of this embodiment is as follows figure 1 Shown: The quantum key card matched by client A participating in identity authentication contains a symmetric key pool K A and group key pool K PA ; The quantum key card matched by client B participating in identity authentication contains a symmetric key pool K B and group key pool K PB ; Both client A and client B belong to the quantum network service station, and client A and client B do not belong to the same group. The quantum network service station contains the symmetric key pool of all members and the group key pool K PA and K PB . The cryptographic modules of client A, client B and the quantum network service station all hold corresponding key pools (including symmetric key pools and group key pools) and various algorit...

Embodiment 2

[0135] Embodiment 2, two client identity authentications that belong to the same quantum network service station in the local area network and generate session keys by the quantum network service station

[0136] The scenario of this embodiment is the same as that of Embodiment 1, the difference lies in the way of generating the session key. The identity authentication process is as Figure 4 As shown, the specific steps are described in text as follows:

[0137] 1. Client A and client B complete identity authentication and key sharing, and apply for a ticket for secondary identity authentication. see Figure 4 .

[0138] 1.1 Client A generates a true random number for identity authentication and sends it to client B: the quantum key card matched by client A generates a true random number R according to the random number generator in the card NA (hereinafter referred to as R NA , and other similarities omit the Chinese character part as the abbreviation). R NA Combining...

Embodiment 3

[0172] Embodiment 3, identity authentication between two client terminals generating a session key by the client terminal in the wide area network

[0173] The identity authentication process of two clients in the WAN is as follows: Figure 5 As shown, when client A and client B do not belong to the same quantum network service station, the quantum key cards involved in the identity authentication process are registered and issued by the quantum network service station to which the client belongs. The difference between the system architecture in this embodiment and Embodiment 1 is that it is applied in a wide area network. The first-level switching center is a quantum network core station in a prefecture-level city or a fairly large area, and the second-level switching center is a county-level city or equivalent. The quantum network core station of a large or small area, the quantum network service station is a quantum communication access site of a fairly large area of ​​a t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a multiple identity authentication system and method based on a group key pool. Identity authentication includes: step S1, one of the client A1 in the active party group according to the preset active party communication range and In the communication range of the passive party, a Ticket application is submitted to one of the client B1 in the passive party group; Step S2, the client B1 responds to the Ticket application, obtains the session key from the quantum network service station and forwards it to the client A1; the client B1 also obtains the session key or information for generating the session key from the quantum network service station and generates a Ticket accordingly, and then forwards the Ticket to the client A1; the client A1 is within the communication range of the active party Share the Ticket and the session key; step S3, a client A2 within the communication range of the active party sends the Ticket to a client B2 within the communication range of the passive party, so that the client A2 and the client B2 are shared for implementation Session key for encrypted communication.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a system and method for identity authentication based on a quantum network service station. Background technique [0002] Authentication, that is, identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] Currently, the identity authentication system in the communication network generally adopts the Kerberos authentication scheme. Kerberos is a network authentication protocol designed to provide strong authentication services for client / server applications through a key system. The realization of the authentication process does not depend on the authentication of the host operating system, does not require trust based on the host address, does not require the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/0428H04L63/08H04L63/083H04L63/0869
Inventor 富尧钟一民
Owner RUBAN QUANTUM TECH CO LTD