Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security access system and security access method based on trust token

A secure access and token technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of client manslaughter, lack of strong authentication and continuity support, etc.

Active Publication Date: 2021-02-02
THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the invention: the present invention provides a secure access system and method based on trust tokens, which overcomes the lack of strong authentication and continuity support in the prior art, which easily becomes an access bottleneck and causes the client to be killed by mistake. The use of the present invention The progressive relationship of the trust level gradually completes the mutual authentication of the requester and the server, increases the difficulty of denial of service attacks against the server, and finally ensures that the requester and the server establish a secure trust connection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security access system and security access method based on trust token
  • A security access system and security access method based on trust token
  • A security access system and security access method based on trust token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Below, the specific implementation manner of the technical solution of the present invention will be further described in detail in conjunction with the accompanying drawings:

[0075] In the Internet environment, the server provides access services for a large number of clients at the same time. Usually, the server can support concurrent access operations of a certain number of clients. However, in some special cases, there will be more access operations than expected, such as centralized access operations caused by normal users due to a specific event, denial of service attacks caused by malicious users impersonating multiple users at the same time, etc. At this time, the server There is a need for a secure access system that can dynamically adjust the user access time according to the load state, and can increase the difficulty for a malicious user to impersonate multiple users at the same time.

[0076]The secure access system based on trust tokens in the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security access system based on a trust token and a security access method thereof. The system includes a requester, a transmission channel, and a server; the server also includes a token seed management unit, a certificate management unit, an asymmetric Encryption and decryption unit, symmetric encryption and decryption unit, hash operation unit, input and output interface, stateless prediction unit, buffer unit, connection management unit; token seed management unit periodically generates global random numbers as token seeds; certificate management The unit stores the digital certificate and private key of the service party; the stateless pre-judgment unit does not store any requester information, and uses computational difficulties to filter access messages; the buffer unit uses the cached information to prevent tokens from being reused; the connection management unit uses strong identity Authentication is used to confirm the identity of the requesting party and form a shared secret key; the asymmetric encryption and decryption unit, symmetric encryption and decryption unit, and hash operation unit complete the corresponding mathematical operations, and the input and output interfaces complete message sending and receiving.

Description

technical field [0001] The invention relates to a system and method for mutual authentication and connection establishment between a service party and a service requester in the field of network communication, in particular to a trust token-based secure access system and a secure access method thereof. Background technique [0002] With the rapid development of emerging networks such as the Internet, the Internet of Things, and the Ubiquitous Network, the scale of the network is developing explosively. The scale of DoS and DDoS attacks is increasing, and the network security situation is becoming increasingly severe. At present, the cost of relying on passive methods such as feature detection and traffic filtering to resist risk factors is increasing, and it is difficult to hold accountable for the traffic of non-secure connections. Existing networks should give more consideration to controlling malicious network traffic at the source, associating traffic and connections wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3236H04L9/3247H04L9/3268H04L9/3297H04L63/0435H04L63/0442H04L63/0807H04L63/0823
Inventor 张鹏王芳张满超刘小毅
Owner THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products