Supercharge Your Innovation With Domain-Expert AI Agents!

Anti-replay authentication method and system

An authentication method and authentication system technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problems of high technical requirements and high cost

Active Publication Date: 2019-01-15
NATIONZ TECH INC
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to propose an anti-replay authentication method and system, aiming at solving the problem in the prior art that Internet of Things devices use a physical simulation random source generation method to generate true random numbers when performing challenge-response authentication. , with high technical requirements and high cost, it is not suitable for lightweight IoT device chips

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-replay authentication method and system
  • Anti-replay authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0040] This embodiment provides an anti-replay authentication method, see figure 1 , figure 1 A flow chart of an anti-replay authentication method provided in this embodiment, the anti-replay authentication method includes the following steps:

[0041] S101: The responding party encrypts its own unique identification information and authentication request with an encryption key using a first preset encryption algorithm, and sends the encrypted information to the challenger;

[0042] The responding party is also the authenticated party, including IoT devices, smart terminals, etc., and the first preset encryption algorithm includes AES algorithm, DES algorithm, SM4 algorithm, etc.; the challenger is also the authenticating party, including IoT devices, etc.;

[0043] The encryption key is written into the chip by the outside world when the challenger's chip is produced, and the encryption key is a true random number.

[0044] The encryption key is generally written in the ins...

no. 2 example

[0072] This embodiment provides an anti-replay authentication system, see figure 2 , figure 2 A schematic diagram of an anti-replay authentication system provided in this embodiment, the anti-replay authentication system includes: a responder 201 and a challenger 202;

[0073] The responder 201 is used to encrypt its own unique identification information and authentication request with an encryption key using a first preset encryption algorithm, and send the encrypted information to the challenger 202;

[0074] The responder 201 is also the authenticated party, including IoT devices, smart terminals, etc., and the first preset encryption algorithm includes AES algorithm, DES algorithm, SM4 algorithm, etc.; the challenger 202 is also the authenticating party, including IoT devices, etc.;

[0075] The encryption key is written into the chip by the outside when the chip of the challenger 202 is produced, and the encryption key is a true random number.

[0076] The encryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-replay authentication method and system. A challenge party does not need to generate a true random number by a generation method for physically simulating a random source, but uses a pseudo random number to perform challenge-response authentication which has anti-replay-attack function and can achieve fast authentication, high security, easy implementation, and lowcost. The method is suitable for lightweight IoT device chips.

Description

technical field [0001] The present invention relates to the field of the Internet of Things, and more specifically, to an anti-replay authentication method and system. Background technique [0002] In many IoT application environments, mutual authentication and secure communication between smart terminals and IoT device chips, or between IoT device chips and IoT device chips is required. [0003] In the existing technical solutions, there is a certificate system based on the public key. Each device has a private key and a public key certificate. The public key certificate is signed with the private key of the CA. By verifying the signature value of the other party, it can identify the other party. However, the authentication system based on the public key needs to integrate public key ciphers such as RSA and ECC, which occupies a very large area of ​​the chip and is relatively expensive. Not applicable in many lightweight and ultra-lightweight chips. [0004] The other is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0869H04L9/3271H04L63/067
Inventor 陈少伟
Owner NATIONZ TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More