Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Identity-Based Security Mutual Authentication Method Combining the Advantages of Broadcasting

An identity and security technology, applied in the field of Internet security communication, can solve problems such as large transmission bandwidth and computing time overhead, complex certificate management, and inability to realize mutual authentication of Internet nodes

Active Publication Date: 2019-08-09
NAT UNIV OF DEFENSE TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to solve the problem of complex management of certificates in traditional security authentication schemes, large transmission bandwidth and computing time overhead, inability to realize mutual authentication between any Internet node, and inability to realize authentication between core nodes and a large number of Internet nodes in a wide range. Security Mutual Authentication Issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Security Mutual Authentication Method Combining the Advantages of Broadcasting
  • An Identity-Based Security Mutual Authentication Method Combining the Advantages of Broadcasting
  • An Identity-Based Security Mutual Authentication Method Combining the Advantages of Broadcasting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0125] figure 1 It is an overall flowchart of the present invention, wherein the first step to the third step is to initialize the authentication system, and the fourth step to the sixth step is to perform user access security mutual authentication, and the specific steps are as follows:

[0126] The first step is to build an identity-based security mutual authentication system that combines the advantages of broadcasting. like figure 2 As shown, the identity-based security mutual authentication system combined with broadcast advantages is composed of multiple user nodes UN to be authenticated, authentication server AS, security core node CN, and private key generation center PKG.

[0127] The PKG is installed with an identity-based cryptographic parameter initialization module and a private key generation module. The AS is installed with an authentication server signature generation module, a user signature verification module, and an AS message sending and receiving modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based safety mutual-authentication method combined with broadcast advantage. The technical scheme is to construct an identity-based safety mutual-authentication system composed of multiple to-be-authenticated user nodes UN, an authentication server AS, a safety core node CN, and a private key generation center PKG. An identity-based cryptography parameter initialization module and a private key generation module are arranged on the PKG; an authentication server signature generation module, a user signature verification module and an AS message transceiving module are arranged on the AS; a data broadcast module and a data forward module are arranged on the CN; a user signature generation module, an authentication server signature verification module and aUN message transceiving module are installed on the UN. The PKG in the system generates system parameters, a system main key, and private keys of the AS and the UN, the AS and the UN perform the safety mutual-authentication under the participating of the CN by utilizing the system parameters and the private keys, the problem that the time cost and the storage overhead are large when the internetequipment performs the safety authentication, and the effectiveness of the internet node safety authentication is effectively improved.

Description

technical field [0001] The invention relates to the field of Internet security communication, in particular to an identity-based security mutual authentication method combined with broadcasting advantages. Background technique [0002] With the rapid development of Internet technology, large-scale Internet systems are deployed in many aspects such as urban construction, industrial control, and smart life, which greatly improves work efficiency and reduces labor costs. However, at the same time, the characteristics of the Internet system, such as numerous nodes and wide coverage, make Internet security problems very prominent. At present, there are a large number of terminal nodes in the Internet that are mainly connected to access nodes through wireless networks for information transmission. The openness of wireless networks makes them vulnerable to security threats such as identity forgery, privacy violations, and denial of service attacks. Security authentication is the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/083H04L9/3236H04L9/3247H04L9/3273
Inventor 赵宝康陈曙晖苏金树王小锋韩彪虞万荣刘谱光魏子令
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products