Supercharge Your Innovation With Domain-Expert AI Agents!

A certificateless signature method and system suitable for industrial internet data perception

A technology of industrial Internet and data perception, applied in the field of certificateless signature of industrial Internet data perception, it can solve the problem of being unable to resist signature forgery attacks, and achieve the effect of reliability.

Inactive Publication Date: 2019-06-07
XIAN UNIV OF POSTS & TELECOMM
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the existing certificateless signature methods in the cloud-assisted industrial Internet of Things can realize data authentication in the cloud-assisted industrial Internet of Things, they cannot resist signature forgery attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A certificateless signature method and system suitable for industrial internet data perception
  • A certificateless signature method and system suitable for industrial internet data perception
  • A certificateless signature method and system suitable for industrial internet data perception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Various aspects of the present invention will be described in detail below with reference to the drawings and specific embodiments. Wherein, well-known modules, units and their mutual connections, links, communications or operations are not shown or described in detail. Also, the described features, architectures, or functions may be combined in any manner in one or more implementations. It should be understood by those skilled in the art that the various implementations described below are only for illustration, rather than limiting the protection scope of the present invention. It can also be easily understood that the modules or units or processing methods in the embodiments described herein and shown in the accompanying drawings can be combined and designed in various configurations.

[0020] Embodiments of the present invention provide a certificateless signature method and system suitable for industrial Internet data perception, for example, applicable to cloud-a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The certificateless signature method suitable for industrial internet data perception provided by the embodiment of the invention comprises the following steps: the key generation center generates a public parameter and a main key by adopting a predetermined algorithm and broadcasts the public parameters to a first user node in the Internet of Things, the first user node generates a first privatekey and a first public key of the first user node according to the identification information and the public parameters of the node, and receives a first public key sent by the first user node and identification information of first user node equipment, and the first public key and the identification information of the first user node equipment generate a second public key and a second private keyfor the first user node, and send the second public key and the second private key to the first user node, so that the first user node generates a complete public key and a complete private key. According to the method, the node generates the complete key according to the two parts of keys, and a Hash function mapped to the point based on an existing certificateless signature scheme is not needed.

Description

technical field [0001] The present invention relates to the Internet of Things technology, and more specifically, to a certificateless signature method and system suitable for industrial Internet data perception. Background technique [0002] The achievements of the rapid development of the Internet of Things and cloud computing play an important role in building an intelligent world. In particular, the combination of cloud computing and industrial Internet of Things is considered to be a good solution to change the operation of existing industrial systems, which involve industrial production, logistics, storage and sales. Cloud-assisted IIoT enables various industries to gain competitive advantages, however several fundamental but challenging issues remain, including data authenticity, untrusted third parties, system robustness and efficiency. Since the essential information extracted from IIoT data often plays an important role in improving business operations, if data co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/06H04L9/08H04W12/041H04W12/069H04W12/10
Inventor 张应辉张甜甜任方媛吴阿新郭瑞郑东
Owner XIAN UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More