Unlock instant, AI-driven research and patent intelligence for your innovation.

A double-agent cross-domain authentication method based on identification password and alliance chain

A technology for identifying passwords and authentication methods, applied in the field of Internet of Things information security, can solve problems such as application restrictions, and achieve the effect of solving revocation and updating, simple maintenance, and easy expansion.

Active Publication Date: 2020-09-11
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identity authentication technology based on the public key can solve the scalability and flexibility problems faced by the symmetric key, but the identity authentication technology based on the digital certificate has the dependence on the public key infrastructure and the maintenance problem of the digital certificate, which makes it in Applications in the IoT space are limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A double-agent cross-domain authentication method based on identification password and alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] This embodiment sets forth the interaction process of the double-agent authentication method based on identification password and consortium chain.

[0058] The double-agent authentication method based on identification password and consortium chain can be applied to cross-domain application scenarios of the Internet of Things. This embodiment takes an application scenario of a smart manufacturing factory as an example. To simplify the description, two smart manufacturing factories are taken as examples. There are two smart manufacturing factories: smart manufacturing factory A and smart manufacturing factory B, their management is independent of each other, but they have a business cooperation relationship. Several smart manufacturing devices are deployed in each smart manufacturing factory, which have the capabilities of perception, storage, processing and execution, which is equivalent to an IoT device. These smart manufacturing devices are controlled by a central m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a double-agent cross-domain authentication method based on an identification password and an alliance chain, and belongs to the technical field of Internet of Things information security. The method comprises the following steps: 1) management domain system initialization: a KGC server initializes a system parameter group, generates a system master key, sends an information chaining request and attaches a management domain identifier, the system parameter group and the system master key; the BCAS server stores the information in a file and calculates file hash; calls an information chaining intelligent contract, and writes the URI and the Hash information of the file into a block chain; and 2) the entity EA in the management domain A is authenticated by the entityEB in the management domain B. According to the method, the identification signature technology is used for achieving entity identity authentication, the authentication process does not depend on public key infrastructure and does not need a digital certificate, and the system is easy and convenient to deploy and maintain, easy to expand and high in flexibility; the mutual trust construction process between the management domains does not depend on a third-party mechanism; and the revocation and updating problems of the identification password technology public key can be effectively solved.

Description

technical field [0001] The invention relates to a double-agent cross-domain authentication method based on an identification password and an alliance chain, which is used for identity confirmation before an entity requests a cross-domain entity service or accesses a cross-domain entity resource, and belongs to the technical field of Internet of Things information security. Background technique [0002] Identity authentication is a very basic technology in IoT scenarios, and it usually exists as the underlying technology for privacy, security, trust, authorization, access control, etc., or as a submodule of most applications. Before an entity requests services and accesses network resources, it usually needs to be authenticated by the relevant identity authentication module, and the next step of network behavior can only be entered after the identity is confirmed. [0003] From the key types used in the identity authentication process, identity authentication technologies can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30H04L29/06
CPCH04L9/0866H04L9/088H04L9/0891H04L9/3066H04L9/3247H04L63/0884
Inventor 沈蒙刘惠森于红波徐恪巩毅琛
Owner BEIJING INSTITUTE OF TECHNOLOGYGY