A double-agent cross-domain authentication system based on identification password and alliance chain

A technology for identifying passwords and authentication systems, applied in the field of dual-agent cross-domain authentication systems, can solve problems such as application restrictions, and achieve the effects of alleviating workload, alleviating computing overhead, and alleviating throughput bottlenecks

Active Publication Date: 2020-05-12
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identity authentication technology based on the public key can solve the scalability and flexibility problems faced by the symmetric key, but the identity authentication technology based on the digital certificate has the dependence on the public key Applications in the networking field are limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A double-agent cross-domain authentication system based on identification password and alliance chain
  • A double-agent cross-domain authentication system based on identification password and alliance chain
  • A double-agent cross-domain authentication system based on identification password and alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] This embodiment describes the implementation topology, architecture, components contained in the architecture and their functions of the dual-agent authentication system based on identification passwords and consortium chains.

[0065] The dual-agent authentication system based on identification password and alliance chain can be deployed in cross-domain application scenarios of the Internet of Things. This embodiment takes an application scenario of a smart manufacturing factory as an example. To simplify the description, two smart manufacturing factories are taken as examples. There are two smart manufacturing factories: smart manufacturing factory A and smart manufacturing factory B, their management is independent of each other, but they have a business cooperation relationship. Several smart manufacturing devices are deployed in each smart manufacturing factory, which have the capabilities of perception, storage, processing and execution, which is equivalent to an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a double-agent cross-domain authentication system based on an identification password and an alliance chain, and belongs to the technical field of information security of the Internet of Things. The system includes a physical layer, an agent layer, a block chain layer and a physical storage layer; the physical layer includes several entities and KGC servers; the KGC server includes four modules of system initialization, entity key generation, BCAS server docking and AAS server docking; The agent layer includes AAS server and BCAS server; AAS server includes three modules of BCAS server docking, KGC server docking and authentication proxy module, authentication proxy module includes message signature and signature verification module; BCAS server includes smart contract, KGC server docking and AAS server docking Three modules. The authentication system can build mutual trust between management domains, and alleviate entity computing overhead, KGC server workload, blockchain transaction delay, and on-chain storage space during the authentication process.

Description

technical field [0001] The invention relates to a dual-agent cross-domain authentication system based on identification password and alliance chain, which is used for identity confirmation before an entity requests cross-domain entity services or accesses its resources, and belongs to the technical field of Internet of Things information security. Background technique [0002] Identity authentication is a very basic technology in IoT scenarios, and it usually exists as the underlying technology for privacy, security, trust, authorization, access control, etc., or as a submodule of most applications. Before an entity requests services and accesses network resources, it usually needs to be authenticated by the relevant identity authentication module, and the next step of network behavior can only be entered after the identity is confirmed. [0003] From the key types used in the identity authentication process, identity authentication technologies can be divided into two categ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0884H04L63/083H04L9/3252H04L9/3247H04L9/3226H04L63/0869H04L9/3273H04L9/3236H04L9/50
Inventor 沈蒙刘惠森于红波徐恪巩毅琛
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products