Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted measurement and control network authentication method based on double secret values and chaotic encryption

A chaotic encryption, measurement and control network technology, applied in the field of identity authentication, can solve problems such as lengthy certificate verification structure, difficult password operation, and actual verification efficiency limitation

Pending Publication Date: 2020-05-12
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional PKI identity authentication method based on USBKey has the characteristics of long key, dynamic change of identity authentication certificate, high security, and convenient use. Validation efficiency is limited
Moreover, various embedded terminal devices in the application scenarios of industrial measurement and control systems have limited computing power and computing resources, making it difficult to quickly and efficiently perform cryptographic operations involving multiple rounds of iterations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted measurement and control network authentication method based on double secret values and chaotic encryption
  • Trusted measurement and control network authentication method based on double secret values and chaotic encryption
  • Trusted measurement and control network authentication method based on double secret values and chaotic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0054] Such as Figure 6As shown, the present invention relates to a trusted measurement and control network authentication technology method based on double secret values ​​and chaotic encryption algorithms. The specific method is to use double secret Value and chaotic public key cryptography realize identity authentication and key negotiation process, realize secure transmission and verification of user identity certificates, and thus build a safe and reliable data transmission channel. The identity authentication method in the present invention includes multiple links such as secure generation of user identity identification, read protection encapsulation, secure transmission, key negotiation, etc., and a unique and confidential cryptographic function is used in each link to generate data securely , so as to ensure the security of authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a trusted measurement and control network authentication method based on double secret values and chaotic encryption. The method specifically comprises the steps: on the basisthat a trust chain is constructed through trusted computing to achieve a safe and trusted operation environment, identity authentication and key negotiation processes are achieved through double secret values and a chaotic public key password, safe transmission and verification of a user identity certificate are achieved, and therefore, a safe and trusted data transmission channel is constructed.The identity authentication method provided by the invention comprises multiple links of user identity security generation, reading protection packaging, security transmission, key negotiation and the like, and a password function with uniqueness and confidentiality is adopted in each link to perform data security generation, so that the security of access of authentication equipment in an industrial measurement and control network is ensured.

Description

technical field [0001] The invention relates to a technical method for identity authentication by adopting a double secret value and a chaotic encryption key agreement algorithm in an industrial measurement and control network, belonging to the field of industrial control network security. Background technique [0002] With the gradual acceleration of my country's industrial informatization, more and more communication technologies and embedded applications have been applied to industrial production networks. While enjoying the convenience brought by high-tech to the production process, it also reflects information security issues to varying degrees. Once some uncontrolled devices are connected to the industrial measurement and control network, through denial of service attacks or penetration mining of communication protocols, the loopholes in the protocol can be used to attack the core device of the production system and modify the application configuration of the device O...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30
CPCH04L9/001H04L9/30G06F21/44G06F21/602G06F21/64H04L9/0847H04L9/0877H04L9/3271G06F21/645H04L9/0643H04L9/0825H04L9/0869H04L9/321H04L9/3247H04L2209/127
Inventor 尚文利尹隆陈春雨赵剑明刘贤达曾鹏
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products