Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Interactive key security authentication method and system

A technology of security authentication and authentication system, applied in the field of interactive key security authentication method and system, can solve the problems of terminal manufacturer's shutdown, inability to activate the terminal manufacturer's production, poor matching degree, etc., and achieve the effect of meeting the authentication requirements.

Active Publication Date: 2020-05-22
HUIZHOU DESAY SV AUTOMOTIVE
View PDF14 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Under the new business form of the Internet of Things, many terminal manufacturers have new changes in their equipment requirements, increasing the provision of equipment and other information, security access authentication, etc., relying on manual identification of data information that needs to be provided to terminal manufacturers, which takes a long time. The matching degree is poor, and the data is prone to missing or wrong data, which leads to the inability to activate the terminal manufacturer during production, causing serious impacts such as terminal manufacturers stopping the line

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interactive key security authentication method and system
  • Interactive key security authentication method and system
  • Interactive key security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] A method for interactive key security authentication, comprising the steps of:

[0050] S10. Generate terminal mutual authentication certificate: respectively generate supplier identity public-private key pair and third-party certificate public-private key pair, authentication key production management system and authentication authentication system respectively Interactively verify the signature for the pair, generate the terminal mutual authentication certificate of the IoT terminal device, and the authentication authentication system synchronously stores the terminal mutual authentication certificate.

[0051] In this step, the terminal mutual authentication certificate is generated, such as figure 1 shown, including:

[0052] The offline authentication key production management system and the authentication certification system provide supplier identity root certificates and third-party root certificates respectively.

[0053] The encryption modules of the offline...

Embodiment 2

[0087] An interactive key security authentication system adopts the interactive key security authentication method described in Embodiment 1 to realize security authentication.

[0088] The system includes an interactive key generation module, a signature module and a verification module.

[0089] The interactive key generation module is used to generate the supplier identity public-private key pair, the third-party certificate public-private key pair and the certificate application request CSR according to the specified encryption algorithm.

[0090] The interactive key generation module includes a supplier's first encryption module and a third party's second encryption module.

[0091] The signature module is used to interactively verify the signature of the supplier identity public-private key pair and the third-party certificate public-private key pair, and generate the terminal mutual authentication certificate of the IoT terminal device.

[0092] The signature module in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an interactive key security authentication method. The method comprises the steps that a terminal mutual identification certificate is generated; an offline authentication keyproduction management system and an authentication system respectively provide a supplier identity root certificate and a third-party root certificate, respectively generate a supplier identity public and private key pair and a third-party certificate public and private key pair, use the third-party certificate to carry out interactive verification on the public key and then sign, and generate aterminal mutual identification certificate of Internet of Things terminal equipment; the Internet of Things terminal equipment is initialized; the identification SN information is signed by adopting aterminal mutual identification certificate to form an ID signature, and the ID signature and the terminal mutual identification certificate are written into the Internet of Things terminal equipment;and authentication is carried out, and specifically the authentication system verifies the legality of the current terminal mutual identification certificate and the consistency of the ID signature according to the stored supplier certificate, the terminal mutual identification certificate and the third-party certificate, and outputs a verification result. According to the invention, the mutual identification certificate is generated by constructing the key pair interactively generated with the third party, so that the interactive security authentication information is generated.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an interactive key security authentication method and system. Background technique [0002] In recent years, with the rapid development of artificial intelligence, Internet of Things, big data, information communication and other technologies and industrialization, the core technology of intelligent networked vehicles has continuously made breakthroughs, the basic support has been accelerated to improve, and the industrial ecology has gradually matured. A new era It is about to come out, and the way of human travel is facing unprecedented profound changes. With the evolution of product forms and the Industrial Internet of Things, because the background network of the Internet of Things needs the information of connected devices, the production and delivery process of Internet of Things products has gradually increased the product data and security authentication pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3247H04L9/3268H04L63/0823H04L63/0861H04L63/0869
Inventor 彭泽栋鲁林伟李文辉梁建辉李益明
Owner HUIZHOU DESAY SV AUTOMOTIVE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products