Space-ground integrated network anonymous access authentication method based on identity encryption system

An access authentication and identity encryption technology, applied in the field of information network security, can solve problems such as high computing overhead, frequent access authentication, and limited resources, so as to reduce the delay of reconnection, avoid illegal access, and ensure security Effect

Active Publication Date: 2020-06-19
四川九强通信科技有限公司
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the characteristics of highly dynamic changes in topology, unstable link quality, high communication delay, and limited resources in the space-ground integrated network, there are many types of terminals, and terminals will face frequent access authentication problems when accessing satellites.
However, the traditional anonymous access authentication method based on the public key cryptography system is mostly a centralized authentication management method, which has a large computational cost, and each authentication requires the participation of the ground authentication center, resulting in a large amount of communication overhead, and to the ground. The certification center brings huge processing overhead and cannot prevent replay attacks, etc.
This makes it more difficult to provide services to terminal devices in a space-ground integrated network with limited resources, and the service experience of terminal devices is also greatly affected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Space-ground integrated network anonymous access authentication method based on identity encryption system
  • Space-ground integrated network anonymous access authentication method based on identity encryption system
  • Space-ground integrated network anonymous access authentication method based on identity encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description. Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by per...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a space-ground integrated network anonymous access authentication method based on an identity encryption system. Belonging to the field of information network security, according to the method, offline registration is carried out on a key distribution center by terminal equipment and a satellite respectively; the terminal device sends an access authentication request to thesatellite, the satellite receives an access authentication request and an identity authentication message of the terminal equipment, after verifying the legality of the terminal equipment, replying aterminal equipment access authentication response message; completing access authentication procedures, the terminal device sends a connection recovery authentication request to the satellite, according to the method, the terminal equipment does not need to be re-authenticated, the connection recovery authentication process is completed, the legality of the terminal equipment can be effectively verified, multiple access authentication mode selections are provided for users with different security requirements, the privacy security of the terminal equipment is ensured, and the complexity of access authentication is greatly reduced.

Description

technical field [0001] The present invention relates to the field of information network security, and more specifically relates to an anonymous access authentication method for an integrated space-ground network based on an identity encryption system. Background technique [0002] Cyberspace security is the foundation of anti-terrorism, social services, and governance. Space-ground integrated network security is an integral part of it, and it is of great significance to ensure the safe communication of legitimate users. However, the space-ground integrated network is different from the traditional network. Its channels are highly open and vulnerable to many threats and challenges such as illegal user attacks. Access authentication is the first line of defense for network security, and it can be used for each node in its own network. Identification of the legality of identities between users, and as a prerequisite to ensure that legal terminal devices obtain corresponding bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0643H04L9/0863H04L63/0435H04L63/0421H04L63/083
Inventor 徐磊赵国锋徐川伊俊杰石润刘子琦
Owner 四川九强通信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products