Lightweight authentication method based on equipment identity label and gateway

A lightweight authentication and device identity technology, applied in the field of IoT, which can solve problems such as insufficient security

Active Publication Date: 2020-10-27
STATE GRID SHANXI ELECTRIC POWER +1
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides a lightweight authentication method and gat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight authentication method based on equipment identity label and gateway
  • Lightweight authentication method based on equipment identity label and gateway
  • Lightweight authentication method based on equipment identity label and gateway

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0080] Example one:

[0081] Such as figure 1 As shown, a lightweight authentication method based on device identification includes: a registration method and an authentication method;

[0082] Registration methods, including:

[0083] Step S101: In response to the registration application request, obtain the identity information of the terminal sending the registration application request;

[0084] Step S102: Generate a terminal ID public key based on the identity information;

[0085] Step S103: Obtain the encrypted private key and the signed public key of the terminal based on the terminal ID public key;

[0086] Step S104: Obtain the session key negotiated with the terminal;

[0087] Step S105: Encrypt the encryption private key and the signing public key based on the session key to obtain first encrypted information;

[0088] Step S106: Send the first encrypted information to the terminal, thereby completing the registration of the terminal at the gateway.

[0089] In a specific applic...

Example Embodiment

[0126] Embodiment two:

[0127] Such as Figure 4 As shown, a lightweight authentication method based on device identification, the medium authentication method includes:

[0128] Step S401: In response to the authentication request, obtain the identity information of the terminal sending the authentication request;

[0129] Step S402: Generate a terminal ID based on the identity information;

[0130] Step S403: Confirm whether the terminal is successfully registered based on the terminal ID;

[0131] Step S404: Receive the authentication request message of the successfully registered terminal, and generate a first communication key;

[0132] Step S405: Generate an authentication request reply message based on the authentication request message and the first communication key;

[0133] Step S406: Receive an authentication message obtained based on the authentication request reply message, the authentication message is obtained based on the authentication reply message, and the authenticat...

Example Embodiment

[0169] Embodiment three:

[0170] The embodiment of the present invention provides a gateway including a memory and a processor,

[0171] Memory, which stores executable instructions;

[0172] The processor runs the executable instructions in the memory to implement a lightweight authentication method based on the device identity.

[0173] The memory is used to store non-transitory computer readable instructions. Specifically, the memory may include one or more computer program products, and the computer program product may include various forms of computer-readable storage media, such as volatile memory and / or nonvolatile memory. The volatile memory may include random access memory (RAM) and / or cache memory (cache), for example. The non-volatile memory may include read-only memory (ROM), hard disk, flash memory, etc., for example.

[0174] The processor may be a central processing unit (CPU) or other form of processing unit with data processing capability and / or instruction executio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a lightweight authentication method based on an equipment identity label and a gateway. The lightweight authentication method based on the equipment identitylabel comprises a registration method and an authentication method, the registration method comprises the following steps: in response to a registration application request, obtaining the identity information of a terminal sending the registration application request; generating a terminal ID public key based on the identity information; obtaining an encrypted private key and a signed public key of the terminal based on the terminal ID public key; obtaining a session key obtained by negotiation with the terminal; encrypting the encrypted private key and the signed public key based on the session key to obtain first encrypted information; and sending the first encrypted information to the terminal. In the transmission communication of the encrypted private key and the signed public key, thesession key obtained by negotiation with the terminal is used to encrypt the communication, so that the transmission security of the encrypted private key and the signed public key is ensured, and the purpose of improving the security in lightweight registration authentication is achieved.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and more specifically relates to a lightweight authentication method and a gateway based on device identity identification. Background technique [0002] The existing authentication protocol framework includes multiple structures such as PKI, CPK and IBE. PKI certificate technology has become a mature technology used in the realization of secure communication functions in various fields. In order to verify the user's identity, the PKI framework requires the communication user to apply for the other party's certificate and verify the validity of the certificate before communicating with the other party, which greatly increases the communication, time and computing overhead. It is difficult to support IoT devices with simple functions and poor hardware facilities. The normal operation of PKI authentication technology, although there are some lightweight designs for the PKI framework...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/0876H04L9/0838H04L9/0869H04L9/3247H04L9/3297
Inventor 禹宁安毅谷良竹瑞博罗威黄达成赵嘉任晓刚
Owner STATE GRID SHANXI ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products