Efficient equipment instruction authentication system and method based on certificateless signature

A technology of device instructions and authentication methods, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as private key leakage, achieve the effects of improving security, improving authentication efficiency, and ensuring integrity

Inactive Publication Date: 2021-06-11
HUBEI UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the private key generator (Private KeyGeneration, PKG) in these schemes is attacked, all the private keys signed by the user will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient equipment instruction authentication system and method based on certificateless signature
  • Efficient equipment instruction authentication system and method based on certificateless signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0020] please see figure 1 , an efficient device instruction authentication system based on certificateless signatures provided by the present invention mainly includes three components, namely a trusted system administrator (Trusted System Administrator, hereinafter referred to as TSA), an engineer station (Engineer Station, hereinafter referred to as ES) ) and engineer (Engineer, hereinafter referred to as ER); ER signs the edited device command and sends it to ES; after ES receives the command, it verifies the legitimacy of the command signature, and only ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient equipment instruction authentication system and method based on a certificateless signature, and the system specifically comprises a trusted system Administrator (TSA), an engineer station (ES), and an engineer (ER). The method comprises the following steps: system initialization, generation of a partial signature private key, selection of a secret value, generation of a signature public key, signature of an equipment instruction and signature verification. According to the method, the device instruction edited by an engineer ER is ensured not to be modified or maliciously counterfeited before being executed, the instruction authentication efficiency of the ICS is improved, and the requirement of the ICS for actual application can be better met.

Description

technical field [0001] The invention belongs to the technical field of industrial control system (Industrial Control System, ICS) equipment instruction authentication technology and the technical field of industrial control equipment instruction integrity and tamper-resistant modification, and relates to a method for equipment instruction authentication in an industrial control system, especially for industrial control systems. The characteristics of the system field, the requirements for the integrity of equipment instructions, and the efficiency requirements for the engineer station to verify the signatures of equipment instructions uploaded by different engineers, an efficient equipment instruction authentication system and method based on certificateless signatures through certificateless signature technology. Background technique [0002] ICS is an automatic control system composed of computer and industrial process control components. It has been widely used in electric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0643H04L9/0825H04L9/0869H04L9/3247
Inventor 谌刚张明武张语荻邓嘉伟庄萧
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products