Check patentability & draft patents in minutes with Patsnap Eureka AI!

Secret key authentication method based on extensible authentication protocol

An extended authentication protocol and key authentication technology, applied in the field of computer information security, can solve the problems of low authentication cost and high efficiency, and achieve the effect of saving authentication cost, avoiding overhead and improving authentication efficiency.

Pending Publication Date: 2022-03-01
XIAN THERMAL POWER RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the deficiencies of the above-mentioned prior art, the object of the present invention is to propose a key authentication method based on an extensible authentication protocol, which uses a shared key k for encryption during the authentication process, avoiding the complexity generated in the public-private key generation process Calculation issues; random numbers, encryption algorithms, and XOR operations are used between the client and the server, no certificates are required, and the overhead of certificate management is avoided; it has the characteristics of low authentication cost and high efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key authentication method based on extensible authentication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] The invention is based on the extensible authentication protocol, adopts the EAP-TLS authentication method, and the entities participating in the authentication include a client (Client) and a server (Server), so as to realize mutual authentication between the client and the server. The present invention is a key authentication method based on an extensible authentication protocol, referring to figure 1 , including the following steps:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key authentication method based on an extensible authentication protocol, and the method comprises the steps: enabling a server to transmit an EAP identity request packet (EAP-Request / Identity) to a client based on the extensible authentication protocol; after receiving the identity request, the client generates a random number Rc, and encrypts an EAP identity response packet by using a shared key k between the client and the server; the server receives the message sent by the client and decrypts the message by using k; the shared key k is used for encryption in the authentication process, so that the problem of complex calculation generated in the public and private key generation process is avoided, and the authentication efficiency is greatly improved; a random number, an encryption algorithm and an exclusive-or operation are adopted between the client and the server, a certificate does not need to be used, the expense of certificate management is avoided, and the authentication cost is saved.

Description

technical field [0001] The invention belongs to the technical field of computer information security, in particular to a key authentication method based on an extensible authentication protocol. Background technique [0002] With the rapid development of global information technology, the application of information technology has penetrated into all aspects of social life. People's work and life are increasingly dependent on computers and wireless networks. The issue of information security has become a major issue faced by individuals, enterprises and countries. . Usually, WLAN is deployed in a network resource environment that allows unauthorized users to access, which means that the transmitted data is easy to be eavesdropped, cyberspace security is extremely vulnerable to threats, and it becomes urgent to verify the legitimacy of access user identities. The Extensible Authentication Protocol (EAP) provides an identity authentication framework for wireless local area net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/085H04L9/0869H04L9/3236
Inventor 介银娟王文庆董夏昕邓楠轶崔逸群刘超飞毕玉冰朱博迪肖力炀刘骁刘迪王艺杰朱召鹏崔鑫杨新民杨东
Owner XIAN THERMAL POWER RES INST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More