Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-domain authentication method between Kerberos and IBC security domains based on alliance chain

An authentication method and security domain technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve problems such as complex authentication information management, difficulty in authentication between heterogeneous trust domains, etc., and achieve good practical value, Resolving Model Complex Effects

Active Publication Date: 2022-08-09
NORTHWESTERN POLYTECHNICAL UNIV
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The authentication process is the premise of data sharing and secure transmission between the two parties in communication. With the continuous increase of application and technical requirements such as flexible production, agile production and personalized production, cross-domain authentication technology in the manufacturing production network is particularly important; however, There are many problems in the current cross-domain authentication method, mainly including: too much reliance on centralized third-party nodes, difficulty in authentication between heterogeneous trust domains, and complicated authentication information management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain authentication method between Kerberos and IBC security domains based on alliance chain
  • Cross-domain authentication method between Kerberos and IBC security domains based on alliance chain
  • Cross-domain authentication method between Kerberos and IBC security domains based on alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not conflict with each other.

[0029] The invention provides a cross-domain method to realize the entity authentication service between Kerberos and IBC security domains. Kerberos is a widely used authentication protocol. It has an internal authentication server for entity authentication and provides authentication services for subjects in the open network. The Identity-Based Cryptography (IBC) authentication framework uses the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cross-domain authentication method between Kerberos and IBC security domains based on an alliance chain, and the method comprises the steps: firstly authenticating the identity information of a target domain entity through a protocol when an entity node in a security domain initiates a cross-domain authentication request, then enabling the identity information of the entity to generate a cross-domain certificate, and storing the cross-domain certificate on a block chain; the authentication information cannot be tampered on the block chain and is confirmed by a plurality of cross-domain nodes according to a consensus protocol, so that decentralization of entity authentication information storage is realized; when an entity node in a security domain requests to authenticate an entity node which has been subjected to cross-domain authentication, in order to improve authentication efficiency, a cross-domain certificate can be directly sent to a target entity node, and the target entity node can complete re-authentication service of an entity identity after the validity of the target entity node is verified by a block chain. The technical problems that a cross-domain authentication centralization model between the Kerberos and the IBC is complex, authentication information management is difficult and the like are solved.

Description

technical field [0001] The invention relates to a cross-domain authentication technology between entities in different security domains, in particular to the first authentication technology, the re-authentication technology and the revocation authentication technology between the Kerberos domain and the IBC security domain. Background technique [0002] With the continuous development of industrial Internet technology and network information security technology, the application scale of industrial Internet in my country's intelligent manufacturing field continues to expand. More and more manufacturing enterprises, organizations or industry institutions use the network environment to build their internal security trust domains. Since each security trust domain adopts different identity authentication frameworks, they are incompatible with each other and are managed by different enterprise institutions, making different security trust domains. It is difficult to build an effic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0823H04L9/3265H04L9/3268Y02P90/30
Inventor 姚烨朱怡安李联牛军涛
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products