CN102035645A - 一种资源受限网络的实体鉴别方法及系统 - Google Patents
一种资源受限网络的实体鉴别方法及系统 Download PDFInfo
- Publication number
- CN102035645A CN102035645A CN201010556498.1A CN201010556498A CN102035645A CN 102035645 A CN102035645 A CN 102035645A CN 201010556498 A CN201010556498 A CN 201010556498A CN 102035645 A CN102035645 A CN 102035645A
- Authority
- CN
- China
- Prior art keywords
- entity
- message
- resource
- identification
- discriminating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Abstract
Description
Claims (21)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010556498.1A CN102035645B (zh) | 2010-08-27 | 2010-11-23 | 一种资源受限网络的实体鉴别方法及系统 |
US13/819,698 US9047449B2 (en) | 2010-08-27 | 2010-12-21 | Method and system for entity authentication in resource-limited network |
PCT/CN2010/080046 WO2012024876A1 (zh) | 2010-08-27 | 2010-12-21 | 一种资源受限网络的实体鉴别方法及系统 |
EP10856328.9A EP2611066B1 (en) | 2010-08-27 | 2010-12-21 | Method and system for entity authentication in resource-limited network |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010265319.9A CN101925060A (zh) | 2010-08-27 | 2010-08-27 | 一种资源受限网络的实体鉴别方法及系统 |
CN201010265319.9 | 2010-08-27 | ||
CN201010556498.1A CN102035645B (zh) | 2010-08-27 | 2010-11-23 | 一种资源受限网络的实体鉴别方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102035645A true CN102035645A (zh) | 2011-04-27 |
CN102035645B CN102035645B (zh) | 2012-02-01 |
Family
ID=43339625
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010265319.9A Pending CN101925060A (zh) | 2010-08-27 | 2010-08-27 | 一种资源受限网络的实体鉴别方法及系统 |
CN201010556498.1A Active CN102035645B (zh) | 2010-08-27 | 2010-11-23 | 一种资源受限网络的实体鉴别方法及系统 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010265319.9A Pending CN101925060A (zh) | 2010-08-27 | 2010-08-27 | 一种资源受限网络的实体鉴别方法及系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9047449B2 (zh) |
EP (1) | EP2611066B1 (zh) |
CN (2) | CN101925060A (zh) |
WO (1) | WO2012024876A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9047449B2 (en) | 2010-08-27 | 2015-06-02 | China Iwncomm Co., Ltd. | Method and system for entity authentication in resource-limited network |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497273B (zh) * | 2011-12-27 | 2018-09-28 | 西安西电捷通无线网络通信股份有限公司 | 一种实体鉴别方法和装置及系统 |
US9479499B2 (en) * | 2013-03-21 | 2016-10-25 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for identity authentication via mobile capturing code |
WO2015086478A1 (en) * | 2013-12-09 | 2015-06-18 | Koninklijke Philips N.V. | Method for operating a node in a network and node device |
CN104811306B (zh) * | 2014-01-28 | 2019-07-19 | 西安西电捷通无线网络通信股份有限公司 | 实体鉴别方法、装置及系统 |
CN109005187A (zh) * | 2018-08-21 | 2018-12-14 | 广州飞硕信息科技股份有限公司 | 一种通信信息保护方法及装置 |
CN110636504B (zh) * | 2019-10-24 | 2022-09-06 | 飞天诚信科技股份有限公司 | 一种轻量级鉴别方法及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040177250A1 (en) * | 2003-03-05 | 2004-09-09 | Cedric Westphal | Optimization for security certificates management |
CN101132280A (zh) * | 2007-10-16 | 2008-02-27 | 西安西电捷通无线网络通信有限公司 | 一种wapi证书鉴别方法 |
CN101222328A (zh) * | 2007-12-14 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | 一种实体双向鉴别方法 |
CN101442408A (zh) * | 2007-11-23 | 2009-05-27 | 上海千镭星电子科技有限公司 | 嵌入式加密系统 |
EP2101302A1 (en) * | 2008-03-12 | 2009-09-16 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143453A1 (en) * | 2002-06-19 | 2006-06-29 | Secured Communications, Inc | Inter-authentication method and device |
US7581100B2 (en) * | 2003-09-02 | 2009-08-25 | Authernative, Inc. | Key generation method for communication session encryption and authentication system |
WO2007058732A2 (en) | 2005-11-10 | 2007-05-24 | Markmonitor Inc. | B2c authentication system and methods |
CN101052033B (zh) | 2006-04-05 | 2012-04-04 | 华为技术有限公司 | 基于ttp的认证与密钥协商方法及其装置 |
US8074083B1 (en) * | 2007-01-09 | 2011-12-06 | Google Inc. | Controlling download and playback of media content |
US20090094372A1 (en) * | 2007-10-05 | 2009-04-09 | Nyang Daehun | Secret user session managing method and system under web environment, recording medium recorded program executing it |
CN101159639B (zh) | 2007-11-08 | 2010-05-12 | 西安西电捷通无线网络通信有限公司 | 一种单向接入认证方法 |
CN100488099C (zh) * | 2007-11-08 | 2009-05-13 | 西安西电捷通无线网络通信有限公司 | 一种双向接入认证方法 |
CN101329719B (zh) * | 2008-08-01 | 2010-11-10 | 西安西电捷通无线网络通信股份有限公司 | 一种适合于同类电子标签的匿名认证方法 |
CN101364875B (zh) | 2008-09-12 | 2010-08-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 |
JP5552541B2 (ja) * | 2009-12-04 | 2014-07-16 | クリプトグラフィ リサーチ, インコーポレイテッド | 検証可能な耐漏洩性暗号化および復号化 |
US8467532B2 (en) * | 2010-01-04 | 2013-06-18 | Tata Consultancy Services Limited | System and method for secure transaction of data between a wireless communication device and a server |
CN101925060A (zh) | 2010-08-27 | 2010-12-22 | 西安西电捷通无线网络通信股份有限公司 | 一种资源受限网络的实体鉴别方法及系统 |
-
2010
- 2010-08-27 CN CN201010265319.9A patent/CN101925060A/zh active Pending
- 2010-11-23 CN CN201010556498.1A patent/CN102035645B/zh active Active
- 2010-12-21 WO PCT/CN2010/080046 patent/WO2012024876A1/zh active Application Filing
- 2010-12-21 US US13/819,698 patent/US9047449B2/en active Active
- 2010-12-21 EP EP10856328.9A patent/EP2611066B1/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040177250A1 (en) * | 2003-03-05 | 2004-09-09 | Cedric Westphal | Optimization for security certificates management |
CN101132280A (zh) * | 2007-10-16 | 2008-02-27 | 西安西电捷通无线网络通信有限公司 | 一种wapi证书鉴别方法 |
CN101442408A (zh) * | 2007-11-23 | 2009-05-27 | 上海千镭星电子科技有限公司 | 嵌入式加密系统 |
CN101222328A (zh) * | 2007-12-14 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | 一种实体双向鉴别方法 |
EP2101302A1 (en) * | 2008-03-12 | 2009-09-16 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9047449B2 (en) | 2010-08-27 | 2015-06-02 | China Iwncomm Co., Ltd. | Method and system for entity authentication in resource-limited network |
Also Published As
Publication number | Publication date |
---|---|
CN102035645B (zh) | 2012-02-01 |
EP2611066A1 (en) | 2013-07-03 |
US20130326584A1 (en) | 2013-12-05 |
WO2012024876A1 (zh) | 2012-03-01 |
EP2611066A4 (en) | 2017-06-07 |
US9047449B2 (en) | 2015-06-02 |
EP2611066B1 (en) | 2018-08-29 |
CN101925060A (zh) | 2010-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lounis et al. | Attacks and defenses in short-range wireless technologies for IoT | |
Chahid et al. | Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art | |
CN102035645B (zh) | 一种资源受限网络的实体鉴别方法及系统 | |
CN102014386B (zh) | 一种基于对称密码算法的实体鉴别方法及系统 | |
Kambourakis et al. | A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks | |
CN102256249A (zh) | 适用于无线网络的身份认证方法及其设备 | |
CN110366175B (zh) | 安全协商方法、终端设备和网络设备 | |
Billure et al. | Internet of Things-a study on the security challenges | |
CN107210915A (zh) | 相互认证 | |
Sekhar et al. | Security in wireless sensor networks with public key techniques | |
WO2012075797A1 (zh) | 读写器与电子标签安全通信的方法、读写器及电子标签 | |
Shen et al. | Secure in-band bootstrapping for wireless personal area networks | |
CN102497273A (zh) | 一种实体鉴别方法和装置及系统 | |
Chen et al. | Mobile device based dynamic key management protocols for wireless sensor networks | |
Zhang et al. | Security-aware device-to-device communications underlaying cellular networks | |
Lounis | Security of short-range wireless technologies and an authentication protocol for IoT | |
Xu et al. | A privacy-preserving and cross-domain group authentication scheme for vehicular in LTE-A networks | |
Xiong et al. | Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network | |
Saxena et al. | Security solutions against attacks in mobile ad hoc networks and their verification using BAN logic | |
Marchesani et al. | A middleware approach to provide security in IEEE 802.15. 4 wireless sensor networks | |
CN108882232A (zh) | 一种物联网设备间的认证码嵌入消息传输方法 | |
Vahed | Analysis of iot security weaknesses and ways to protect against them | |
Bartoli et al. | Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks | |
WO2015113485A1 (zh) | 实体鉴别方法、装置及系统 | |
Kim et al. | Lightweight Mutual authentication and Key Agreement in IoT networks and Wireless Sensor networks Proposal of Authentication and Key Agreement in IoT network and Sensor Network Using Poor wireless communication of less than 1 kbps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20110427 Assignee: Shenzhen mingwah Aohan Smart Card Co. Ltd. Assignor: Anxi Dianjietong Wireless Network Communications Co.,Ltd. Contract record no.: 2018610000008 Denomination of invention: Entity identification method and system of energy-constrained network Granted publication date: 20120201 License type: Common License Record date: 20180319 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20110427 Assignee: Shenzhen mingwah Aohan Smart Card Co. Ltd. Assignor: Anxi Dianjietong Wireless Network Communications Co.,Ltd. Contract record no.: 2018610000009 Denomination of invention: Entity identification method and system of energy-constrained network Granted publication date: 20120201 License type: Common License Record date: 20180320 Application publication date: 20110427 Assignee: Shenzhen mingwah Aohan Smart Card Co. Ltd. Assignor: Anxi Dianjietong Wireless Network Communications Co.,Ltd. Contract record no.: 2018610000010 Denomination of invention: Entity identification method and system of energy-constrained network Granted publication date: 20120201 License type: Common License Record date: 20180322 |