CN102035645B - 一种资源受限网络的实体鉴别方法及系统 - Google Patents
一种资源受限网络的实体鉴别方法及系统 Download PDFInfo
- Publication number
- CN102035645B CN102035645B CN201010556498.1A CN201010556498A CN102035645B CN 102035645 B CN102035645 B CN 102035645B CN 201010556498 A CN201010556498 A CN 201010556498A CN 102035645 B CN102035645 B CN 102035645B
- Authority
- CN
- China
- Prior art keywords
- entity
- message
- identification
- resource
- discriminating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (19)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010556498.1A CN102035645B (zh) | 2010-08-27 | 2010-11-23 | 一种资源受限网络的实体鉴别方法及系统 |
US13/819,698 US9047449B2 (en) | 2010-08-27 | 2010-12-21 | Method and system for entity authentication in resource-limited network |
EP10856328.9A EP2611066B1 (en) | 2010-08-27 | 2010-12-21 | Method and system for entity authentication in resource-limited network |
PCT/CN2010/080046 WO2012024876A1 (zh) | 2010-08-27 | 2010-12-21 | 一种资源受限网络的实体鉴别方法及系统 |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010265319.9A CN101925060A (zh) | 2010-08-27 | 2010-08-27 | 一种资源受限网络的实体鉴别方法及系统 |
CN201010265319.9 | 2010-08-27 | ||
CN201010556498.1A CN102035645B (zh) | 2010-08-27 | 2010-11-23 | 一种资源受限网络的实体鉴别方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102035645A CN102035645A (zh) | 2011-04-27 |
CN102035645B true CN102035645B (zh) | 2012-02-01 |
Family
ID=43339625
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010265319.9A Pending CN101925060A (zh) | 2010-08-27 | 2010-08-27 | 一种资源受限网络的实体鉴别方法及系统 |
CN201010556498.1A Active CN102035645B (zh) | 2010-08-27 | 2010-11-23 | 一种资源受限网络的实体鉴别方法及系统 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010265319.9A Pending CN101925060A (zh) | 2010-08-27 | 2010-08-27 | 一种资源受限网络的实体鉴别方法及系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9047449B2 (zh) |
EP (1) | EP2611066B1 (zh) |
CN (2) | CN101925060A (zh) |
WO (1) | WO2012024876A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101925060A (zh) | 2010-08-27 | 2010-12-22 | 西安西电捷通无线网络通信股份有限公司 | 一种资源受限网络的实体鉴别方法及系统 |
CN102497273B (zh) * | 2011-12-27 | 2018-09-28 | 西安西电捷通无线网络通信股份有限公司 | 一种实体鉴别方法和装置及系统 |
US9479499B2 (en) * | 2013-03-21 | 2016-10-25 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for identity authentication via mobile capturing code |
US10277455B2 (en) | 2013-12-09 | 2019-04-30 | Signify Holding B.V. | Method for operating a node in a network and node device |
CN104811306B (zh) | 2014-01-28 | 2019-07-19 | 西安西电捷通无线网络通信股份有限公司 | 实体鉴别方法、装置及系统 |
CN109005187A (zh) * | 2018-08-21 | 2018-12-14 | 广州飞硕信息科技股份有限公司 | 一种通信信息保护方法及装置 |
CN110636504B (zh) * | 2019-10-24 | 2022-09-06 | 飞天诚信科技股份有限公司 | 一种轻量级鉴别方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132280A (zh) * | 2007-10-16 | 2008-02-27 | 西安西电捷通无线网络通信有限公司 | 一种wapi证书鉴别方法 |
CN101222328A (zh) * | 2007-12-14 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | 一种实体双向鉴别方法 |
EP2101302A1 (en) * | 2008-03-12 | 2009-09-16 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143453A1 (en) * | 2002-06-19 | 2006-06-29 | Secured Communications, Inc | Inter-authentication method and device |
US20040177250A1 (en) * | 2003-03-05 | 2004-09-09 | Cedric Westphal | Optimization for security certificates management |
US7581100B2 (en) * | 2003-09-02 | 2009-08-25 | Authernative, Inc. | Key generation method for communication session encryption and authentication system |
US20070250919A1 (en) * | 2005-11-10 | 2007-10-25 | Markmonitor Inc. | B2C Authentication System And Methods |
CN101052033B (zh) * | 2006-04-05 | 2012-04-04 | 华为技术有限公司 | 基于ttp的认证与密钥协商方法及其装置 |
US8074083B1 (en) * | 2007-01-09 | 2011-12-06 | Google Inc. | Controlling download and playback of media content |
US20090094372A1 (en) * | 2007-10-05 | 2009-04-09 | Nyang Daehun | Secret user session managing method and system under web environment, recording medium recorded program executing it |
CN100488099C (zh) * | 2007-11-08 | 2009-05-13 | 西安西电捷通无线网络通信有限公司 | 一种双向接入认证方法 |
CN101159639B (zh) | 2007-11-08 | 2010-05-12 | 西安西电捷通无线网络通信有限公司 | 一种单向接入认证方法 |
CN101442408A (zh) * | 2007-11-23 | 2009-05-27 | 上海千镭星电子科技有限公司 | 嵌入式加密系统 |
CN101329719B (zh) * | 2008-08-01 | 2010-11-10 | 西安西电捷通无线网络通信股份有限公司 | 一种适合于同类电子标签的匿名认证方法 |
CN101364875B (zh) | 2008-09-12 | 2010-08-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 |
EP2507708B1 (en) * | 2009-12-04 | 2019-03-27 | Cryptography Research, Inc. | Verifiable, leak-resistant encryption and decryption |
US8467532B2 (en) * | 2010-01-04 | 2013-06-18 | Tata Consultancy Services Limited | System and method for secure transaction of data between a wireless communication device and a server |
CN101925060A (zh) | 2010-08-27 | 2010-12-22 | 西安西电捷通无线网络通信股份有限公司 | 一种资源受限网络的实体鉴别方法及系统 |
-
2010
- 2010-08-27 CN CN201010265319.9A patent/CN101925060A/zh active Pending
- 2010-11-23 CN CN201010556498.1A patent/CN102035645B/zh active Active
- 2010-12-21 WO PCT/CN2010/080046 patent/WO2012024876A1/zh active Application Filing
- 2010-12-21 EP EP10856328.9A patent/EP2611066B1/en active Active
- 2010-12-21 US US13/819,698 patent/US9047449B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132280A (zh) * | 2007-10-16 | 2008-02-27 | 西安西电捷通无线网络通信有限公司 | 一种wapi证书鉴别方法 |
CN101222328A (zh) * | 2007-12-14 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | 一种实体双向鉴别方法 |
EP2101302A1 (en) * | 2008-03-12 | 2009-09-16 | Userstar Information System Co., Ltd. | Method and system for verifying authenticity of an object |
Also Published As
Publication number | Publication date |
---|---|
US20130326584A1 (en) | 2013-12-05 |
CN101925060A (zh) | 2010-12-22 |
WO2012024876A1 (zh) | 2012-03-01 |
EP2611066B1 (en) | 2018-08-29 |
CN102035645A (zh) | 2011-04-27 |
EP2611066A1 (en) | 2013-07-03 |
US9047449B2 (en) | 2015-06-02 |
EP2611066A4 (en) | 2017-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lounis et al. | Attacks and defenses in short-range wireless technologies for IoT | |
Cao et al. | Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system | |
CN102035645B (zh) | 一种资源受限网络的实体鉴别方法及系统 | |
Boyle et al. | Securing Wireless Sensor Networks: Security Architectures. | |
CN102014386B (zh) | 一种基于对称密码算法的实体鉴别方法及系统 | |
Seshadri et al. | SAKE: Software attestation for key establishment in sensor networks | |
Ukil et al. | Lightweight security scheme for vehicle tracking system using CoAP | |
CN107210911A (zh) | 安全系统中终端的改进安装 | |
CN103037367A (zh) | 无线传感网络中基于密码hash计算的认证方法 | |
CN107210915A (zh) | 相互认证 | |
Sekhar et al. | Security in wireless sensor networks with public key techniques | |
Goswami et al. | Security of IoT in 5G cellular networks: A review of current status, challenges and future directions | |
CN103841553A (zh) | 一种混合无线Mesh网络路由安全和隐私保护的方法 | |
Ren et al. | IPSadas: identity‐privacy‐aware secure and anonymous data aggregation scheme | |
Shen et al. | Secure in-band bootstrapping for wireless personal area networks | |
Moon et al. | An overview on: Intrusion detection system with secure hybrid mechanism in wireless sensor network | |
Periyanayagi et al. | Swarm-based defense technique for tampering and cheating attack in WSN using CPHS | |
CN102497273A (zh) | 一种实体鉴别方法和装置及系统 | |
Chen et al. | Mobile device based dynamic key management protocols for wireless sensor networks | |
Zhang et al. | Security-aware device-to-device communications underlaying cellular networks | |
Xu et al. | A privacy-preserving and cross-domain group authentication scheme for vehicular in LTE-A networks | |
Elbagoury et al. | Practical provably secure key sharing for near field communication devices | |
Deepa et al. | Adoption of Hybrid Cryptography in an Acknowledgement Based Intrusion Detection System for Manets | |
Marchesani et al. | A middleware approach to provide security in IEEE 802.15. 4 wireless sensor networks | |
CN104270752A (zh) | 无线网络中的密钥协商方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20110427 Assignee: Shenzhen mingwah Aohan Smart Card Co. Ltd. Assignor: Anxi Dianjietong Wireless Network Communications Co.,Ltd. Contract record no.: 2018610000008 Denomination of invention: Entity identification method and system of energy-constrained network Granted publication date: 20120201 License type: Common License Record date: 20180319 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20110427 Assignee: Shenzhen mingwah Aohan Smart Card Co. Ltd. Assignor: Anxi Dianjietong Wireless Network Communications Co.,Ltd. Contract record no.: 2018610000009 Denomination of invention: Entity identification method and system of energy-constrained network Granted publication date: 20120201 License type: Common License Record date: 20180320 Application publication date: 20110427 Assignee: Shenzhen mingwah Aohan Smart Card Co. Ltd. Assignor: Anxi Dianjietong Wireless Network Communications Co.,Ltd. Contract record no.: 2018610000010 Denomination of invention: Entity identification method and system of energy-constrained network Granted publication date: 20120201 License type: Common License Record date: 20180322 |