User authentication system suitable for cloud broadcast television network
Technical Field
The invention relates to the technical field of user authentication in a cloud broadcast television network, in particular to a user authentication system suitable for the cloud broadcast television network.
Background
With the rapid development of the internet of things and cloud computing technology, a broadcast television network starts to transfer to a cloud end, and enters a strategic transformation stage of an intelligent information service cloud platform by taking new wisdom and new experience as themes. Under the cooperation of the cloud pipe end, a radio and television provider accesses internet information into an application platform by means of cloud, so that diversified information services such as digital televisions, remote education, government information release, community intelligent services, game entertainment and the like are provided for users. The cloud environment is formed by computer servers and provides data storage and sharing, the management is a remote data transmission management protocol, and the terminal is an internet of things terminal device.
However, after the broadcast network is fused to the cloud, since a secure authentication scheme is not available for the identity of the user, lawless persons are active, and often tamper with the broadcast information privately and obtain intelligent services by using the network.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a user authentication system suitable for a cloud broadcast network, which aims to solve the technical problem that the identity of a user is lack of safety authentication after cloud fusion in the existing broadcast network.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a user authentication system suitable for a cloud broadcast television network comprises: the system comprises a cloud server for storing and sharing broadcast network data, wherein broadcast network system software runs on an operating system of the cloud server;
further comprising: the system comprises user terminal equipment for receiving broadcast network data, wherein the operating system of the user terminal equipment runs broadcast network system software;
the user terminal equipment is in communication connection with the cloud server through a remote data transmission management protocol;
the broadcast television network system comprises a user authentication system which adopts a user authentication method based on zero knowledge certification to authenticate a user U on user terminal equipmentiThe identity authentication method specifically comprises the following steps:
the method comprises the following steps: user UiThe encryption registration is carried out on a user authentication system of a broadcast television network system, and specifically comprises the following steps:
user UiSelecting two large prime numbers p and q, calculating n as p multiplied by q, and using UiFrom [0, n-1 ]]Selecting a private key k, calculating a public key v as kmode, and using a user UiTransmitting n and v to a user authentication system;
step two: user authentication system of broadcast television network system for user UiThe identity authentication specifically comprises:
(1) user UiFrom [0, n-1 ]]Randomly selecting a number r, and calculating x ═ r2modn, transmitting x to the user authentication system;
(2) user authentication system for authenticating user UiReturning c, wherein c is 0 or 1;
(3) user UiCalculating y-rkcTransmitting y to the user authentication system;
(4) user authentication System calculation y2mod n and xvcIf y is2modn=xvcThen user UiKnowing the value of key k, i.e. user UiThe identity of (2) is authenticated;
step three: if the user UiThe identity of the user passes the authentication of the user authentication system, and the user authentication system allows the user UiAnd sending a request for acquiring the broadcast network data to a cloud server to acquire the broadcast network data.
Further, the first step: user UiThe encryption registration is carried out on a user authentication system of a broadcast television network system, and the specific process is as follows:
(1) user UiClicking user registration, user authentication system popping up and user U on broadcast television network system on user terminal equipmentiA dialog box for interactive communication;
(2) user UiSelecting two large prime numbers p and q, and calculating n as p multiplied by q; user UiFrom [0, n-1 ]]Selecting a private key k, and calculating a public key v as kmode; user UiN and v are entered in a pop-up dialog box, after which the dialog box disappears.
Further, the step (1), (2), (3) and (4) in the step two constitute a round of authentication, each round of authentication allows c to be 0 or 1, and the step t is repeatedly executediThereafter, the user UiOnly if each round of authentication is passed, the authentication of the user authentication system of the broadcast television network system can be passed;
if at a certain turn, recognizeDuring the execution of the certificate, the user UiIf the authentication is not passed, the whole authentication process is terminated, and the user UiThe authentication of the user authentication system of the broadcast television network system is not passed.
Furthermore, the dialog box has traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
the invention operates the broadcast television network system on the cloud server for storing and sharing the broadcast television network data and the user terminal equipment, and the user authentication system of the broadcast television network system is used for transmitting a user U on the user terminal equipment for acquiring the broadcast television network data request to the cloud serveriThe identity authentication is carried out by adopting a user authentication method based on zero knowledge proof, and only the user U passing the identity authenticationiOnly can a request for acquiring the data of the broadcast network be sent to the cloud server to acquire the data of the broadcast network;
and at the user UiAfter the identity authentication is completed, the user authentication system of the broadcast television network system only knows the user UiIs legitimate, it does not know the user UiPrivate key k of, i.e. user UiThe identity authentication is completed on the premise of not revealing the private key k of the user;
therefore, the technical problem that the identity of a user is lack of safety authentication after cloud fusion in the existing broadcast network is solved.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A user authentication system suitable for a cloud broadcast television network comprises: the system comprises a cloud server for storing and sharing broadcast network data, wherein broadcast network system software runs on an operating system of the cloud server;
further comprising: the system comprises user terminal equipment for receiving broadcast network data, wherein the operating system of the user terminal equipment runs broadcast network system software;
the user terminal equipment is in communication connection with the cloud server through a remote data transmission management protocol;
the broadcast television network system comprises a user authentication system which adopts a user authentication method based on zero knowledge certification to authenticate a user U on user terminal equipmentiThe identity authentication method specifically comprises the following steps:
the method comprises the following steps: user UiThe encryption registration is carried out on a user authentication system of a broadcast television network system, and the specific process is as follows:
(1) user UiClicking user registration, user authentication system popping up and user U on broadcast television network system on user terminal equipmentiA dialog box for interactive communication;
(2) user UiSelecting two large prime numbers p and q, and calculating n as p multiplied by q; user UiFrom [0, n-1 ]]Selecting a private key k, and calculating a public key v as kmode;
user UiInputting n and v in a popped up dialog box, and then disappearing the dialog box;
the private key k is the only legal certification key and is only the user UiThe system is owned independently, namely a user authentication system of the broadcast television network system does not know the secret key k;
step two: when the user UiWhen a request for acquiring the data of the broadcast television network is sent to a cloud server on user terminal equipment through the broadcast television network system, a user authentication system of the broadcast television network system starts to authenticate a user UiThe identity of the user is authenticated, and the specific authentication process is as follows:
(1) user authentication system pops up and user U on authentication pageiA dialog box for interactive communication;
(2) user UiFrom [0, n-1 ]]Randomly selecting a number r, and calculating x ═ r2mod n and enter x into the dialog box;
(3) the user authentication system displays c in the dialog box, wherein c is 0 or 1;
(4) user UiCalculating y-rkcInputting y into the dialog box; wherein r is the user UiA random number is selected, k being the user UiThe private key of (1);
(5) user authentication System calculation y2mod n and xvcIf y is2modn=xvcThen user UiKnowing the value of key k;
preferably, the steps (2), (3), (4) and (5) constitute one round of authentication, each round of authentication has c equal to 0 or 1, and t is repeatedly executediThereafter, the user UiOnly if each round of authentication is passed, the authentication of the user authentication system of the broadcast television network system can be passed;
if in the execution process of a certain round of authentication, the user UiIf the authentication is not passed, the whole authentication process is terminated, and the user UiThe authentication of the user authentication system of the broadcast television network system is not passed;
after the identity authentication is completed, the user authentication system of the broadcast television network system only knows the user UiIs legitimate, it does not know the user UiPrivate key k of, i.e. user UiThe identity authentication is completed on the premise of not revealing the private key k of the user;
step three: if the user UiThe identity of the user passes the authentication of the user authentication system of the broadcast network system, and the user authentication system allows the user UiSending a request for acquiring broadcast network data to a cloud server, wherein a user UiThe method comprises the steps of sending a request to a cloud server to obtain broadcast network data;
if the user UiUser authentication system for identity failing to pass broadcast television network systemIf the system is authenticated, the user authentication system does not allow the user UiSending a request for acquiring broadcast network data to a cloud server;
the dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.