CN111711603A - Identity authentication system based on terminal equipment of Internet of things - Google Patents
Identity authentication system based on terminal equipment of Internet of things Download PDFInfo
- Publication number
- CN111711603A CN111711603A CN202010400037.9A CN202010400037A CN111711603A CN 111711603 A CN111711603 A CN 111711603A CN 202010400037 A CN202010400037 A CN 202010400037A CN 111711603 A CN111711603 A CN 111711603A
- Authority
- CN
- China
- Prior art keywords
- authentication system
- terminal device
- internet
- user authentication
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to the technical field of identity authentication of terminals of the Internet of things, and discloses an identity authentication system based on terminal equipment of the Internet of things, which comprises: terminal device U running with user authentication system software and connected in Internet of things systemiAuthentication server S running user authentication system softwareCAAnd the system is deployed in the Internet of things system and is connected with a terminal device UiCloud Computing Server (CCS) for communication connectioni(ii) a Operating in an authentication server SCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to safety certification, and only the terminal equipment U connected in the Internet of things systemiThe identity of the cloud computing server is allowed to pass the security authentication of the user authentication systemiAnd terminal equipment UiFor data communication or using terminal equipment UiAnd (5) data acquisition is carried out. The invention solves the problem of how to preventTerminal device U connected in Internet of things systemiAnd malicious replacement.
Description
Technical Field
The invention relates to the technical field of identity authentication of terminals of the Internet of things, in particular to an identity authentication system based on terminal equipment of the Internet of things.
Background
In an internet of things system, terminal equipment relates to identification of an object and acquisition of data information; the information security relates to the reliability of the identity of the terminal equipment, the confidentiality of data transmission, the security of data storage and the like; the communication network of the internet of things has threats such as information leakage, information tampering, replay attack, denial of service and the like which are faced by a common network, and also faces that a terminal device node can be easily damaged for an attacker, and device replacement, data interception, information tampering and the like can be carried out. For the identification of the terminal device, there are currently various technologies to verify the authenticity thereof, such as barcode and RFID technologies based on ID identification, radar technologies and infrared technologies based on object properties, and the like. For terminal devices, since they can detect, store, process and fuse various information related to objects, and can provide these data to the network, various security measures are required to secure the data.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an identity authentication system based on terminal equipment of the Internet of things, which aims to solve the problem of how to prevent terminal equipment U connected in the Internet of things systemiThe technical problem of being replaced maliciously.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
an identity authentication system based on terminal equipment of the Internet of things comprises: terminal device U running with user authentication system software and connected in Internet of things systemiAuthentication server S running user authentication system softwareCAAnd the system is deployed in the Internet of things system and is connected with a terminal device UiCloud Computing Server (CCS) for communication connectioni;
Terminal device UiAuthentication server on user authentication system through network communication equipmentCATo perform communication connection between them, and authenticate the server SCAThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiPassing authentication server SCAAnd terminal equipment UiPerforming communication connection between each other;
operating in an authentication server SCAThe user authentication system on the system is used for the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to security authentication, and the security authentication method specifically comprises the following steps:
step S1: terminal device UiAt an authentication server SCAThe user registration on the user authentication system specifically includes:
terminal device UiSelecting a third node of a graph G having t nodesThe coloring scheme is used for sending the graph G to a user authentication system by taking one three coloring schemes of the graph G as a private key;
step S2: in cloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data acquisition, the user authentication system performs authentication on the terminal device UiThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
(1) terminal device UiPrepare the user authentication system for the following locked opaque box Bi、BijWherein i is more than or equal to 1 and less than or equal to 3t, i is more than or equal to 1 and less than or equal to 3t<j≤3t;
Each BiThe box is provided with a node, eachThe box is filled with one color in the following mode: for each pair (i)lC) there is one i, such that ilIn BiIn c isWherein 1 is not more than il≤t,c=B,R,W;
each BijThe box contains 0 or 1, i being present if and only if the following two conditions are metlAnd jlRespectively appear in box BiAnd BjIn graph G, there is a connection ilAnd jlThe edge of (1);
in the trichromatic scheme, give ilThe coloring appears in the boxIn, give jlThe coloring appears in the boxSeed of Japanese apricotIn (B)i、BijRespectively called node box, color box and edge box;
(2) the user authentication system 0/1 selects a digit 0 or 1 and sends it to the terminal device Ui;
(3) Terminal device UiIf the received number is:
a.0, opening all node boxes and edge boxes;
b.1, opening all color boxes and the side boxes: at terminal equipment UiIn the trichromatic scheme BiAnd BjThe nodes installed have the same color;
c. if not, rejecting the test result;
(4) user authentication system verification terminal device UiIf the user authentication system sends to the terminal device UiThe numbers of (a) are:
a.0, the user authentication system verifies that the user has arrived at the copy of G and 2t isolated nodes; if so, the user authentication system accepts, otherwise, rejects;
b.1, the user authentication system verifies that all open 3t (t-1)/2 side boxes contain 0, and the occurrence number of each color in the color box is t times, if so, the user authentication system accepts, otherwise, the user authentication system rejects.
Further, the authentication server SCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to safety certification, and only the terminal equipment U connected in the Internet of things systemiThe identity of the cloud computing server is allowed to pass the security authentication of the user authentication systemiAnd terminal equipment UiFor data communication or using terminal equipment UiAnd (5) data acquisition is carried out.
Further, theCloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data collection, the authentication server S operatesCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of (2) is securely authenticated.
Further, the private key is a unique legal certification key and is only the terminal device UiOwn alone, i.e., the user authentication system is not aware of a three coloring scheme of graph G.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. the invention relates to a cloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data collection, the authentication server S operatesCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to safety certification, and only the terminal equipment U connected in the Internet of things systemiPasses the security authentication of the user authentication system, authentication server SCAJust allow cloud computing server CCSiAnd terminal equipment UiFor data communication or using terminal equipment UiData acquisition is carried out, if the terminal equipment U is connected in the Internet of things systemiIf it is maliciously replaced, it will not pass the security authentication of the user authentication system, at which time the authentication server SCAWill prevent the cloud computing server CCSiAnd terminal equipment UiThe communication connection between the terminal equipment and the terminal equipment effectively ensures that the terminal equipment U is connected in the Internet of things systemiThe reliability of the performance of the device.
2. After the authentication of the invention is completed, the user authentication system only knows the terminal equipment UiIs not aware of the terminal device U, whether the identity of (b) is legitimate or notiI.e. the terminal device UiThe safety authentication of identity is completed without revealing the private key of the user, and the authentication mode obviously proposesIs higher than terminal equipment UiSecurity of the identity authentication process.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An identity authentication system based on terminal equipment of the Internet of things comprises: terminal device U running with user authentication system software and connected in Internet of things systemiAuthentication server S running user authentication system softwareCAAnd the system is deployed in the Internet of things system and is connected with a terminal device UiCloud Computing Server (CCS) for communication connectioni;
Terminal device UiAuthentication server on user authentication system through network communication equipmentCATo perform communication connection between them, and authenticate the server SCAThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiPassing authentication server SCAAnd terminal equipment UiPerforming communication connection between each other;
for preventing terminal equipment U connected in Internet of things systemiMaliciously replaced, cloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data collection, the authentication server S operatesCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to safety certification, and only the terminal equipment U connected in the Internet of things systemiPasses the security authentication of the user authentication system, authentication server SCAJust allow cloud computing server CCSiAnd terminal equipment UiFor data communication or using terminal equipment UiNumber of advancesCollecting;
operating in an authentication server SCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to security authentication, and the security authentication method specifically comprises the following steps:
step S1: terminal device UiAt an authentication server SCAThe user registration on the user authentication system specifically includes:
terminal device UiSelecting a three-coloring scheme of a graph G with t nodes, taking the three-coloring scheme of the graph G as a private key, and sending the graph G to a user authentication system;
wherein, one three-coloring scheme of the graph G is a private key which is a unique legal certification key and is only a terminal device UiOwn alone, i.e., the user authentication system is not aware of a three coloring scheme of graph G;
step S2: in cloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data acquisition, the user authentication system performs authentication on the terminal device UiThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
(1) terminal device UiPrepare the user authentication system for the following locked opaque box Bi、BijWherein i is more than or equal to 1 and less than or equal to 3t, i is more than or equal to 1 and less than or equal to 3t<j≤3t;
Each BiThe box is provided with a node, eachThe box is filled with one color in the following mode: for each pair (i)lC) there is one i, such that ilIn BiIn c isWherein 1 is not more than il≤t,c=B,R,W;
each BijThe box contains 0 or 1, i being present if and only if the following two conditions are metlAnd jlRespectively appear in box BiAnd BjIn graph G, there is a connection ilAnd jlThe edge of (1);
in the trichromatic scheme, give ilThe coloring appears in the boxIn, give jlThe coloring appears in the boxIn (B)i、BijRespectively called node box, color box and edge box;
(2) the user authentication system 0/1 selects a digit 0 or 1 and sends it to the terminal device Ui;
(3) Terminal device UiIf the received number is:
a.0, opening all node boxes and edge boxes;
b.1, opening all color boxes and the side boxes: at terminal equipment UiIn the trichromatic scheme BiAnd BjThe nodes installed have the same color;
c. if not, rejecting the test result;
(4) user authentication system verification terminal device UiIf the user authentication system sends to the terminal device UiThe numbers of (a) are:
a.0, the user authentication system verifies that the user has arrived at the copy of G and 2t isolated nodes; if so, the user authentication system accepts, otherwise, rejects;
b.1, the user authentication system confirms that all opened 3t (t-1)/2 side boxes contain 0, the occurrence frequency of each color in the color box is t times, if so, the user authentication system accepts, otherwise, the user authentication system rejects;
at terminal equipment UiAfter the identity authentication is completed, the user authentication system only knows the terminal device UiIs not aware of the terminal device U, whether the identity of (b) is legitimate or notiA triple coloring scheme of the private key map G, i.e. the terminal device UiThe identity security authentication is completed on the premise of not revealing a three-coloring scheme of a private key graph G of the terminal device, and the authentication mode remarkably improves the terminal device UiSecurity performance of the identity authentication process;
if the terminal device U is connected in the Internet of things systemiIf it is maliciously replaced, it will not pass the security authentication of the user authentication system, at which time the authentication server SCAWill prevent the cloud computing server CCSiAnd terminal equipment UiThe communication connection between the terminal equipment and the terminal equipment effectively ensures that the terminal equipment U is connected in the Internet of things systemiThe reliability of the performance of the device.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. The utility model provides an identity authentication system based on thing networking terminal equipment which characterized in that includes: terminal device U running with user authentication system software and connected in Internet of things systemiAuthentication server S running user authentication system softwareCAAnd the system is deployed in the Internet of things system and is connected with a terminal device UiCloud Computing Server (CCS) for communication connectioni;
Terminal device UiAuthentication at a user through a network communication deviceAuthentication system and authentication server SCATo perform communication connection between them, and authenticate the server SCAThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiPassing authentication server SCAAnd terminal equipment UiPerforming communication connection between each other;
operating in an authentication server SCAThe user authentication system on the system is used for the terminal device U connected in the Internet of things systemiThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
step S1: terminal device UiAt an authentication server SCAThe user registration on the user authentication system specifically includes:
terminal device UiSelecting a three-coloring scheme of a graph G with t nodes, taking the three-coloring scheme of the graph G as a private key, and sending the graph G to a user authentication system;
step S2: in cloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data acquisition, the user authentication system performs authentication on the terminal device UiThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
(1) terminal device UiPrepare the user authentication system for the following locked opaque box Bi、BijWherein i is more than or equal to 1 and less than or equal to 3t, i is more than or equal to 1 and less than or equal to 3t<j≤3t;
Each BiThe box is provided with a node, eachThe box is filled with one color in the following mode: for each pair (i)lC) there is one i, such that ilIn BiIn c isWherein 1 is not more than il≤t,c=B,R,W;
each BijThe box contains 0 or 1, i being present if and only if the following two conditions are metlAnd jlRespectively appear in box BiAnd BjIn graph G, there is a connection ilAnd jlThe edge of (1);
in the trichromatic scheme, give ilThe coloring appears in the boxIn, give jlThe coloring appears in the boxIn (B)i、BijRespectively called node box, color box and edge box;
(2) the user authentication system 0/1 selects a digit 0 or 1 and sends it to the terminal device Ui;
(3) Terminal device UiIf the received number is:
a.0, opening all node boxes and edge boxes;
b.1, opening all color boxes and the side boxes: at terminal equipment UiIn the trichromatic scheme BiAnd BjThe nodes installed have the same color;
c. if not, rejecting the test result;
(4) user authentication system verification terminal device UiIf the user authentication system sends to the terminal device UiThe numbers of (a) are:
a.0, the user authentication system verifies that the user has arrived at the copy of G and 2t isolated nodes; if so, the user authentication system accepts, otherwise, rejects;
b.1, the user authentication system verifies that all open 3t (t-1)/2 side boxes contain 0, and the occurrence number of each color in the color box is t times, if so, the user authentication system accepts, otherwise, the user authentication system rejects.
2. The identity authentication system based on the terminal equipment of the internet of things according to claim 1, wherein the authentication server SCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of the user is subjected to safety certification, and only the terminal equipment U connected in the Internet of things systemiThe identity of the cloud computing server is allowed to pass the security authentication of the user authentication systemiAnd terminal equipment UiFor data communication or using terminal equipment UiAnd (5) data acquisition is carried out.
3. The identity authentication system based on the terminal equipment of the internet of things of claim 2, wherein the cloud computing server CCSiIn and out terminal device UiFor data communication or using terminal equipment UiBefore data collection, the authentication server S operatesCAThe user authentication system starts to perform authentication on the terminal device U connected in the Internet of things systemiThe identity of (2) is securely authenticated.
4. The identity authentication system based on the terminal equipment of the internet of things as claimed in claim 3, wherein the private key is a unique legal certification key and is only the terminal equipment UiOwn alone, i.e., the user authentication system is not aware of a three coloring scheme of graph G.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010400037.9A CN111711603A (en) | 2020-05-13 | 2020-05-13 | Identity authentication system based on terminal equipment of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010400037.9A CN111711603A (en) | 2020-05-13 | 2020-05-13 | Identity authentication system based on terminal equipment of Internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111711603A true CN111711603A (en) | 2020-09-25 |
Family
ID=72537070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010400037.9A Withdrawn CN111711603A (en) | 2020-05-13 | 2020-05-13 | Identity authentication system based on terminal equipment of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111711603A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112543311A (en) * | 2020-12-01 | 2021-03-23 | 杭州思源信息技术股份有限公司 | Forest area visual management system based on internet of things technology |
CN113068188A (en) * | 2021-03-16 | 2021-07-02 | 贺良良 | External user identity authentication system based on wireless sensor node |
-
2020
- 2020-05-13 CN CN202010400037.9A patent/CN111711603A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112543311A (en) * | 2020-12-01 | 2021-03-23 | 杭州思源信息技术股份有限公司 | Forest area visual management system based on internet of things technology |
CN113068188A (en) * | 2021-03-16 | 2021-07-02 | 贺良良 | External user identity authentication system based on wireless sensor node |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101248613B (en) | Authentic device admission scheme for a secure communication network, especially a secure ip telephony network | |
CN100496025C (en) | Ternary equal identification based reliable network access control method | |
CN105450442B (en) | A kind of network topology investigation method and its system | |
US8255977B2 (en) | Trusted network connect method based on tri-element peer authentication | |
US6865673B1 (en) | Method for secure installation of device in packet based communication network | |
CN110086821A (en) | The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain | |
CN104335546B (en) | The method and apparatus that trust information is created for other application using neighbours' discovery | |
CN110830446B (en) | SPA security verification method and device | |
Hijazi et al. | Address resolution protocol spoofing attacks and security approaches: A survey | |
CN111770071B (en) | Method and device for gateway authentication of trusted device in network stealth scene | |
CN110830447A (en) | SPA single packet authorization method and device | |
CN104869111B (en) | A kind of trusted end-user access authentication system and method | |
CN111711603A (en) | Identity authentication system based on terminal equipment of Internet of things | |
CN115550069B (en) | Intelligent charging system of electric automobile and safety protection method thereof | |
GB2469287A (en) | Authentication of a nodes identity using a certificate comparison | |
CN106899561A (en) | A kind of TNC authority control methods and system based on ACL | |
CN105978883A (en) | Large-scale IoV security data acquisition method | |
CN108011873A (en) | A kind of illegal connection determination methods based on set covering | |
CN111935213A (en) | Distributed trusted authentication virtual networking system and method | |
CN111212430A (en) | Wireless local area network protection system based on zero knowledge proof | |
CN111031537A (en) | Wireless local area network management system for preventing illegal user access | |
CN113949414A (en) | Low-voltage power line carrier communication trusted security access method | |
CN101272379A (en) | Improving method based on IEEE802.1x safety authentication protocol | |
CN117201077A (en) | Internet of things access scene identity modeling and trust evaluation method | |
CN201846357U (en) | Security network architecture for non-field industries |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200925 |