CN112887282A - Identity authentication method, device and system and electronic equipment - Google Patents

Identity authentication method, device and system and electronic equipment Download PDF

Info

Publication number
CN112887282A
CN112887282A CN202110044025.1A CN202110044025A CN112887282A CN 112887282 A CN112887282 A CN 112887282A CN 202110044025 A CN202110044025 A CN 202110044025A CN 112887282 A CN112887282 A CN 112887282A
Authority
CN
China
Prior art keywords
information
current terminal
identity authentication
authentication
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110044025.1A
Other languages
Chinese (zh)
Other versions
CN112887282B (en
Inventor
邹振婉
陈涛
杨如侠
李峰
李明轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Energy Interconnection Research Institute
Electric Power Research Institute of State Grid Xinjiang Electric Power Co Ltd
State Grid Xinjiang Electric Power Co Ltd
Original Assignee
Global Energy Interconnection Research Institute
Electric Power Research Institute of State Grid Xinjiang Electric Power Co Ltd
State Grid Xinjiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Global Energy Interconnection Research Institute, Electric Power Research Institute of State Grid Xinjiang Electric Power Co Ltd, State Grid Xinjiang Electric Power Co Ltd filed Critical Global Energy Interconnection Research Institute
Priority to CN202110044025.1A priority Critical patent/CN112887282B/en
Publication of CN112887282A publication Critical patent/CN112887282A/en
Application granted granted Critical
Publication of CN112887282B publication Critical patent/CN112887282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The application provides an identity authentication method, an identity authentication device, an identity authentication system and electronic equipment, wherein in the system, a current terminal acquires identity authentication request information and sends the identity authentication request information to an authentication gateway; the authentication gateway verifies the identity authentication request information according to the terminal access identifier, generates feedback information and sends the feedback information to the current terminal; the current terminal acquires an encryption key and encrypts the feedback information by using the encryption key to obtain corresponding encryption information; the authentication gateway reads the encrypted information by using the session key to obtain corresponding decryption information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information. The scheme realizes bidirectional authentication between the current terminal and the authentication gateway, improves the reliability of the identity authentication result, and lays a foundation for improving the safety of the power system.

Description

Identity authentication method, device and system and electronic equipment
Technical Field
The present application relates to the field of network security technologies, and in particular, to an identity authentication method, apparatus, system, and electronic device.
Background
With the development of network technology, the types and the number of terminal devices in an electric power system are increasing continuously, and in order to ensure the safety of the electric power system, identity authentication needs to be performed on the terminal devices in the electric power system.
In the prior art, the identity authentication information of the current terminal device is usually authenticated according to a preset identity registry.
However, since the network attack means are various, it is inevitable that the network attacker forges the identity authentication information, resulting in lower reliability of the identity authentication result in the prior art. Therefore, an identity authentication method capable of ensuring the reliability of an identity authentication result is urgently needed, and the identity authentication method has important significance for improving the safety of a power system.
Disclosure of Invention
The application provides an identity authentication method, device, system and electronic equipment, which aim to overcome the defects of low reliability and the like in the prior art.
A first aspect of the present application provides an identity authentication method, including:
receiving identity authentication request information sent by a current terminal, wherein the identity authentication request information comprises a terminal access identifier of the current terminal;
verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal;
receiving encryption information sent by the current terminal, wherein the encryption information is obtained by encrypting the feedback information by the current terminal based on a corresponding encryption key of the current terminal;
selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decrypted information;
and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
Optionally, after generating the identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information, the method further includes:
when the identity authentication result is that the authentication is passed, a first response instruction is sent to the current terminal;
receiving first response data sent by the current terminal; the first response data is generated by the current terminal according to the first response instruction;
and generating a safety detection result of the current terminal according to the relation between the first response data and the sent first response instruction.
Optionally, the generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information includes:
judging whether the decryption information is the same as the feedback information;
when the decryption information is the same as the feedback information, determining that the identity authentication of the current terminal is successful;
and when the decryption information is different from the feedback information, determining that the identity authentication of the current terminal fails.
Optionally, the generating a security detection result of the current terminal according to the relationship between the first response data and the sent first response instruction includes:
judging whether the first response data and the first response instruction meet a preset corresponding relation or not;
when the first response data and the first response instruction meet a preset corresponding relation, determining that the current terminal is a normal terminal;
and when the first response data and the first response instruction do not meet the preset corresponding relation, determining that the current terminal is an abnormal terminal.
Optionally, before receiving the identity authentication request information sent by the current terminal, the method further includes:
acquiring equipment attribute information and service attribute information of a current terminal; the attribute information comprises equipment type, resource allocation information, authority information and operation environment information;
and generating a corresponding terminal access identifier and an encryption key according to the attribute information and the service attribute information of the current terminal based on a preset identifier generation rule, and sending the terminal access identifier and the encryption key to the current terminal.
Optionally, the method further includes:
sending a second response instruction to the current terminal according to a preset authentication period;
receiving second response data sent by the current terminal, wherein the second response data are generated by the current terminal according to the second response instruction;
and updating the safety detection result of the current terminal according to the relation between the second response data and the sent second response instruction.
A second aspect of the present application provides an identity authentication method, including:
acquiring identity authentication request information and sending the identity authentication request information to an authentication gateway, wherein the identity authentication request information comprises a terminal access identifier;
receiving feedback information sent by the authentication gateway, wherein the feedback information is generated by the authentication gateway according to the identity authentication request information;
acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information;
and sending the encrypted information to the authentication gateway so that the authentication gateway can generate a corresponding identity authentication result according to the encrypted information.
Optionally, the method further includes:
receiving a first response instruction sent by the authentication gateway, wherein the first response instruction is sent by the authentication gateway when the identity authentication result is that the authentication is passed;
generating corresponding first response data according to the first response instruction;
and sending the first response data to the authentication gateway so that the authentication gateway can generate a safety detection result according to the relation between the first response data and the sent first response instruction.
Optionally, before obtaining the identity authentication request information, the method further includes:
sending current equipment attribute information and service attribute information to the authentication gateway;
receiving a terminal access identifier and an encryption key sent by the authentication gateway, wherein the terminal access identifier and the encryption key are generated by the authentication gateway according to current equipment attribute information and service attribute information;
and generating corresponding identity authentication request information according to the terminal access identifier.
Optionally, the method further includes:
receiving a second response instruction sent by the authentication gateway, wherein the second response instruction is a response instruction sent by the authentication gateway according to a preset authentication period; generating corresponding second response data according to the second response instruction;
and sending the second response data to the authentication gateway so that the authentication gateway can update the safety detection result according to the relationship between the second response data and the sent second response instruction.
A third aspect of the present application provides an identity authentication apparatus, including:
the terminal comprises a first receiving module, a second receiving module and a sending module, wherein the first receiving module is used for receiving identity authentication request information sent by a current terminal, and the identity authentication request information comprises a terminal access identifier of the current terminal;
the verification module is used for verifying the identity authentication request information according to the terminal access identifier, generating feedback information and sending the feedback information to the current terminal;
the second receiving module is used for receiving encrypted information sent by the current terminal, wherein the encrypted information is obtained by encrypting the feedback information by the current terminal based on a corresponding encryption key of the current terminal;
the decryption module is used for selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decryption information;
and the authentication module is used for generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
A fourth aspect of the present application provides an identity authentication apparatus, including:
the first acquisition module is used for acquiring identity authentication request information and sending the identity authentication request information to an authentication gateway, wherein the identity authentication request information comprises a terminal access identifier;
a third receiving module, configured to receive feedback information sent by the authentication gateway, where the feedback information is feedback information generated by the authentication gateway according to the identity authentication request information;
the second acquisition module is used for acquiring an encryption key and encrypting the feedback information by using the encryption key to obtain corresponding encryption information;
and the sending module is used for sending the encrypted information to the authentication gateway so that the authentication gateway can generate a corresponding identity authentication result according to the encrypted information.
A fifth aspect of the present application provides an identity authentication system, which includes at least one terminal and an authentication gateway;
the current terminal acquires identity authentication request information and sends the identity authentication request information to an authentication gateway; wherein the identity authentication request information comprises a terminal access identifier;
the authentication gateway receives identity authentication request information sent by a current terminal; verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal;
the current terminal receives feedback information sent by the authentication gateway; acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information;
the authentication gateway receives the encrypted information sent by the current terminal; selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decrypted information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
A sixth aspect of the present application provides an electronic device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method as set forth in the first aspect and various possible designs of the first aspect, or as set forth in the second aspect and various possible designs of the second aspect.
A fourth aspect of the present application provides a computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, perform a method as set forth in the first aspect and various possible designs of the first aspect, or as set forth in the second aspect and various possible designs of the second aspect.
This application technical scheme has following advantage:
according to the identity authentication method, the identity authentication device, the identity authentication system and the electronic equipment, identity authentication request information is obtained through a current terminal, and the identity authentication request information is sent to an authentication gateway; wherein the identity authentication request information comprises a terminal access identifier; the authentication gateway receives identity authentication request information sent by a current terminal; verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal; the current terminal receives feedback information sent by the authentication gateway; acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information; the authentication gateway receives the encrypted information sent by the current terminal; selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decrypted information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information. According to the scheme, the information encryption condition of the current terminal is verified in the process of verifying the identity authentication request information of the current terminal, so that bidirectional authentication is realized between the current terminal and the authentication gateway, the reliability of the identity authentication result is improved, and a foundation is laid for improving the safety of a power system.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art according to these drawings.
Fig. 1 is a schematic diagram of a network structure based on an embodiment of the present application;
fig. 2 is a schematic flowchart of an identity authentication method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another identity authentication method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another identity authentication apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. In the description of the following examples, "plurality" means two or more unless specifically limited otherwise.
In the prior art, the identity authentication information of the current terminal device is usually authenticated according to a preset identity registry. However, since the network attack means are various, it is inevitable that the network attacker forges the identity authentication information, resulting in lower reliability of the identity authentication result in the prior art.
In order to solve the above problems, the identity authentication method, device, system and electronic device provided in the embodiments of the present application acquire identity authentication request information through a current terminal, and send the identity authentication request information to an authentication gateway; the identity authentication request information comprises a terminal access identifier; the authentication gateway receives identity authentication request information sent by a current terminal; verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal; the current terminal receives feedback information sent by an authentication gateway; acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information; the authentication gateway receives encryption information sent by a current terminal; selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading encrypted information by using the session key to obtain corresponding decrypted information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information. According to the scheme, the information encryption condition of the current terminal is verified in the process of verifying the identity authentication request information of the current terminal, so that bidirectional authentication is realized between the current terminal and the authentication gateway, the reliability of the identity authentication result is improved, and a foundation is laid for improving the safety of a power system.
The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
First, a network structure on which the present application is based will be explained:
the identity authentication method, the identity authentication device, the identity authentication system and the electronic equipment are suitable for verifying the identity of the terminal equipment in the network. As shown in fig. 1, a schematic diagram of a network structure based on the embodiment of the present application mainly includes a plurality of terminals, an authentication gateway, and an authentication center. Specifically, when a certain terminal needs to perform identity authentication, identity authentication request information is sent to an authentication gateway, and the authentication gateway performs identity authentication on the terminal according to the obtained identity authentication request information and an authentication library arranged in an authentication center and generates a corresponding identity authentication result.
The embodiment of the application provides an identity authentication system, which comprises at least one terminal and an authentication gateway.
As shown in fig. 2, a schematic flow chart of an identity authentication method provided in the embodiment of the present application is shown, where the method includes:
step 201, the current terminal acquires identity authentication request information and sends the identity authentication request information to an authentication gateway.
Wherein the identity authentication request information comprises a terminal access identifier.
For example, the current terminal sends the authentication request message to the authentication gateway, and generates a timestamp N1, and the authentication request message S ═ H (a _ ID) ≦ N1, which transmits S and N1 to the authentication gateway. Wherein, a _ ID represents a terminal access identifier, and H (a _ ID) represents a hash value corresponding to the terminal access identifier.
Step 202, an authentication gateway receives identity authentication request information sent by a current terminal; and verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal.
For example, after the authentication gateway receives the authentication request information of your terminal, based on the obtained terminal access identifier, the authentication gateway calculates H (a _ ID) × N1, further determines whether the obtained calculation result is the same as the received S, and if the obtained calculation result is the same as the received S, determines that the authentication request information of the current terminal passes authentication, and generates feedback information M ═ H (a _ ID) × N1| | N2}, where N2 is a timestamp generated by the authentication gateway.
Step 203, the current terminal receives feedback information sent by the authentication gateway; and acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information.
For example, the current terminal may obtain the encryption information Q ═ M | | | E (H (T _ ID) | N4)) }, where ek (x) is a process of encrypting the obtained feedback information with the encryption key K, the encryption algorithm may use any symmetric encryption algorithm, and N4 is the current corresponding timestamp.
Step 204, the authentication gateway receives the encryption information sent by the current terminal; selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading encrypted information by using the session key to obtain corresponding decrypted information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
It should be explained that the authentication library stores the registration information of each terminal device in the current network, and the registration information includes the session key corresponding to the terminal device, so as to decrypt the encrypted information of the terminal device.
For example, after obtaining the encryption information, the authentication gateway extracts the corresponding session key from the authentication library, and obtains decryption information { H (a _ ID) | N1| | N2| | | E (H (T _ ID) | N4+1| | KS)) }. And further generating an identity authentication result of the current terminal according to the obtained decryption information and the previous feedback information.
Specifically, in an embodiment, the authentication gateway may determine whether the decryption information is the same as the feedback information; when the decryption information is the same as the feedback information, determining that the identity authentication of the current terminal is successful; and when the decryption information is different from the feedback information, determining that the identity authentication of the current terminal fails.
Specifically, since the encrypted information is obtained by encrypting the feedback information by the current terminal, it can be determined whether the current terminal has received the feedback information sent by the authentication gateway by further verifying whether the obtained decryption information is the same as the feedback information sent to the current terminal before, so as to determine the validity of the current terminal.
On the basis of the foregoing embodiment, because in a complex network environment, even if the identity authentication of the current terminal is successful, the security of the current terminal cannot be guaranteed, so as to further detect the security of the current terminal, as an implementable manner, as shown in fig. 3, a schematic flow diagram of another identity authentication method provided in the embodiment of the present application is provided, in an embodiment, after the authentication gateway generates an identity authentication result of the current terminal according to a relationship between the feedback information and the decryption information, the method further includes:
step 301, when the identity authentication result is that the authentication is passed, a first response instruction is sent to the current terminal;
step 302, receiving first response data sent by a current terminal; the first response data is generated by the current terminal according to the first response instruction;
step 303, generating a security detection result of the current terminal according to the relationship between the first response data and the sent first response instruction.
Correspondingly, in an embodiment, the identity authentication method executed by the current terminal further includes:
step 401, receiving a first response instruction sent by an authentication gateway, where the first response instruction is sent by the authentication gateway when an identity authentication result is that authentication is passed;
step 402, generating corresponding first response data according to the first response instruction;
step 402, the first response data is sent to the authentication gateway, so that the authentication gateway generates a security detection result according to a relationship between the first response data and the sent first response instruction.
Illustratively, after the authentication gateway determines that the identity authentication of the current terminal is successful, a first response instruction is generated to control the current terminal to generate corresponding first response data, and the security of the current terminal is further detected by judging the corresponding relationship between the first response instruction and the first response data generated by the current terminal.
Specifically, in an embodiment, it may be determined whether the first response data and the first response instruction satisfy a preset corresponding relationship; when the first response data and the first response instruction meet a preset corresponding relation, determining that the current terminal is a normal terminal; and when the first response data and the first response instruction do not meet the preset corresponding relation, determining that the current terminal is an abnormal terminal.
Specifically, whether the current terminal makes a correct response or not can be determined by judging whether the first response data and the first response instruction meet a preset corresponding relationship or not, so as to determine the security of the current terminal. When the current terminal is determined to be an abnormal terminal, corresponding alarm information can be generated, and the network connection between the current terminal and the authentication gateway is cut off.
Specifically, in an embodiment, in order to further perform real-time monitoring on the security of the current terminal to ensure network security, the authentication gateway may send a second response instruction to the current terminal according to a preset authentication period; receiving second response data sent by the current terminal, wherein the second response data are generated by the current terminal according to a second response instruction; and updating the safety detection result of the current terminal according to the relation between the second response data and the sent second response instruction.
Correspondingly, in an embodiment, the current terminal may receive a second response instruction sent by the authentication gateway, where the second response instruction is a response instruction sent by the authentication gateway according to a preset authentication cycle; generating corresponding second response data according to the second response instruction; and sending the second response data to the authentication gateway so that the authentication gateway updates the safety detection result according to the relationship between the second response data and the sent second response instruction.
The preset authentication period can be set according to actual requirements. If the security requirement on the current terminal is high, the authentication period may be set to be shorter, and conversely, if the security requirement on the current terminal is relatively low, the authentication period may be set to be longer, which is not limited in the embodiment of the present application. For a specific safety detection principle and method, reference may be made to the above embodiments, which are not described herein again.
Specifically, in an embodiment, before receiving the identity authentication request information sent by the current terminal, the authentication gateway may obtain device attribute information and service attribute information of the current terminal; the equipment attribute information comprises equipment type, resource allocation information, authority information and running environment information; and based on a preset identifier generation rule, generating a corresponding terminal access identifier and an encryption key according to the attribute information and the service attribute information of the current terminal, and sending the terminal access identifier and the encryption key to the current terminal.
Correspondingly, in an embodiment, the current terminal may send the current device attribute information and the current service attribute information to the authentication gateway; receiving a terminal access identifier and an encryption key sent by an authentication gateway, wherein the terminal access identifier and the encryption key are generated by the authentication gateway according to current equipment attribute information and service attribute information; and generating corresponding identity authentication request information according to the terminal access identifier.
For example, if the device attribute information of the current terminal is a1, a2, …, An, and the service attribute information of the current terminal is B _ ID, the device identifier of the current terminal is generated as follows: t _ ID ═ H (a1| | a2| | | … | | | An | | | B _ ID). Where T _ ID represents a device identifier, h (x) is a hash algorithm, and | is a string concatenation. The network will assign a unique terminal access identifier a _ ID according to the terminal service attribute information B _ ID, which also includes the information of the domain where the terminal user is located.
Specifically, before the current terminal accesses the network, it needs to register with the authentication center. The internet of things terminal transmits information needing authentication to the authentication center through a secure channel for registration, and generates a current terminal access identifier and a master key (encryption key) shared by both parties.
Specifically, the current terminal provides the authentication center with device attribute information and service attribute information, where the device attribute information further includes a production manufacturer, a product serial number, and the like. The authentication center generates a unique device identifier (T _ ID) by using a preset hash algorithm according to the device attribute information { A _ i | i ═ 1, …, n } and the service attribute information (B _ ID), and randomly generates a unique terminal access identifier (A _ ID) and an encryption key K. The terminal access identifier contains identification information of the domain where the terminal access identifier is located, and the terminal access identifier corresponds to the terminal identifier one by one. The authentication center and the authentication gateway save the hash value H (A _ ID) of the terminal access identifier; the authentication center transmits the terminal access identifier (a _ ID) and the encryption key K to the current terminal. For convenience of distinction, the master key sent to the current terminal is defined as an encryption key, and the master key stored in the authentication center is defined as a session key.
The identity authentication system provided by the embodiment of the application acquires identity authentication request information through the current terminal and sends the identity authentication request information to the authentication gateway; the identity authentication request information comprises a terminal access identifier; the authentication gateway receives identity authentication request information sent by a current terminal; verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal; the current terminal receives feedback information sent by an authentication gateway; acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information; the authentication gateway receives encryption information sent by a current terminal; selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading encrypted information by using the session key to obtain corresponding decrypted information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information. According to the scheme, the information encryption condition of the current terminal is verified in the process of verifying the identity authentication request information of the current terminal, so that bidirectional authentication is realized between the current terminal and the authentication gateway, the reliability of the identity authentication result is improved, and a foundation is laid for improving the safety of a power system. Moreover, the safety of the current terminal is detected by verifying the response condition of the current terminal, and the safety of the power system is further guaranteed.
The embodiment of the present application provides an identity authentication apparatus, which is configured to execute an identity authentication method corresponding to an authentication gateway provided in the foregoing embodiment.
Fig. 4 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present application. The identity authentication device 40 comprises a first receiving module 401, a verification module 402, a second receiving module 403, a decryption module 404 and an authentication module 405.
The first receiving module is used for receiving identity authentication request information sent by a current terminal, wherein the identity authentication request information comprises a terminal access identifier of the current terminal; the verification module is used for verifying the identity authentication request information according to the terminal access identifier, generating feedback information and sending the feedback information to the current terminal; the second receiving module is used for receiving the encrypted information sent by the current terminal, wherein the encrypted information is obtained by encrypting the feedback information by the current terminal based on the corresponding encryption key of the current terminal; the decryption module is used for selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decryption information; and the authentication module is used for generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
The specific manner in which each module performs operations of the identity authentication apparatus in this embodiment has been described in detail in the embodiment of the method, and will not be described in detail here.
The identity authentication device provided in the embodiment of the present application is configured to execute the identity authentication method corresponding to the authentication gateway provided in the above embodiment, and an implementation manner of the identity authentication device is the same as a principle, and is not described again.
The embodiment of the application provides an identity authentication device, which is used for executing the identity authentication method corresponding to the current terminal provided by the embodiment.
Fig. 5 is a schematic structural diagram of another identity authentication apparatus provided in the embodiment of the present application. The identity authentication device 50 includes a first obtaining module 501, a third receiving module 502, a second obtaining module 503 and a sending module 504.
The first acquisition module is used for acquiring identity authentication request information and sending the identity authentication request information to the authentication gateway, wherein the identity authentication request information comprises a terminal access identifier; the third receiving module is used for receiving feedback information sent by the authentication gateway, wherein the feedback information is generated by the authentication gateway according to the identity authentication request information; the second acquisition module is used for acquiring the encryption key and encrypting the feedback information by using the encryption key to obtain corresponding encryption information; and the sending module is used for sending the encrypted information to the authentication gateway so that the authentication gateway generates a corresponding identity authentication result according to the encrypted information.
The specific manner in which each module performs operations of the identity authentication apparatus in this embodiment has been described in detail in the embodiment of the method, and will not be described in detail here.
The identity authentication device provided in the embodiment of the present application is configured to execute the identity authentication method corresponding to the current terminal provided in the above embodiment, and an implementation manner of the identity authentication device is the same as a principle, which is not described again.
The embodiment of the application provides electronic equipment, which is used for executing the identity authentication method provided by the embodiment.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device 60 includes: at least one processor 61 and memory 62;
the memory stores computer-executable instructions; the at least one processor executes the computer-executable instructions stored in the memory, so that the at least one processor executes the identity authentication method corresponding to the authentication gateway or the identity authentication method corresponding to the current terminal provided in the above embodiments.
The electronic device provided in the embodiment of the present application is configured to execute the identity authentication method corresponding to the authentication gateway provided in the foregoing embodiment, or the identity authentication method corresponding to the current terminal, and an implementation manner of the electronic device is the same as the principle, which is not described again.
An embodiment of the present application provides a computer-readable storage medium, where a computer execution instruction is stored in the computer-readable storage medium, and when a processor executes the computer execution instruction, an identity authentication method corresponding to an authentication gateway or an identity authentication method corresponding to a current terminal, which are provided in any of the above embodiments, is implemented.
The storage medium including the computer executable instruction in the embodiment of the present application may be used to store the identity authentication method corresponding to the authentication gateway provided in the foregoing embodiments, or the computer executable instruction of the identity authentication method corresponding to the current terminal, and the implementation manner and principle thereof are the same, and details thereof are not repeated
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (15)

1. An identity authentication method, comprising:
receiving identity authentication request information sent by a current terminal, wherein the identity authentication request information comprises a terminal access identifier of the current terminal;
verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal;
receiving encryption information sent by the current terminal, wherein the encryption information is obtained by encrypting the feedback information by the current terminal based on a corresponding encryption key of the current terminal;
selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decrypted information;
and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
2. The method according to claim 1, wherein after generating the identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information, the method further comprises:
when the identity authentication result is that the authentication is passed, a first response instruction is sent to the current terminal;
receiving first response data sent by the current terminal; the first response data is generated by the current terminal according to the first response instruction;
and generating a safety detection result of the current terminal according to the relation between the first response data and the sent first response instruction.
3. The method according to claim 1, wherein the generating the identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information comprises:
judging whether the decryption information is the same as the feedback information;
when the decryption information is the same as the feedback information, determining that the identity authentication of the current terminal is successful;
and when the decryption information is different from the feedback information, determining that the identity authentication of the current terminal fails.
4. The method according to claim 2, wherein the generating the security detection result of the current terminal according to the relationship between the first response data and the transmitted first response instruction comprises:
judging whether the first response data and the first response instruction meet a preset corresponding relation or not;
when the first response data and the first response instruction meet a preset corresponding relation, determining that the current terminal is a normal terminal;
and when the first response data and the first response instruction do not meet the preset corresponding relation, determining that the current terminal is an abnormal terminal.
5. The method according to claim 1, wherein before receiving the identity authentication request information sent by the current terminal, the method further comprises:
acquiring equipment attribute information and service attribute information of a current terminal; the attribute information comprises equipment type, resource allocation information, authority information and operation environment information;
and generating a corresponding terminal access identifier and an encryption key according to the attribute information and the service attribute information of the current terminal based on a preset identifier generation rule, and sending the terminal access identifier and the encryption key to the current terminal.
6. The method of claim 2, further comprising:
sending a second response instruction to the current terminal according to a preset authentication period;
receiving second response data sent by the current terminal, wherein the second response data are generated by the current terminal according to the second response instruction;
and updating the safety detection result of the current terminal according to the relation between the second response data and the sent second response instruction.
7. An identity authentication method, comprising:
acquiring identity authentication request information and sending the identity authentication request information to an authentication gateway, wherein the identity authentication request information comprises a terminal access identifier;
receiving feedback information sent by the authentication gateway, wherein the feedback information is generated by the authentication gateway according to the identity authentication request information;
acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information;
and sending the encrypted information to the authentication gateway so that the authentication gateway can generate a corresponding identity authentication result according to the encrypted information.
8. The method of claim 7, further comprising:
receiving a first response instruction sent by the authentication gateway, wherein the first response instruction is sent by the authentication gateway when the identity authentication result is that the authentication is passed;
generating corresponding first response data according to the first response instruction;
and sending the first response data to the authentication gateway so that the authentication gateway can generate a safety detection result according to the relation between the first response data and the sent first response instruction.
9. The method of claim 7, wherein prior to obtaining the authentication request information, the method further comprises:
sending current equipment attribute information and service attribute information to the authentication gateway;
receiving a terminal access identifier and an encryption key sent by the authentication gateway, wherein the terminal access identifier and the encryption key are generated by the authentication gateway according to current equipment attribute information and service attribute information;
and generating corresponding identity authentication request information according to the terminal access identifier.
10. The method of claim 8, further comprising:
receiving a second response instruction sent by the authentication gateway, wherein the second response instruction is a response instruction sent by the authentication gateway according to a preset authentication period; generating corresponding second response data according to the second response instruction;
and sending the second response data to the authentication gateway so that the authentication gateway can update the safety detection result according to the relationship between the second response data and the sent second response instruction.
11. An identity authentication apparatus, comprising:
the terminal comprises a first receiving module, a second receiving module and a sending module, wherein the first receiving module is used for receiving identity authentication request information sent by a current terminal, and the identity authentication request information comprises a terminal access identifier of the current terminal;
the verification module is used for verifying the identity authentication request information according to the terminal access identifier, generating feedback information and sending the feedback information to the current terminal;
the second receiving module is used for receiving encrypted information sent by the current terminal, wherein the encrypted information is obtained by encrypting the feedback information by the current terminal based on a corresponding encryption key of the current terminal;
the decryption module is used for selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decryption information;
and the authentication module is used for generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
12. An identity authentication apparatus, comprising:
the first acquisition module is used for acquiring identity authentication request information and sending the identity authentication request information to an authentication gateway, wherein the identity authentication request information comprises a terminal access identifier;
a third receiving module, configured to receive feedback information sent by the authentication gateway, where the feedback information is feedback information generated by the authentication gateway according to the identity authentication request information;
the second acquisition module is used for acquiring an encryption key and encrypting the feedback information by using the encryption key to obtain corresponding encryption information;
and the sending module is used for sending the encrypted information to the authentication gateway so that the authentication gateway can generate a corresponding identity authentication result according to the encrypted information.
13. An identity authentication system, comprising at least one terminal and an authentication gateway, characterized in that:
the current terminal acquires identity authentication request information and sends the identity authentication request information to an authentication gateway; wherein the identity authentication request information comprises a terminal access identifier;
the authentication gateway receives identity authentication request information sent by a current terminal; verifying the identity authentication request information according to the terminal access identifier to generate feedback information, and sending the feedback information to the current terminal;
the current terminal receives feedback information sent by the authentication gateway; acquiring an encryption key, and encrypting the feedback information by using the encryption key to obtain corresponding encryption information;
the authentication gateway receives the encrypted information sent by the current terminal; selecting a corresponding session key from a preset authentication library according to the terminal access identifier, and reading the encrypted information by using the session key to obtain corresponding decrypted information; and generating an identity authentication result of the current terminal according to the relationship between the feedback information and the decryption information.
14. An electronic device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of any of claims 1 to 6, or the method of any of claims 7 to 10.
15. A computer-readable storage medium having computer-executable instructions stored thereon which, when executed by a processor, implement the method of any of claims 1 to 6, or the method of any of claims 7 to 10.
CN202110044025.1A 2021-01-13 2021-01-13 Identity authentication method, device, system and electronic equipment Active CN112887282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110044025.1A CN112887282B (en) 2021-01-13 2021-01-13 Identity authentication method, device, system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110044025.1A CN112887282B (en) 2021-01-13 2021-01-13 Identity authentication method, device, system and electronic equipment

Publications (2)

Publication Number Publication Date
CN112887282A true CN112887282A (en) 2021-06-01
CN112887282B CN112887282B (en) 2023-06-20

Family

ID=76045710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110044025.1A Active CN112887282B (en) 2021-01-13 2021-01-13 Identity authentication method, device, system and electronic equipment

Country Status (1)

Country Link
CN (1) CN112887282B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992416A (en) * 2021-10-28 2022-01-28 上海辰锐信息科技公司 Internet of things perception terminal authentication method and internet of things perception terminal
CN114205131A (en) * 2021-12-06 2022-03-18 广西电网有限责任公司梧州供电局 Safety certification protocol for transformer substation measurement and control and PMU (power management unit) equipment
CN114500005A (en) * 2022-01-05 2022-05-13 上海安几科技有限公司 ModbusTcp instruction protection method, device, terminal and storage medium
CN114900337A (en) * 2022-04-19 2022-08-12 贵州电网有限责任公司 Authentication encryption method and system suitable for power chip
CN116033070A (en) * 2021-10-27 2023-04-28 中移(杭州)信息技术有限公司 Alarm method and device based on signal detection and storage medium
CN116996234A (en) * 2023-09-26 2023-11-03 北京数盾信息科技有限公司 Method for accessing terminal to authentication gateway, terminal and authentication gateway

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553666A (en) * 2015-12-15 2016-05-04 国网智能电网研究院 Security authentication system and method for smart power terminal
CN107623665A (en) * 2016-07-15 2018-01-23 华为技术有限公司 A kind of authentication method, equipment and system
CN110289958A (en) * 2019-07-18 2019-09-27 郑州信大捷安信息技术股份有限公司 Internet of Vehicles identity authentication method and system
JP2019186600A (en) * 2018-04-02 2019-10-24 Kddi株式会社 Terminal device, home gateway device, management server device, terminal authentication method and computer program
CN110784466A (en) * 2019-10-29 2020-02-11 北京汽车集团有限公司 Information authentication method, device and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553666A (en) * 2015-12-15 2016-05-04 国网智能电网研究院 Security authentication system and method for smart power terminal
CN107623665A (en) * 2016-07-15 2018-01-23 华为技术有限公司 A kind of authentication method, equipment and system
JP2019186600A (en) * 2018-04-02 2019-10-24 Kddi株式会社 Terminal device, home gateway device, management server device, terminal authentication method and computer program
CN110289958A (en) * 2019-07-18 2019-09-27 郑州信大捷安信息技术股份有限公司 Internet of Vehicles identity authentication method and system
CN110784466A (en) * 2019-10-29 2020-02-11 北京汽车集团有限公司 Information authentication method, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈学锋: "移动网络终端单点登陆身份准确认证仿真分析", 《计算机仿真》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033070A (en) * 2021-10-27 2023-04-28 中移(杭州)信息技术有限公司 Alarm method and device based on signal detection and storage medium
CN113992416A (en) * 2021-10-28 2022-01-28 上海辰锐信息科技公司 Internet of things perception terminal authentication method and internet of things perception terminal
CN114205131A (en) * 2021-12-06 2022-03-18 广西电网有限责任公司梧州供电局 Safety certification protocol for transformer substation measurement and control and PMU (power management unit) equipment
CN114205131B (en) * 2021-12-06 2024-03-22 广西电网有限责任公司梧州供电局 Safety authentication method for transformer substation measurement and control and PMU equipment
CN114500005A (en) * 2022-01-05 2022-05-13 上海安几科技有限公司 ModbusTcp instruction protection method, device, terminal and storage medium
CN114900337A (en) * 2022-04-19 2022-08-12 贵州电网有限责任公司 Authentication encryption method and system suitable for power chip
CN114900337B (en) * 2022-04-19 2024-04-05 贵州电网有限责任公司 Authentication encryption method and system suitable for power chip
CN116996234A (en) * 2023-09-26 2023-11-03 北京数盾信息科技有限公司 Method for accessing terminal to authentication gateway, terminal and authentication gateway
CN116996234B (en) * 2023-09-26 2023-12-26 北京数盾信息科技有限公司 Method for accessing terminal to authentication gateway, terminal and authentication gateway

Also Published As

Publication number Publication date
CN112887282B (en) 2023-06-20

Similar Documents

Publication Publication Date Title
CN110968743B (en) Data storage and data reading method and device for private data
CN112887282B (en) Identity authentication method, device, system and electronic equipment
CN111010410B (en) Mimicry defense system based on certificate identity authentication and certificate signing and issuing method
EP3462747A1 (en) Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
CN106790045B (en) distributed virtual machine agent device based on cloud environment and data integrity guarantee method
CN110708388A (en) Vehicle body safety anchor node device, method and network system for providing safety service
JP2020532928A (en) Digital signature methods, devices and systems
CN113285932B (en) Method for acquiring edge service, server and edge device
CN111246474B (en) Base station authentication method and device
CN112861106B (en) Digital certificate processing method and system, electronic device and storage medium
CN113114699A (en) Vehicle terminal identity certificate application method
CN114218548B (en) Identity verification certificate generation method, authentication method, device, equipment and medium
CN113259722B (en) Secure video Internet of things key management method, device and system
CN111654503A (en) Remote control method, device, equipment and storage medium
CN113703911B (en) Virtual machine migration method, device, equipment and storage medium
WO2020018187A1 (en) Network device, method for security and computer readable storage medium
CN112261103A (en) Node access method and related equipment
CN111510421B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN116599719A (en) User login authentication method, device, equipment and storage medium
CN113872986B (en) Power distribution terminal authentication method and device and computer equipment
US11570008B2 (en) Pseudonym credential configuration method and apparatus
CN114553542A (en) Data packet encryption method and device and electronic equipment
CN112437436A (en) Identity authentication method and device
CN112182551A (en) PLC equipment identity authentication system and PLC equipment identity authentication method
CN110830243A (en) Symmetric key distribution method, device, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant