CN114338071A - Network security identity authentication method based on wind power plant communication - Google Patents
Network security identity authentication method based on wind power plant communication Download PDFInfo
- Publication number
- CN114338071A CN114338071A CN202111264312.XA CN202111264312A CN114338071A CN 114338071 A CN114338071 A CN 114338071A CN 202111264312 A CN202111264312 A CN 202111264312A CN 114338071 A CN114338071 A CN 114338071A
- Authority
- CN
- China
- Prior art keywords
- value
- user
- wind power
- power plant
- service provider
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000006854 communication Effects 0.000 title claims abstract description 38
- 238000004891 communication Methods 0.000 title claims abstract description 37
- 238000004364 calculation method Methods 0.000 claims description 7
- 239000000126 substance Substances 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 6
- 238000012795 verification Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Images
Abstract
The invention discloses a network security identity authentication method based on wind power plant communication. According to the network security identity authentication method based on wind power plant communication, when each wind power plant user wants to join a wind power plant communication network, the user needs to register with a service provider, the service provider can share a mutually different symmetric key for each registered wind power plant user in advance, calculates the correlation value of mutual verification after two entities, and finally sends the calculated correlation value to the wind power plant user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith. By the method, mutual authentication before generation of the session keys of the two entities can be realized, and meanwhile, each piece of information in the authentication process can be guaranteed not to be tampered when being transmitted through a public channel, so that the aim of improving the network communication safety is fulfilled.
Description
Technical Field
The invention relates to the technical field of wind power plant communication network security, in particular to a network security identity authentication method based on wind power plant communication.
Background
The identity authentication technology is an effective means for verifying the identity of an operator in a computer network, user identity information can be represented by specific data streams in a network system, and a computer can realize digital identity authentication of a user through authentication of data, so that the user is authorized. Identity authentication is the first key to protect network resource security, and is also the key to network information security.
At present, computer information technology is widely popularized, the use requirement is provided, besides various functions, the research of safety technology is crucial, the current user identity authentication technology can confirm the user identity in the communication process of the wind power plant, and the safety of the communication of the wind power plant is greatly improved. Compare traditional security measures, need the user to remember a large amount of passwords, it is complicated in the in-process of the actual application moreover, the security is lower, so the authentication technique is undoubtedly more convenient, and factor of safety is higher moreover.
Therefore, it is necessary to increase the research on the identity authentication technology and to popularize and apply the technology in important places and fields to ensure the safety of the computer information usage of the system.
Disclosure of Invention
The invention provides a network security identity authentication method based on wind power plant communication.
The invention provides the following scheme:
a network security identity authentication method based on wind power plant communication comprises the following steps:
step 1: user registration
User identity value ID input by user at wind power plant user sideiSending the random number a and the selected random number a to a service provider end through a secure channel;
the service provider end passes the user identity value IDiRandom number a, service identity value IDjAnd a service provider secret value KspCalculating to obtain a value MiNumerical value GiAnd a value Qi(ii) a The value M is measurediThe value GiSending the value M to the wind power plant user side through a safety channel so that the wind power plant user side can conveniently use the value MiThe value GiAnd the first random number a is stored, and the service provider side stores the third value QiStoring the data into a self database;
step 2: mutual authentication
After the wind power plant user end finishes login operation, selecting a random number b, and obtaining a wind power plant secret value K through the random number a, the random number b and the wind power plant secret value KsmCalculating to obtain a numerical value N; then the value L is obtained by calculation1Will calculate the value N, L1And a time value TiWith the value M stored in its own databasei、GiEncryption with a symmetric key s shared in advance to obtain Es=[Mi,Gi,N,L1,Ti]The encrypted message Es=[Mi,Gi,N,L1,Ti]Sending the data to a service provider end through an open channel;
the service provider end receives the encrypted message Es=[Mi,Gi,N,L1,Ti]Decrypting the message to obtain a value M'iNumerical value G'iNumerical value N'iNumerical value L'1Time value TiCalculating a message refresh value delta T, and if the value is within the range, performing the next operation, otherwise rejectingA dead service;
the service provider side decrypts the data by adopting the symmetric key s to obtain a value Q'iJudging Q'iWhether or not to match Q stored in its own databaseiThe values of the data are equal to each other, and the data are used for judging whether the message comes from the registered wind power plant user side;
service provider side calculates and obtains numerical valueJudging the valueAnd a numerical value of L'1Whether the values are equal or not is used for judging whether all values in the encrypted and received message are tampered or not;
the service provider selects the random number c and the random number d, and calculates to obtain a value L2Numerical value U and time value TiAnd the value L is compared2Numerical value U and time value TiEncrypting with the symmetric key s to obtain an encrypted message Es{L2,U,TiWill encrypt message Es{L2,U,TiSending the wind power station to a user side of the wind power station;
the wind power plant user side receives the encrypted message Es{L2,U,TiAfter the encryption, the message E is encrypteds{L2,U,TiDeciphering to obtain a value L'2Numerical value U', time value TiCalculating message refresh value delta T to see if the value is within the value range, calculating to obtain the value L "2And verifying whether L "2=L'2For determining an encrypted message Es{L2,U,TiWhether the message content comes from the service provider side or not is tampered;
obtaining a session key SK h (ID) after passing the authenticationiA N U); the session key is used to encrypt the session message content.
Preferably: step 1, adopting user input user identity value ID at user side of wind farmiA password value PWiAnd calculating the selected random number a to obtain a value AiAnd store;
Adopting a numerical value A at a wind power plant user end before step 2iAnd realizing user login authentication.
Preferably: the user login authentication comprises the step that a user end of the wind power plant receives an identity value input by a userAnd a passwordWind power plant user side calculation to obtain numerical valueWill calculate the obtained valueWith the value A stored in its own databaseiComparing to determine whether the above-mentioned requirements are metIf the conditions are met, the user identity is correct, and the user login authentication is passed.
Preferably: service provider side decrypts M 'with symmetric key s'i、G′iTo obtain The numerical valueWherein the content of the first and second substances,
Preferably: the value U ═ h (K)spC) + d, the value L2H (U | SK), wherein SK ═ h (ID "i||a"||N||U)。
according to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the invention can realize a network security identity authentication method based on wind power plant communication. According to the network security identity authentication method based on wind power plant communication, when each wind power plant user wants to join a wind power plant communication network, the user needs to register with a service provider, the service provider can share a mutually different symmetric key for each registered wind power plant user in advance, calculates the correlation value of mutual verification after two entities, and finally sends the calculated correlation value to the wind power plant user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith. By the method, mutual authentication before generation of the session keys of the two entities can be realized, and meanwhile, each piece of information in the authentication process can be guaranteed not to be tampered when being transmitted through a public channel, so that the aim of improving the network communication safety is fulfilled.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of a user registration phase in a network security identity authentication method based on wind farm communication according to an embodiment of the present invention;
fig. 2 is a flowchart of a mutual authentication phase in a network security identity authentication method based on wind farm communication according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
Examples
Referring to fig. 1 and 2, a network security identity authentication method based on wind farm communication provided by an embodiment of the present invention is shown in fig. 1 and 2, and the method includes the following steps:
step 1: user registration
User identity value ID input by user at wind power plant user sideiSending the random number a and the selected random number a to a service provider end through a secure channel;
the service provider end passes the user identity value IDiRandom number a, service identity value IDjAnd a service provider secret value KspCalculating to obtain a value MiNumerical value GiAnd a value Qi(ii) a The value M is measurediThe value GiSending the value M to the wind power plant user side through a safety channel so that the wind power plant user side can conveniently use the value MiThe value GiAnd the first random number a is stored, and the service provider side stores the third value QiStoring the data into a self database;
step 2: mutual authentication
After the wind power plant user end finishes login operation, selecting a random number b, and obtaining a wind power plant secret value K through the random number a, the random number b and the wind power plant secret value KsmCalculating to obtain a numerical value N; then the value L is obtained by calculation1Will calculate the value N, L1And a time value TiWith the value M stored in its own databasei、GiEncryption with a symmetric key s shared in advance to obtain Es=[Mi,Gi,N,L1,Ti]The encrypted message Es=[Mi,Gi,N,L1,Ti]Sending the data to a service provider end through an open channel;
the service provider end receives the encrypted message Es=[Mi,Gi,N,L1,Ti]Decrypting the message to obtain a value M'iNumerical value G'iNumerical value N'iNumerical value L'1Time value TiCalculating a message refresh value delta T, if the value is within the range, carrying out the next operation, otherwise, rejecting the service;
the service provider side decrypts the data by adopting the symmetric key s to obtain a value Q'iJudging Q'iWhether or not to cooperate withQ stored in own databaseiThe values of the data are equal to each other, and the data are used for judging whether the message comes from the registered wind power plant user side;
service provider side calculates and obtains numerical valueJudging the valueAnd a numerical value of L'1Whether the values are equal or not is used for judging whether all values in the encrypted and received message are tampered or not;
the service provider selects the random number c and the random number d, and calculates to obtain a value L2Numerical value U and time value TiAnd the value L is compared2Numerical value U and time value TiEncrypting with the symmetric key s to obtain an encrypted message Es{L2,U,TiWill encrypt message Es{L2,U,TiSending the wind power station to a user side of the wind power station;
the wind power plant user side receives the encrypted message Es{L2,U,TiAfter the encryption, the message E is encrypteds{L2,U,TiDeciphering to obtain a value L'2Numerical value U', time value TiCalculating message refresh value delta T to see if the value is within the value range, calculating to obtain the value L "2And verifying whether L "2=L'2For determining an encrypted message Es{L2,U,TiWhether the message content comes from the service provider side or not is tampered;
obtaining a session key SK h (ID) after passing the authenticationiA N U); the session key is used to encrypt the session message content.
The network security identity authentication method based on wind power plant communication provided by the embodiment of the application comprises two parts: registration and login key agreement. The first part is a registration part, and the wind farm user performs registration and record at the service provider through a secure channel or offline registration mode. The second part is that the wind farm user is first logged in and authenticated by the login key agreement, and then mutually authenticated with the service provider and generates a session key therewith.
In order to realize the authentication of the identity of a user when the user logs in through a wind power plant user side. The embodiment of the application can provide the user identity value ID input by the user at the user end of the wind farm in the step 1iA password value PWiAnd calculating the selected random number a to obtain a value AiAnd storing;
adopting a numerical value A at a wind power plant user end before step 2iAnd realizing user login authentication.
It can be understood that each of the values provided in the embodiments of the present application can be calculated by using a corresponding calculation formula, for example, in an implementation manner, a part of the values provided in the embodiments of the present application can be calculated by using the disclosed hash function h (), and a part of the values can be calculated by using the homomorphic encryption algorithm E (). Specifically, the value Ai=h(IDi||a||PWi) The value of
Service provider side decrypts M 'with symmetric key s'i、G′iTo obtain The numerical valueWherein the content of the first and second substances,
The value U ═ h (K)spC) + d, the value L2H (U | SK), wherein SK ═ h (ID "i||a"||N||U)。
according to the network security identity authentication method based on wind power plant communication provided by the embodiment of the application, two entities are wind power plant users (SM) in wind power plant communication respectivelyi) And Service Provider (SP)j)。
Wind farm user (SM)i): the most basic subscriber unit needs to register with the service provider whenever a wind farm user wants to join the wind farm communication network, and stores the correlation value calculated by the service provider for the service provider into its own memory. And eventually agree with the service provider to a session key for subsequent encrypted communication between the two entities.
Service Provider (SP)j): whenever a wind farm user wants to join a wind farm communication network, the user needs to register with a service provider, the service provider can share a mutually different symmetric key for each registered wind farm user in advance, calculate a correlation value verified mutually after two entities for the user, and finally send the calculated correlation value to the wind powerA field user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith.
In the specific implementation:
user registration
Wind farm user (SM)i) Firstly input identity value IDiAnd password PWiThen, a random number a is selected, and A is calculatedi=h(IDi||a||PWi) Finally, the identity value ID is transmitted via a secure channeliAnd the random number a to the Service Provider (SP)j)。
Service Provider (SP)j) After receiving the information, calculating KspA secret value of the service provider. Then the calculated value Mi、GiSent to the SM over a secure channeliAnd calculating QiAnd storing the data into a self database.
SMiReceiving a message from an SPjAfter the message is sent, A isi、Mi、GiAnd a is stored in a self database.
Login authentication
Wind farm user (SM)i) Firstly, login operation is carried out, and identity value is inputAnd a passwordThen wind farm calculationsAnd comparing the calculated value with the value A stored in its own databaseiComparing to determine whether the above-mentioned requirements are metIf the condition is satisfied, the user identity is correct, and the next operation can be carried out, otherwise, the service is refused.
Mutual authentication
Then wind farm users (SM)i) Selecting a random number b, and calculating N ═ KsmA) + b, wherein KsmIs a secret value of the wind farm. RecalculationL1H (N | | r), the calculated value N, L is calculated1And a time value TiWith the value M stored in its own databasei、GiEncryption E with a symmetric key s shared in advances=[Mi,Gi,N,L1,Ti]And finally, sending the encrypted message to the service provider through the public channel.
When a Service Provider (SP)j) Decrypting the message after receiving the encrypted message to obtain M'i、G′i、N′i、L'1、TiThe message refresh value Δ T is calculated, and if the value is within the range, the next operation is performed, otherwise the service is denied.
Then decrypt M'i、G′iTo obtainAnd calculate Calculated Q 'is then verified'iWhether the value is associated with Q stored in its own databaseiAre equal to Q'i=QiIf the two values are equal, the message can be proven to be from a previously registered wind farm user, otherwise service is denied.
Next, the Service Provider (SP)j) Calculating r ═ h (ID "i||a"||N')、And verifyIf the two values are equal, the fact that all the values in the message received through encryption are not tampered can be proved, and otherwise, service is refused.
Then the Service Provider (SP)j) Two random numbers c and d are chosen and U ═ h (K) is calculatedsp*c)+d、SK=h(ID"i||a"||N||U)、L2H (U | | SK), and finally L2、U、TiEncrypted by using a symmetric key s pre-shared by the wind farm and the service provider and then sent to the wind farm Es{L2,U,Ti}。
After the wind power plant user receives the encrypted message, the message is decrypted to obtain L'2、U'、TiThen calculates the message refresh value Δ T to see if the value is within the range, then calculatesL"2H (U '| SK') and to verify if L "2=L'2If the two values are equal, the message can be proved to be from the service provider and the content of the message is not tampered, otherwise, the service is refused.
SK ═ h (ID) can be obtainediI | a | N | U) is the communication behind the session key that can use this key to encrypt the session message content.
In a word, according to the network security identity authentication method based on wind farm communication provided by the application, each wind farm user needs to register with a service provider when wanting to join a wind farm communication network, the service provider can share a mutually different symmetric key for each registered wind farm user in advance, calculate the correlation values of mutual verification after two entities for the wind farm user, and finally send the calculated correlation values to the wind farm user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith. By the method, mutual authentication before generation of the session keys of the two entities can be realized, and meanwhile, each piece of information in the authentication process can be guaranteed not to be tampered when being transmitted through a public channel, so that the aim of improving the network communication safety is fulfilled.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (10)
1. A network security identity authentication method based on wind power plant communication is characterized by comprising the following steps:
step 1: user registration
User identity value ID input by user at wind power plant user sideiSending the random number a and the selected random number a to a service provider end through a secure channel;
the service provider end passes the user identity value IDiRandom number a, service identity value IDjAnd a service provider secret value KspCalculating to obtain a value MiNumerical value GiAnd a value Qi(ii) a The value M is measurediThe value GiSending the value M to the wind power plant user side through a safety channel so that the wind power plant user side can conveniently use the value MiThe value GiAnd the first random number a is stored, and the service provider side stores the third value QiStoring the data into a self database;
step 2: mutual authentication
After the wind power plant user end finishes login operation, selecting a random number b, and obtaining a wind power plant secret value K through the random number a, the random number b and the wind power plant secret value KsmCalculating to obtain a numerical value N; then the value L is obtained by calculation1Will calculate the value N, L1And a time value TiWith the value M stored in its own databasei、GiEncryption with a symmetric key s shared in advance to obtain Es=[Mi,Gi,N,L1,Ti]The encrypted message Es=[Mi,Gi,N,L1,Ti]Sending the data to a service provider end through an open channel;
the service provider end receives the encrypted message Es=[Mi,Gi,N,L1,Ti]Decrypting the message to obtain a value M'iNumerical value G'iNumerical value N'iNumerical value L'1Time value TiCalculating a message refresh value delta T, if the value is within the range, carrying out the next operation, otherwise, rejecting the service;
the service provider side decrypts the data by adopting the symmetric key s to obtain a value Q'iJudging Q'iWhether or not to match Q stored in its own databaseiThe values of the data are equal to each other, and the data are used for judging whether the message comes from the registered wind power plant user side;
service provider side calculates and obtains numerical valueJudging the valueAnd a numerical valueL'1Whether the values are equal or not is used for judging whether all values in the encrypted and received message are tampered or not;
the service provider selects the random number c and the random number d, and calculates to obtain a value L2Numerical value U and time value TiAnd the value L is compared2Numerical value U and time value TiEncrypting with the symmetric key s to obtain an encrypted message Es{L2,U,TiWill encrypt message Es{L2,U,TiSending the wind power station to a user side of the wind power station;
the wind power plant user side receives the encrypted message Es{L2,U,TiAfter the encryption, the message E is encrypteds{L2,U,TiDeciphering to obtain a value L'2Numerical value U', time value TiCalculating message refresh value delta T to see if the value is within the value range, calculating to obtain the value L "2And verifying whether L "2=L'2For determining an encrypted message Es{L2,U,TiWhether the message content comes from the service provider side or not is tampered;
obtaining a session key SK h (ID) after passing the authenticationiA N U); the session key is used to encrypt the session message content.
2. The network security identity authentication method based on wind farm communication according to claim 1, wherein in step 1, the wind farm user side adopts a user identity value ID input by a useriA password value PWiAnd calculating the selected random number a to obtain a value AiAnd storing;
adopting a numerical value A at a wind power plant user end before step 2iAnd realizing user login authentication.
3. The wind farm communication-based network security identity authentication method according to claim 1, wherein the user login authentication comprises a wind farm user side receiving an identity value input by a userAnd a passwordWind power plant user side calculation to obtain numerical valueWill calculate the obtained valueWith the value A stored in its own databaseiComparing to determine whether the above-mentioned requirements are metIf the conditions are met, the user identity is correct, and the user login authentication is passed.
9. The wind farm communication-based network security identity authentication method according to claim 1, wherein the value U-h (K)spC) + d, the value L2H (U | | SK), wherein SK ═ h (ID ″)i||a"||N||U)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111264312.XA CN114338071A (en) | 2021-10-28 | 2021-10-28 | Network security identity authentication method based on wind power plant communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111264312.XA CN114338071A (en) | 2021-10-28 | 2021-10-28 | Network security identity authentication method based on wind power plant communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114338071A true CN114338071A (en) | 2022-04-12 |
Family
ID=81045609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111264312.XA Pending CN114338071A (en) | 2021-10-28 | 2021-10-28 | Network security identity authentication method based on wind power plant communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114338071A (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101110678A (en) * | 2002-08-28 | 2008-01-23 | 高通股份有限公司 | Method and apparatus for security in a data processing system |
CN105072110A (en) * | 2015-08-06 | 2015-11-18 | 山东科技大学 | Two-factor remote identity authentication method based on smart card |
WO2017004470A1 (en) * | 2015-06-30 | 2017-01-05 | Visa International Service Association | Mutual authentication of confidential communication |
CN106534064A (en) * | 2016-09-28 | 2017-03-22 | 天津大学 | ID-based non-trusted third party identity verification system and method |
KR101721511B1 (en) * | 2017-02-09 | 2017-03-30 | 에스지에이솔루션즈 주식회사 | A user authentication method using symmetric key, to guarantee anonymity in the wireless sensor network environment |
US20170135059A1 (en) * | 2015-11-09 | 2017-05-11 | Infosys Limited | Method and system of authentication and ota registration of a new user without a sim card in multi-operator mobile telephony |
CN106936592A (en) * | 2017-05-11 | 2017-07-07 | 成都信息工程大学 | A kind of tripartite's subjective entropy based on extension chaos algorithm |
CN107710216A (en) * | 2015-07-03 | 2018-02-16 | 阿费罗有限公司 | For establishing the apparatus and method of secure communication channel in Internet of Things (IoT) system |
CN109040045A (en) * | 2018-07-25 | 2018-12-18 | 广东工业大学 | A kind of cloud storage access control method based on the encryption of ciphertext policy ABE base |
US20190103964A1 (en) * | 2017-10-04 | 2019-04-04 | Amir Keyvan Khandani | Methods for encrypted data communications |
CN109714167A (en) * | 2019-03-15 | 2019-05-03 | 北京邮电大学 | Authentication and cryptographic key negotiation method and equipment suitable for mobile application signature |
CN110838920A (en) * | 2019-11-20 | 2020-02-25 | 北京航空航天大学 | Password authentication and key agreement protocol in web system without storing password related information |
US20200195446A1 (en) * | 2018-12-18 | 2020-06-18 | Sri International | System and method for ensuring forward & backward secrecy using physically unclonable functions |
CN111372248A (en) * | 2020-02-27 | 2020-07-03 | 南通大学 | Efficient anonymous identity authentication method in Internet of vehicles environment |
CN111756533A (en) * | 2014-08-29 | 2020-10-09 | 维萨国际服务协会 | System, method and storage medium for secure password generation |
CN112953727A (en) * | 2021-03-02 | 2021-06-11 | 西安电子科技大学 | Internet of things-oriented equipment anonymous identity authentication method and system |
CN113115307A (en) * | 2021-04-12 | 2021-07-13 | 北京邮电大学 | Two-factor identity authentication method oriented to smart home scene |
-
2021
- 2021-10-28 CN CN202111264312.XA patent/CN114338071A/en active Pending
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101110678A (en) * | 2002-08-28 | 2008-01-23 | 高通股份有限公司 | Method and apparatus for security in a data processing system |
CN111756533A (en) * | 2014-08-29 | 2020-10-09 | 维萨国际服务协会 | System, method and storage medium for secure password generation |
WO2017004470A1 (en) * | 2015-06-30 | 2017-01-05 | Visa International Service Association | Mutual authentication of confidential communication |
CN107710216A (en) * | 2015-07-03 | 2018-02-16 | 阿费罗有限公司 | For establishing the apparatus and method of secure communication channel in Internet of Things (IoT) system |
CN105072110A (en) * | 2015-08-06 | 2015-11-18 | 山东科技大学 | Two-factor remote identity authentication method based on smart card |
US20170135059A1 (en) * | 2015-11-09 | 2017-05-11 | Infosys Limited | Method and system of authentication and ota registration of a new user without a sim card in multi-operator mobile telephony |
CN106534064A (en) * | 2016-09-28 | 2017-03-22 | 天津大学 | ID-based non-trusted third party identity verification system and method |
KR101721511B1 (en) * | 2017-02-09 | 2017-03-30 | 에스지에이솔루션즈 주식회사 | A user authentication method using symmetric key, to guarantee anonymity in the wireless sensor network environment |
CN106936592A (en) * | 2017-05-11 | 2017-07-07 | 成都信息工程大学 | A kind of tripartite's subjective entropy based on extension chaos algorithm |
US20190103964A1 (en) * | 2017-10-04 | 2019-04-04 | Amir Keyvan Khandani | Methods for encrypted data communications |
CN109040045A (en) * | 2018-07-25 | 2018-12-18 | 广东工业大学 | A kind of cloud storage access control method based on the encryption of ciphertext policy ABE base |
US20200195446A1 (en) * | 2018-12-18 | 2020-06-18 | Sri International | System and method for ensuring forward & backward secrecy using physically unclonable functions |
CN109714167A (en) * | 2019-03-15 | 2019-05-03 | 北京邮电大学 | Authentication and cryptographic key negotiation method and equipment suitable for mobile application signature |
CN110838920A (en) * | 2019-11-20 | 2020-02-25 | 北京航空航天大学 | Password authentication and key agreement protocol in web system without storing password related information |
CN111372248A (en) * | 2020-02-27 | 2020-07-03 | 南通大学 | Efficient anonymous identity authentication method in Internet of vehicles environment |
CN112953727A (en) * | 2021-03-02 | 2021-06-11 | 西安电子科技大学 | Internet of things-oriented equipment anonymous identity authentication method and system |
CN113115307A (en) * | 2021-04-12 | 2021-07-13 | 北京邮电大学 | Two-factor identity authentication method oriented to smart home scene |
Non-Patent Citations (2)
Title |
---|
Y. ZHANG等: ""Research on the cross-domain access control model in wind power plant"", 《009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY》 * |
李艳平;刘小雪;屈娟;鲁来凤;: "基于智能卡的多服务器远程匿名认证密钥协商协议", 四川大学学报(工程科学版), no. 01 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040045B (en) | Cloud storage access control method based on ciphertext policy attribute-based encryption | |
US8130961B2 (en) | Method and system for client-server mutual authentication using event-based OTP | |
CN102664885B (en) | Identity authentication method based on biological feature encryption and homomorphic algorithm | |
US20120240204A1 (en) | System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication | |
CN113918981B (en) | Attribute-based encryption method and system | |
CN112187798B (en) | Bidirectional access control method and system applied to cloud-side data sharing | |
CN104796265A (en) | Internet-of-things identity authentication method based on Bluetooth communication access | |
JPH05344117A (en) | Opposite party certifying/ciphered key distributing system | |
WO2009155813A1 (en) | Method for storing encrypted data in client and system thereof | |
CN114039790A (en) | Block chain-based fine-grained cloud storage security access control method | |
CN107682152B (en) | Group key negotiation method based on symmetric cipher | |
CN113704736A (en) | Lightweight access authentication method and system for power Internet of things equipment based on IBC system | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN113225302B (en) | Data sharing system and method based on proxy re-encryption | |
CN103701787A (en) | User name password authentication method implemented on basis of public key algorithm | |
CN114765534B (en) | Private key distribution system and method based on national secret identification cryptographic algorithm | |
CN114401153B (en) | Authentication method and system of intelligent well lid equipment | |
CN113079177B (en) | Remote sensing data sharing method based on time and decryption frequency limitation | |
CN108551391B (en) | Authentication method based on USB-key | |
CN102223235A (en) | Fingerprint characteristic template protecting method and identity authentication method in open network environment | |
CN116155598A (en) | Authentication method and system under multi-server architecture | |
CN114338071A (en) | Network security identity authentication method based on wind power plant communication | |
JPH10240826A (en) | Electronic contracting method | |
Mishra et al. | Authenticated content distribution framework for digital rights management systems with smart card revocation | |
KR101271464B1 (en) | Method for coding private key in dual certificate system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |