CN114338071A - Network security identity authentication method based on wind power plant communication - Google Patents

Network security identity authentication method based on wind power plant communication Download PDF

Info

Publication number
CN114338071A
CN114338071A CN202111264312.XA CN202111264312A CN114338071A CN 114338071 A CN114338071 A CN 114338071A CN 202111264312 A CN202111264312 A CN 202111264312A CN 114338071 A CN114338071 A CN 114338071A
Authority
CN
China
Prior art keywords
value
user
wind power
power plant
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111264312.XA
Other languages
Chinese (zh)
Inventor
王其乐
钱坤
王寅生
朱志成
孟凯锋
王栋
高小钧
胡鹏
赵振飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongneng Power Tech Development Co Ltd
Original Assignee
Zhongneng Power Tech Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongneng Power Tech Development Co Ltd filed Critical Zhongneng Power Tech Development Co Ltd
Priority to CN202111264312.XA priority Critical patent/CN114338071A/en
Publication of CN114338071A publication Critical patent/CN114338071A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a network security identity authentication method based on wind power plant communication. According to the network security identity authentication method based on wind power plant communication, when each wind power plant user wants to join a wind power plant communication network, the user needs to register with a service provider, the service provider can share a mutually different symmetric key for each registered wind power plant user in advance, calculates the correlation value of mutual verification after two entities, and finally sends the calculated correlation value to the wind power plant user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith. By the method, mutual authentication before generation of the session keys of the two entities can be realized, and meanwhile, each piece of information in the authentication process can be guaranteed not to be tampered when being transmitted through a public channel, so that the aim of improving the network communication safety is fulfilled.

Description

Network security identity authentication method based on wind power plant communication
Technical Field
The invention relates to the technical field of wind power plant communication network security, in particular to a network security identity authentication method based on wind power plant communication.
Background
The identity authentication technology is an effective means for verifying the identity of an operator in a computer network, user identity information can be represented by specific data streams in a network system, and a computer can realize digital identity authentication of a user through authentication of data, so that the user is authorized. Identity authentication is the first key to protect network resource security, and is also the key to network information security.
At present, computer information technology is widely popularized, the use requirement is provided, besides various functions, the research of safety technology is crucial, the current user identity authentication technology can confirm the user identity in the communication process of the wind power plant, and the safety of the communication of the wind power plant is greatly improved. Compare traditional security measures, need the user to remember a large amount of passwords, it is complicated in the in-process of the actual application moreover, the security is lower, so the authentication technique is undoubtedly more convenient, and factor of safety is higher moreover.
Therefore, it is necessary to increase the research on the identity authentication technology and to popularize and apply the technology in important places and fields to ensure the safety of the computer information usage of the system.
Disclosure of Invention
The invention provides a network security identity authentication method based on wind power plant communication.
The invention provides the following scheme:
a network security identity authentication method based on wind power plant communication comprises the following steps:
step 1: user registration
User identity value ID input by user at wind power plant user sideiSending the random number a and the selected random number a to a service provider end through a secure channel;
the service provider end passes the user identity value IDiRandom number a, service identity value IDjAnd a service provider secret value KspCalculating to obtain a value MiNumerical value GiAnd a value Qi(ii) a The value M is measurediThe value GiSending the value M to the wind power plant user side through a safety channel so that the wind power plant user side can conveniently use the value MiThe value GiAnd the first random number a is stored, and the service provider side stores the third value QiStoring the data into a self database;
step 2: mutual authentication
After the wind power plant user end finishes login operation, selecting a random number b, and obtaining a wind power plant secret value K through the random number a, the random number b and the wind power plant secret value KsmCalculating to obtain a numerical value N; then the value L is obtained by calculation1Will calculate the value N, L1And a time value TiWith the value M stored in its own databasei、GiEncryption with a symmetric key s shared in advance to obtain Es=[Mi,Gi,N,L1,Ti]The encrypted message Es=[Mi,Gi,N,L1,Ti]Sending the data to a service provider end through an open channel;
the service provider end receives the encrypted message Es=[Mi,Gi,N,L1,Ti]Decrypting the message to obtain a value M'iNumerical value G'iNumerical value N'iNumerical value L'1Time value TiCalculating a message refresh value delta T, and if the value is within the range, performing the next operation, otherwise rejectingA dead service;
the service provider side decrypts the data by adopting the symmetric key s to obtain a value Q'iJudging Q'iWhether or not to match Q stored in its own databaseiThe values of the data are equal to each other, and the data are used for judging whether the message comes from the registered wind power plant user side;
service provider side calculates and obtains numerical value
Figure BDA0003326625480000021
Judging the value
Figure BDA0003326625480000022
And a numerical value of L'1Whether the values are equal or not is used for judging whether all values in the encrypted and received message are tampered or not;
the service provider selects the random number c and the random number d, and calculates to obtain a value L2Numerical value U and time value TiAnd the value L is compared2Numerical value U and time value TiEncrypting with the symmetric key s to obtain an encrypted message Es{L2,U,TiWill encrypt message Es{L2,U,TiSending the wind power station to a user side of the wind power station;
the wind power plant user side receives the encrypted message Es{L2,U,TiAfter the encryption, the message E is encrypteds{L2,U,TiDeciphering to obtain a value L'2Numerical value U', time value TiCalculating message refresh value delta T to see if the value is within the value range, calculating to obtain the value L "2And verifying whether L "2=L'2For determining an encrypted message Es{L2,U,TiWhether the message content comes from the service provider side or not is tampered;
obtaining a session key SK h (ID) after passing the authenticationiA N U); the session key is used to encrypt the session message content.
Preferably: step 1, adopting user input user identity value ID at user side of wind farmiA password value PWiAnd calculating the selected random number a to obtain a value AiAnd store;
Adopting a numerical value A at a wind power plant user end before step 2iAnd realizing user login authentication.
Preferably: the user login authentication comprises the step that a user end of the wind power plant receives an identity value input by a user
Figure BDA0003326625480000031
And a password
Figure BDA0003326625480000032
Wind power plant user side calculation to obtain numerical value
Figure BDA0003326625480000033
Will calculate the obtained value
Figure BDA0003326625480000034
With the value A stored in its own databaseiComparing to determine whether the above-mentioned requirements are met
Figure BDA0003326625480000035
If the conditions are met, the user identity is correct, and the user login authentication is passed.
Preferably: the value Ai=h(IDi||a||PWi) The value of
Figure BDA0003326625480000036
Preferably: the numerical value
Figure BDA0003326625480000037
The numerical value
Figure BDA0003326625480000038
The numerical value
Figure BDA0003326625480000039
Preferably: the value N ═ KsmA) + b, the value L1H (N | | r), the
Figure BDA00033266254800000310
Preferably: service provider side decrypts M 'with symmetric key s'i、G′iTo obtain
Figure BDA00033266254800000311
Figure BDA00033266254800000312
The numerical value
Figure BDA00033266254800000313
Wherein the content of the first and second substances,
Figure BDA00033266254800000314
preferably: the numerical value
Figure BDA00033266254800000315
Wherein r' is h (ID) "i||a"||N')。
Preferably: the value U ═ h (K)spC) + d, the value L2H (U | SK), wherein SK ═ h (ID "i||a"||N||U)。
Preferably: the value L "2H (U '| SK'), wherein,
Figure BDA00033266254800000316
according to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the invention can realize a network security identity authentication method based on wind power plant communication. According to the network security identity authentication method based on wind power plant communication, when each wind power plant user wants to join a wind power plant communication network, the user needs to register with a service provider, the service provider can share a mutually different symmetric key for each registered wind power plant user in advance, calculates the correlation value of mutual verification after two entities, and finally sends the calculated correlation value to the wind power plant user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith. By the method, mutual authentication before generation of the session keys of the two entities can be realized, and meanwhile, each piece of information in the authentication process can be guaranteed not to be tampered when being transmitted through a public channel, so that the aim of improving the network communication safety is fulfilled.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of a user registration phase in a network security identity authentication method based on wind farm communication according to an embodiment of the present invention;
fig. 2 is a flowchart of a mutual authentication phase in a network security identity authentication method based on wind farm communication according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
Examples
Referring to fig. 1 and 2, a network security identity authentication method based on wind farm communication provided by an embodiment of the present invention is shown in fig. 1 and 2, and the method includes the following steps:
step 1: user registration
User identity value ID input by user at wind power plant user sideiSending the random number a and the selected random number a to a service provider end through a secure channel;
the service provider end passes the user identity value IDiRandom number a, service identity value IDjAnd a service provider secret value KspCalculating to obtain a value MiNumerical value GiAnd a value Qi(ii) a The value M is measurediThe value GiSending the value M to the wind power plant user side through a safety channel so that the wind power plant user side can conveniently use the value MiThe value GiAnd the first random number a is stored, and the service provider side stores the third value QiStoring the data into a self database;
step 2: mutual authentication
After the wind power plant user end finishes login operation, selecting a random number b, and obtaining a wind power plant secret value K through the random number a, the random number b and the wind power plant secret value KsmCalculating to obtain a numerical value N; then the value L is obtained by calculation1Will calculate the value N, L1And a time value TiWith the value M stored in its own databasei、GiEncryption with a symmetric key s shared in advance to obtain Es=[Mi,Gi,N,L1,Ti]The encrypted message Es=[Mi,Gi,N,L1,Ti]Sending the data to a service provider end through an open channel;
the service provider end receives the encrypted message Es=[Mi,Gi,N,L1,Ti]Decrypting the message to obtain a value M'iNumerical value G'iNumerical value N'iNumerical value L'1Time value TiCalculating a message refresh value delta T, if the value is within the range, carrying out the next operation, otherwise, rejecting the service;
the service provider side decrypts the data by adopting the symmetric key s to obtain a value Q'iJudging Q'iWhether or not to cooperate withQ stored in own databaseiThe values of the data are equal to each other, and the data are used for judging whether the message comes from the registered wind power plant user side;
service provider side calculates and obtains numerical value
Figure BDA0003326625480000051
Judging the value
Figure BDA0003326625480000052
And a numerical value of L'1Whether the values are equal or not is used for judging whether all values in the encrypted and received message are tampered or not;
the service provider selects the random number c and the random number d, and calculates to obtain a value L2Numerical value U and time value TiAnd the value L is compared2Numerical value U and time value TiEncrypting with the symmetric key s to obtain an encrypted message Es{L2,U,TiWill encrypt message Es{L2,U,TiSending the wind power station to a user side of the wind power station;
the wind power plant user side receives the encrypted message Es{L2,U,TiAfter the encryption, the message E is encrypteds{L2,U,TiDeciphering to obtain a value L'2Numerical value U', time value TiCalculating message refresh value delta T to see if the value is within the value range, calculating to obtain the value L "2And verifying whether L "2=L'2For determining an encrypted message Es{L2,U,TiWhether the message content comes from the service provider side or not is tampered;
obtaining a session key SK h (ID) after passing the authenticationiA N U); the session key is used to encrypt the session message content.
The network security identity authentication method based on wind power plant communication provided by the embodiment of the application comprises two parts: registration and login key agreement. The first part is a registration part, and the wind farm user performs registration and record at the service provider through a secure channel or offline registration mode. The second part is that the wind farm user is first logged in and authenticated by the login key agreement, and then mutually authenticated with the service provider and generates a session key therewith.
In order to realize the authentication of the identity of a user when the user logs in through a wind power plant user side. The embodiment of the application can provide the user identity value ID input by the user at the user end of the wind farm in the step 1iA password value PWiAnd calculating the selected random number a to obtain a value AiAnd storing;
adopting a numerical value A at a wind power plant user end before step 2iAnd realizing user login authentication.
It can be understood that each of the values provided in the embodiments of the present application can be calculated by using a corresponding calculation formula, for example, in an implementation manner, a part of the values provided in the embodiments of the present application can be calculated by using the disclosed hash function h (), and a part of the values can be calculated by using the homomorphic encryption algorithm E (). Specifically, the value Ai=h(IDi||a||PWi) The value of
Figure BDA0003326625480000061
The numerical value
Figure BDA0003326625480000062
The numerical value
Figure BDA0003326625480000063
The numerical value
Figure BDA0003326625480000064
The value N ═ KsmA) + b, the value L1H (N | | r), the
Figure BDA0003326625480000065
Service provider side decrypts M 'with symmetric key s'i、G′iTo obtain
Figure BDA0003326625480000066
Figure BDA0003326625480000067
The numerical value
Figure BDA0003326625480000068
Wherein the content of the first and second substances,
Figure BDA0003326625480000069
the numerical value
Figure BDA00033266254800000610
Wherein r' is h (ID) "i||a"||N')。
The value U ═ h (K)spC) + d, the value L2H (U | SK), wherein SK ═ h (ID "i||a"||N||U)。
The value L "2H (U '| SK'), wherein,
Figure BDA00033266254800000611
according to the network security identity authentication method based on wind power plant communication provided by the embodiment of the application, two entities are wind power plant users (SM) in wind power plant communication respectivelyi) And Service Provider (SP)j)。
Wind farm user (SM)i): the most basic subscriber unit needs to register with the service provider whenever a wind farm user wants to join the wind farm communication network, and stores the correlation value calculated by the service provider for the service provider into its own memory. And eventually agree with the service provider to a session key for subsequent encrypted communication between the two entities.
Service Provider (SP)j): whenever a wind farm user wants to join a wind farm communication network, the user needs to register with a service provider, the service provider can share a mutually different symmetric key for each registered wind farm user in advance, calculate a correlation value verified mutually after two entities for the user, and finally send the calculated correlation value to the wind powerA field user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith.
In the specific implementation:
user registration
Wind farm user (SM)i) Firstly input identity value IDiAnd password PWiThen, a random number a is selected, and A is calculatedi=h(IDi||a||PWi) Finally, the identity value ID is transmitted via a secure channeliAnd the random number a to the Service Provider (SP)j)。
Service Provider (SP)j) After receiving the information, calculating
Figure BDA0003326625480000071
Figure BDA0003326625480000072
KspA secret value of the service provider. Then the calculated value Mi、GiSent to the SM over a secure channeliAnd calculating QiAnd storing the data into a self database.
SMiReceiving a message from an SPjAfter the message is sent, A isi、Mi、GiAnd a is stored in a self database.
Login authentication
Wind farm user (SM)i) Firstly, login operation is carried out, and identity value is input
Figure BDA0003326625480000073
And a password
Figure BDA0003326625480000074
Then wind farm calculations
Figure BDA0003326625480000075
And comparing the calculated value with the value A stored in its own databaseiComparing to determine whether the above-mentioned requirements are met
Figure BDA0003326625480000076
If the condition is satisfied, the user identity is correct, and the next operation can be carried out, otherwise, the service is refused.
Mutual authentication
Then wind farm users (SM)i) Selecting a random number b, and calculating N ═ KsmA) + b, wherein KsmIs a secret value of the wind farm. Recalculation
Figure BDA0003326625480000081
L1H (N | | r), the calculated value N, L is calculated1And a time value TiWith the value M stored in its own databasei、GiEncryption E with a symmetric key s shared in advances=[Mi,Gi,N,L1,Ti]And finally, sending the encrypted message to the service provider through the public channel.
When a Service Provider (SP)j) Decrypting the message after receiving the encrypted message to obtain M'i、G′i、N′i、L'1、TiThe message refresh value Δ T is calculated, and if the value is within the range, the next operation is performed, otherwise the service is denied.
Then decrypt M'i、G′iTo obtain
Figure BDA0003326625480000082
And calculate
Figure BDA0003326625480000083
Figure BDA0003326625480000084
Calculated Q 'is then verified'iWhether the value is associated with Q stored in its own databaseiAre equal to Q'i=QiIf the two values are equal, the message can be proven to be from a previously registered wind farm user, otherwise service is denied.
Next, the Service Provider (SP)j) Calculating r ═ h (ID "i||a"||N')、
Figure BDA0003326625480000085
And verify
Figure BDA0003326625480000086
If the two values are equal, the fact that all the values in the message received through encryption are not tampered can be proved, and otherwise, service is refused.
Then the Service Provider (SP)j) Two random numbers c and d are chosen and U ═ h (K) is calculatedsp*c)+d、SK=h(ID"i||a"||N||U)、L2H (U | | SK), and finally L2、U、TiEncrypted by using a symmetric key s pre-shared by the wind farm and the service provider and then sent to the wind farm Es{L2,U,Ti}。
After the wind power plant user receives the encrypted message, the message is decrypted to obtain L'2、U'、TiThen calculates the message refresh value Δ T to see if the value is within the range, then calculates
Figure BDA0003326625480000087
L"2H (U '| SK') and to verify if L "2=L'2If the two values are equal, the message can be proved to be from the service provider and the content of the message is not tampered, otherwise, the service is refused.
SK ═ h (ID) can be obtainediI | a | N | U) is the communication behind the session key that can use this key to encrypt the session message content.
In a word, according to the network security identity authentication method based on wind farm communication provided by the application, each wind farm user needs to register with a service provider when wanting to join a wind farm communication network, the service provider can share a mutually different symmetric key for each registered wind farm user in advance, calculate the correlation values of mutual verification after two entities for the wind farm user, and finally send the calculated correlation values to the wind farm user. In a subsequent login and authentication phase to verify the identity of the legitimate user and to generate a session key therewith. By the method, mutual authentication before generation of the session keys of the two entities can be realized, and meanwhile, each piece of information in the authentication process can be guaranteed not to be tampered when being transmitted through a public channel, so that the aim of improving the network communication safety is fulfilled.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A network security identity authentication method based on wind power plant communication is characterized by comprising the following steps:
step 1: user registration
User identity value ID input by user at wind power plant user sideiSending the random number a and the selected random number a to a service provider end through a secure channel;
the service provider end passes the user identity value IDiRandom number a, service identity value IDjAnd a service provider secret value KspCalculating to obtain a value MiNumerical value GiAnd a value Qi(ii) a The value M is measurediThe value GiSending the value M to the wind power plant user side through a safety channel so that the wind power plant user side can conveniently use the value MiThe value GiAnd the first random number a is stored, and the service provider side stores the third value QiStoring the data into a self database;
step 2: mutual authentication
After the wind power plant user end finishes login operation, selecting a random number b, and obtaining a wind power plant secret value K through the random number a, the random number b and the wind power plant secret value KsmCalculating to obtain a numerical value N; then the value L is obtained by calculation1Will calculate the value N, L1And a time value TiWith the value M stored in its own databasei、GiEncryption with a symmetric key s shared in advance to obtain Es=[Mi,Gi,N,L1,Ti]The encrypted message Es=[Mi,Gi,N,L1,Ti]Sending the data to a service provider end through an open channel;
the service provider end receives the encrypted message Es=[Mi,Gi,N,L1,Ti]Decrypting the message to obtain a value M'iNumerical value G'iNumerical value N'iNumerical value L'1Time value TiCalculating a message refresh value delta T, if the value is within the range, carrying out the next operation, otherwise, rejecting the service;
the service provider side decrypts the data by adopting the symmetric key s to obtain a value Q'iJudging Q'iWhether or not to match Q stored in its own databaseiThe values of the data are equal to each other, and the data are used for judging whether the message comes from the registered wind power plant user side;
service provider side calculates and obtains numerical value
Figure FDA0003326625470000011
Judging the value
Figure FDA0003326625470000012
And a numerical valueL'1Whether the values are equal or not is used for judging whether all values in the encrypted and received message are tampered or not;
the service provider selects the random number c and the random number d, and calculates to obtain a value L2Numerical value U and time value TiAnd the value L is compared2Numerical value U and time value TiEncrypting with the symmetric key s to obtain an encrypted message Es{L2,U,TiWill encrypt message Es{L2,U,TiSending the wind power station to a user side of the wind power station;
the wind power plant user side receives the encrypted message Es{L2,U,TiAfter the encryption, the message E is encrypteds{L2,U,TiDeciphering to obtain a value L'2Numerical value U', time value TiCalculating message refresh value delta T to see if the value is within the value range, calculating to obtain the value L "2And verifying whether L "2=L'2For determining an encrypted message Es{L2,U,TiWhether the message content comes from the service provider side or not is tampered;
obtaining a session key SK h (ID) after passing the authenticationiA N U); the session key is used to encrypt the session message content.
2. The network security identity authentication method based on wind farm communication according to claim 1, wherein in step 1, the wind farm user side adopts a user identity value ID input by a useriA password value PWiAnd calculating the selected random number a to obtain a value AiAnd storing;
adopting a numerical value A at a wind power plant user end before step 2iAnd realizing user login authentication.
3. The wind farm communication-based network security identity authentication method according to claim 1, wherein the user login authentication comprises a wind farm user side receiving an identity value input by a user
Figure FDA0003326625470000021
And a password
Figure FDA0003326625470000022
Wind power plant user side calculation to obtain numerical value
Figure FDA0003326625470000023
Will calculate the obtained value
Figure FDA0003326625470000024
With the value A stored in its own databaseiComparing to determine whether the above-mentioned requirements are met
Figure FDA0003326625470000025
If the conditions are met, the user identity is correct, and the user login authentication is passed.
4. The wind farm communication-based network security identity authentication method according to claim 3, wherein the value Ai=h(IDi||a||PWi) The value of
Figure FDA0003326625470000026
5. The wind farm communication-based network security identity authentication method according to claim 1, wherein the numerical value
Figure FDA0003326625470000027
The numerical value
Figure FDA0003326625470000028
The numerical value
Figure FDA0003326625470000029
6. Wind farm based on a wind park according to claim 1The network security identity authentication method of the credit is characterized in that the value N ═ KsmA) + b, the value L1H (N | | r), the
Figure FDA00033266254700000210
7. The wind farm communication-based network security identity authentication method according to claim 1, wherein the service provider side decrypts M 'by using a symmetric key s'i、G′iTo obtain
Figure FDA00033266254700000211
Figure FDA00033266254700000212
The numerical value
Figure FDA00033266254700000213
Wherein the content of the first and second substances,
Figure FDA00033266254700000214
8. the wind farm communication-based network security identity authentication method according to claim 1, wherein the numerical value
Figure FDA0003326625470000031
Wherein r' ═ h (ID ″)i||a"||N')。
9. The wind farm communication-based network security identity authentication method according to claim 1, wherein the value U-h (K)spC) + d, the value L2H (U | | SK), wherein SK ═ h (ID ″)i||a"||N||U)。
10. Network security identity based on wind farm communication according to claim 1An authentication method characterized in that said numerical value L "2H (U '| SK'), wherein,
Figure FDA0003326625470000032
CN202111264312.XA 2021-10-28 2021-10-28 Network security identity authentication method based on wind power plant communication Pending CN114338071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111264312.XA CN114338071A (en) 2021-10-28 2021-10-28 Network security identity authentication method based on wind power plant communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111264312.XA CN114338071A (en) 2021-10-28 2021-10-28 Network security identity authentication method based on wind power plant communication

Publications (1)

Publication Number Publication Date
CN114338071A true CN114338071A (en) 2022-04-12

Family

ID=81045609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111264312.XA Pending CN114338071A (en) 2021-10-28 2021-10-28 Network security identity authentication method based on wind power plant communication

Country Status (1)

Country Link
CN (1) CN114338071A (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110678A (en) * 2002-08-28 2008-01-23 高通股份有限公司 Method and apparatus for security in a data processing system
CN105072110A (en) * 2015-08-06 2015-11-18 山东科技大学 Two-factor remote identity authentication method based on smart card
WO2017004470A1 (en) * 2015-06-30 2017-01-05 Visa International Service Association Mutual authentication of confidential communication
CN106534064A (en) * 2016-09-28 2017-03-22 天津大学 ID-based non-trusted third party identity verification system and method
KR101721511B1 (en) * 2017-02-09 2017-03-30 에스지에이솔루션즈 주식회사 A user authentication method using symmetric key, to guarantee anonymity in the wireless sensor network environment
US20170135059A1 (en) * 2015-11-09 2017-05-11 Infosys Limited Method and system of authentication and ota registration of a new user without a sim card in multi-operator mobile telephony
CN106936592A (en) * 2017-05-11 2017-07-07 成都信息工程大学 A kind of tripartite's subjective entropy based on extension chaos algorithm
CN107710216A (en) * 2015-07-03 2018-02-16 阿费罗有限公司 For establishing the apparatus and method of secure communication channel in Internet of Things (IoT) system
CN109040045A (en) * 2018-07-25 2018-12-18 广东工业大学 A kind of cloud storage access control method based on the encryption of ciphertext policy ABE base
US20190103964A1 (en) * 2017-10-04 2019-04-04 Amir Keyvan Khandani Methods for encrypted data communications
CN109714167A (en) * 2019-03-15 2019-05-03 北京邮电大学 Authentication and cryptographic key negotiation method and equipment suitable for mobile application signature
CN110838920A (en) * 2019-11-20 2020-02-25 北京航空航天大学 Password authentication and key agreement protocol in web system without storing password related information
US20200195446A1 (en) * 2018-12-18 2020-06-18 Sri International System and method for ensuring forward & backward secrecy using physically unclonable functions
CN111372248A (en) * 2020-02-27 2020-07-03 南通大学 Efficient anonymous identity authentication method in Internet of vehicles environment
CN111756533A (en) * 2014-08-29 2020-10-09 维萨国际服务协会 System, method and storage medium for secure password generation
CN112953727A (en) * 2021-03-02 2021-06-11 西安电子科技大学 Internet of things-oriented equipment anonymous identity authentication method and system
CN113115307A (en) * 2021-04-12 2021-07-13 北京邮电大学 Two-factor identity authentication method oriented to smart home scene

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110678A (en) * 2002-08-28 2008-01-23 高通股份有限公司 Method and apparatus for security in a data processing system
CN111756533A (en) * 2014-08-29 2020-10-09 维萨国际服务协会 System, method and storage medium for secure password generation
WO2017004470A1 (en) * 2015-06-30 2017-01-05 Visa International Service Association Mutual authentication of confidential communication
CN107710216A (en) * 2015-07-03 2018-02-16 阿费罗有限公司 For establishing the apparatus and method of secure communication channel in Internet of Things (IoT) system
CN105072110A (en) * 2015-08-06 2015-11-18 山东科技大学 Two-factor remote identity authentication method based on smart card
US20170135059A1 (en) * 2015-11-09 2017-05-11 Infosys Limited Method and system of authentication and ota registration of a new user without a sim card in multi-operator mobile telephony
CN106534064A (en) * 2016-09-28 2017-03-22 天津大学 ID-based non-trusted third party identity verification system and method
KR101721511B1 (en) * 2017-02-09 2017-03-30 에스지에이솔루션즈 주식회사 A user authentication method using symmetric key, to guarantee anonymity in the wireless sensor network environment
CN106936592A (en) * 2017-05-11 2017-07-07 成都信息工程大学 A kind of tripartite's subjective entropy based on extension chaos algorithm
US20190103964A1 (en) * 2017-10-04 2019-04-04 Amir Keyvan Khandani Methods for encrypted data communications
CN109040045A (en) * 2018-07-25 2018-12-18 广东工业大学 A kind of cloud storage access control method based on the encryption of ciphertext policy ABE base
US20200195446A1 (en) * 2018-12-18 2020-06-18 Sri International System and method for ensuring forward & backward secrecy using physically unclonable functions
CN109714167A (en) * 2019-03-15 2019-05-03 北京邮电大学 Authentication and cryptographic key negotiation method and equipment suitable for mobile application signature
CN110838920A (en) * 2019-11-20 2020-02-25 北京航空航天大学 Password authentication and key agreement protocol in web system without storing password related information
CN111372248A (en) * 2020-02-27 2020-07-03 南通大学 Efficient anonymous identity authentication method in Internet of vehicles environment
CN112953727A (en) * 2021-03-02 2021-06-11 西安电子科技大学 Internet of things-oriented equipment anonymous identity authentication method and system
CN113115307A (en) * 2021-04-12 2021-07-13 北京邮电大学 Two-factor identity authentication method oriented to smart home scene

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Y. ZHANG等: ""Research on the cross-domain access control model in wind power plant"", 《009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY》 *
李艳平;刘小雪;屈娟;鲁来凤;: "基于智能卡的多服务器远程匿名认证密钥协商协议", 四川大学学报(工程科学版), no. 01 *

Similar Documents

Publication Publication Date Title
CN109040045B (en) Cloud storage access control method based on ciphertext policy attribute-based encryption
US8130961B2 (en) Method and system for client-server mutual authentication using event-based OTP
CN102664885B (en) Identity authentication method based on biological feature encryption and homomorphic algorithm
US20120240204A1 (en) System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
CN113918981B (en) Attribute-based encryption method and system
CN112187798B (en) Bidirectional access control method and system applied to cloud-side data sharing
CN104796265A (en) Internet-of-things identity authentication method based on Bluetooth communication access
JPH05344117A (en) Opposite party certifying/ciphered key distributing system
WO2009155813A1 (en) Method for storing encrypted data in client and system thereof
CN114039790A (en) Block chain-based fine-grained cloud storage security access control method
CN107682152B (en) Group key negotiation method based on symmetric cipher
CN113704736A (en) Lightweight access authentication method and system for power Internet of things equipment based on IBC system
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN113225302B (en) Data sharing system and method based on proxy re-encryption
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
CN114765534B (en) Private key distribution system and method based on national secret identification cryptographic algorithm
CN114401153B (en) Authentication method and system of intelligent well lid equipment
CN113079177B (en) Remote sensing data sharing method based on time and decryption frequency limitation
CN108551391B (en) Authentication method based on USB-key
CN102223235A (en) Fingerprint characteristic template protecting method and identity authentication method in open network environment
CN116155598A (en) Authentication method and system under multi-server architecture
CN114338071A (en) Network security identity authentication method based on wind power plant communication
JPH10240826A (en) Electronic contracting method
Mishra et al. Authenticated content distribution framework for digital rights management systems with smart card revocation
KR101271464B1 (en) Method for coding private key in dual certificate system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination