CN117411718A - Anonymous access control method based on digital oil-gas field system platform - Google Patents

Anonymous access control method based on digital oil-gas field system platform Download PDF

Info

Publication number
CN117411718A
CN117411718A CN202311565640.2A CN202311565640A CN117411718A CN 117411718 A CN117411718 A CN 117411718A CN 202311565640 A CN202311565640 A CN 202311565640A CN 117411718 A CN117411718 A CN 117411718A
Authority
CN
China
Prior art keywords
system platform
gas field
field system
digital oil
trusted center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311565640.2A
Other languages
Chinese (zh)
Other versions
CN117411718B (en
Inventor
张晓均
张楠
郝云溥
张海洋
邓旭东
薛婧婷
刘炳云
钱思怡
王文琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest Petroleum University
Original Assignee
Southwest Petroleum University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Petroleum University filed Critical Southwest Petroleum University
Priority to CN202311565640.2A priority Critical patent/CN117411718B/en
Publication of CN117411718A publication Critical patent/CN117411718A/en
Application granted granted Critical
Publication of CN117411718B publication Critical patent/CN117411718B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an anonymous access control method based on a digital oil and gas field system platform, which relates to the technical field of digital oil and gas field system platform information safety communication. In the method, the mobile engineering server generates a new time stamp and a random number each time when sending a request, and generates different temporary anonymous identities, thereby effectively preventing replay attack and realizing unlinkability; when the mobile engineering server communicates with the system platform, the mobile engineering server uses anonymous identities, and only a trusted center can decrypt the anonymous identities by using a system main private key to recover real identities, so that conditional access control on the malicious mobile engineering server is realized; by adopting a safe and efficient authentication mechanism, identity authentication among entities in the system platform is realized, the safe access of the system platform is ensured, and the authorized access of communication information is ensured.

Description

Anonymous access control method based on digital oil-gas field system platform
Technical Field
The invention relates to the technical field of digital oil and gas field system platform information safety communication, in particular to an anonymous access control method based on a digital oil and gas field system platform.
Background
In industrial production and economic development, oil and natural gas play an extremely important role, and through development and exploration in recent decades, the oil and gas industry in China gradually goes to maturity in technical and management measures and the like, and unprecedented results are obtained. Along with the development of technology, the traditional oil gas exploitation and monitoring system is not attractive, and the digital and intelligent transformation is required to be realized, so that the maximization of oil gas yield, the minimization of investment and the production safety are expected to be achieved.
The digital oil and gas field industrial control system is mainly responsible for the acquisition and transmission processing of oil and gas production business data. The system uses various real-time sensing equipment, industrial control and transmission protocols and control equipment special for enterprises to transmit real-time data of oil and gas exploration and development production sites to a control console so as to realize automatic monitoring of the states of environment and internet of things equipment and automatically control the production process. The system can provide important guarantee for the safe and stable operation of the oil field through the analysis and the processing of the sensor information and the corresponding control strategy. It plays an indispensable role in networked and intelligent control and management of oil and gas production.
In oil and gas field industrial control systems, availability is regarded as a critical factor, while measures for security are somewhat inadequate. Because of the openness and vulnerability of the network, and the characteristics of multiple points, long lines and wide range of oilfield production, the terminal equipment of the internet of things matched with oil and gas production monitoring is dispersed in various production environments, data in the system is transmitted in a plaintext form, and an open standard protocol is used, and a corresponding authentication and encryption mechanism is lacking, therefore, the problems that some terminal equipment is easy to be maliciously controlled, illegally accessed is at risk, and meanwhile, the data is easy to be deleted, modified, intercepted, replayed and the like are solved. Therefore, a safe and efficient authentication mechanism is needed to realize identity authentication among entities in the system and ensure safe access of a system platform, and ensure authorized access of communication information. Therefore, in order to solve the problems, the research designs an anonymous access control method based on a digital oil and gas field system platform, and the anonymous access control method has very important application prospect.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, and provides an anonymous access control method based on a digital oil and gas field system platform, which provides a safe and efficient authentication mechanism for the digital oil and gas field system platform to realize the anonymous access control of the platform.
The aim of the invention is realized by the following technical scheme:
the anonymous access control method based on the digital oil-gas field system platform comprises the following steps:
system initialization phase: the trusted center selects a main private key and stores the main private key in a secret way, and the trusted center sets public parameters, including setting an addition circulation group based on a nonsingular elliptic curve, a generating element, an anti-collision hash function and a main public key of the trusted center;
registration: the trusted center registers a mobile engineering service end, a data manager and a digital oil and gas field system platform in the digital oil and gas field system; specifically, the mobile engineering server sends the registration certificate of the mobile engineering server to a trusted center for registration, the trusted center generates a signature private key for the mobile engineering server after confirming the identity of the mobile engineering server, and the mobile engineering server takes the signature private key and a secret value generated by the mobile engineering server as a complete private key after receiving the signature private key; the data manager inputs the true identity, the login password and the biological characteristic information of the data manager to the digital oil-gas field system platform, the digital oil-gas field system platform calculates a pseudo password for the data manager, and the data manager sends registration request information to a trusted center through a secure channel; the trusted center issues public and private key pairs for the verified digital oil and gas field system platform, and based on the biological characteristic information of the data manager, the trusted center generates an authentication value by using a fuzzy extraction algorithm and a hash function and sends the authentication value to the digital oil and gas field system platform;
a login stage: the data manager inputs correct identity information to the digital oil-gas field system platform, and the login password and the current biological characteristic information are legally logged in; the digital oil-gas field system platform performs verification of login information by using a recovery algorithm based on a fuzzy extractor based on the current biological characteristic information; if the verification is correct, the login is successful, otherwise, the login is refused;
anonymous access information generation phase: the mobile engineering server generates a temporary accessed anonymous identity, generates a blinding value and a digital signature aiming at sensitive information, and sends verifiable anonymous access information to the digital oil-gas field system platform;
access control phase: after receiving the verifiable anonymous access information, the digital oil-gas field system platform firstly judges the validity of the current message by using a timestamp, then restores the original sensitive information to the blinded value in the effective time, and verifies the validity of the digital signature; if so, allowing the legal access of the mobile engineering server; if not, submitting the verifiable anonymous access information to a trusted center, recovering the true identity, and rejecting the mobile engineering server to access;
password updating stage: the data manager inputs correct identity information to the digital oil-gas field system platform, and the original login password and the current biological characteristic information are legally logged in; if the login is successful, the data manager can change the login password of the data manager, and the digital oil-gas field system platform recalculates the pseudo password and the new authentication value for the data manager and updates the related parameters.
Further, the system initialization stage includes the following steps:
(1) Trusted center TA in finite field Z p A non-singular elliptic curve is selected and defined as y 2 =x 3 +ax+b (modp), where the coefficients a, b ε Z p Satisfy 4a 3 +27b 2 (modp) noteq0, the trusted center TA selects q-order addition cyclic group G on the nonsingular elliptic curve, and the generation element is P;
(2) Trusted center TA in finite field Z q Selecting a non-zero random number s as a main private key, and calculating a main public key P pub =s·P;
(3) The trusted center TA sets 5 hash functions for collision resistance: andHere l 1 Is a hash function H 2 Output length of l 2 Is a hash function H 4 Output length of>Is a q-1 factorial cyclic group;
(4) Trusted center TA publishes public parameters params= { G, q, P pub ,H 1 ,H 2 ,H 3 ,H 4 ,H 5 And holds the master private key s in secret.
Further, the mobile engineering server sends the registration certificate to the trusted center for registration, the trusted center generates a signature private key for the mobile engineering server after verifying the identity of the mobile engineering server, and the mobile engineering server takes the signature private key and the secret value generated by the mobile engineering server as a complete private key after receiving the signature private key:
(1) Mobile engineering service end E i In the finite field Z q In selecting secret parameter r i Simultaneously calculating registration credentials R i =r i P, sending registration request information { EIDi, ri } over a secure channel to a trusted center TA, wherein EID i Is a mobile engineering service end E i Is moved simultaneously with the true identity of (a)Dynamic engineering service end E i Secure preservation of secret parameter r i
(2) After receiving the registration request information, the trusted center TA first determines the mobile engineering server E i Whether the registration is successful or not, if so, rejecting the request; otherwise, the trusted center TA is in the finite field Z q In selecting a non-zero random number omega i Calculate the first group element W i =ω i P, calculating mobile engineering server E i Is a signature private key of (a)And to the mobile engineering service end E through the secure channel i Send->
(3) Mobile engineering service end E i After receiving, verify the equationWhether or not it is true, if so, receive the message +.>Mobile engineering service end E i To->As a complete private key, in { W ] i ,R i As a complete public key while preserving the access credential parameter epsilon i =H 1 (W i ||R i ||EID i )。
Further, the data manager inputs the true identity, the login password and the biological characteristic information of the data manager to the digital oil-gas field system platform, and the digital oil-gas field system platform calculates a pseudo password for the data manager and sends registration request information to the trusted center through a secure channel; the trusted center issues public and private key pairs for the verified digital oil and gas field system platform, and based on the biological characteristic information of the data manager, the trusted center generates an authentication value by using a fuzzy extraction algorithm and a hash function and sends the authentication value to the digital oil and gas field system platform, and the specific steps are as follows:
(1) The data manager inputs the real identity DM to the digital oil and gas field system platform j Password and passwordBiometric information χ j The digital oil-gas field system platform calculates a first pseudo password for a data manager>And transmits the registration request information +/to the trusted center TA via the secure channel>Wherein CP j The true identity of the digital oil and gas field system platform;
(2) The trusted center TA receives the registration request informationFirstly judging whether the corresponding entity is successfully registered, and rejecting the request if the corresponding entity is registered; otherwise, the trusted center TA is the digital oil and gas field system platform CP j In the finite field Z q Is selected from non-zero random numbers +.>As the private key of the digital oil and gas field system platform, calculating the public key of the digital oil and gas field system platformThe trusted center TA generates a first secret value iota using a fuzzy extractor algorithm Gen based on the biometric information of the data administrator j And auxiliary parameter omicron j I.e. (iota) j ,ο j )=Gen(χ j ) Calculate the first authentication value +.>And transmit the quaternary to the digital oil and gas field system platform through the secure channelGroup information->
Further, the login stage comprises the following steps:
(1) Data manager inputs true identity to digital oil and gas field system platformLogin password->And the current biometric information +.>Logging in;
(2) Calculating a second pseudo password by the digital oil-gas field system platformCalculating a second secret value using a fuzzy extractor based recovery algorithm Rep>And according to the true identity of the data manager +.>Calculate the second authentication value +.>Then the second authentication value +.>With first authentication information alpha pre-stored in a digital oil and gas field system platform j And comparing, if the two values are equal, the login is successful, otherwise, the login is refused.
Further, the anonymous access information generation stage includes the following steps:
(1) Mobile workerProgram server E i Selecting a current timestamp T 1 Calculating temporary anonymous identities
(2) For sensitive access information m to be transmitted i Mobile engineering service end E i In the finite field Z q In selecting a non-zero random number b i Calculate the second group element B i =b i P, compute sensitive access information m i Is a blinding value of (2)Generating a digital signature->Mobile engineering service end E i Sending verifiable anonymous access information A to digital oil-gas field system platform i ={PID iiii ,B i ,T 1 }。
Further, the access control stage includes the following steps:
(1) The digital oil-gas field system platform receives verifiable anonymous access information A i ={PID iiii ,B i ,T 1 After } the current timestamp T is obtained 1 ' through |T 1 -T 1 ' delta T is smaller than delta T, wherein delta T is the upper limit of the minimum time difference, the validity of the current message is judged, if invalid, the message is discarded, if yes, the next step is carried out;
(2) Restoring original sensitive access information by digital oil-gas field system platformValidation equation sigma i ·P=(W i +P pub ε i +R i )H 5 (T 1 ||PID i ||m i )+B i Whether or not it is true, if so, receiving a message m i Digital oil and gas field system platform allows for mobile engineering suitService end E i Legal data access is carried out; if not, the digital oil and gas field system platform accesses information A from verifiable anonymity i ={PID iiii ,B i ,T 1 Extracting anonymous identity PID from } i And submitted to a trusted center TA, which recovers the unauthorized access mobile engineering server E i Is->
Further, the password updating stage comprises the following steps:
(1) If the data manager wants to change the password theta j The method comprises the steps that firstly, original information of the user is used for logging in a digital platform, and if the logging is successful, a digital oil-gas field system platform allows a data administrator to change a password;
(2) Data administrator inputs true identity and biometric features to digital oil and gas field system platformNew password->Digital oil-gas field system platform for calculating pseudo password +.>Again according to the biological characteristic information χ j Calculating a first secret value iota by using a recovery algorithm Rep of the fuzzy extractor j I.e. iota j =Rep(χ j ,ο j ) After that, a third authentication value is calculated>And updates its own parameters.
The beneficial effects of the invention are as follows:
1) The data manager sends the pseudo password to the trusted center in the registration stage, and even if the privileged user of the trusted center obtains the pseudo password of the data manager, the true login password cannot be recovered, so that the internal attack of the privileges is prevented.
2) When the mobile engineering server sends a request each time, a new time stamp and a new random number are generated, different temporary anonymous identities are generated, replay attack is effectively prevented, and unlinkability is realized. The mobile engineering server uses the private signature key and the secret parameter as the complete private key, and in the message transmission process, the adversary can forge the digital signature of the message only by knowing the corresponding private key, thereby effectively resisting man-in-the-middle attack.
3) The complete private key of the mobile engineering server consists of two parts, wherein one part is a secret value generated by the mobile engineering server and the other part is a signature private key calculated by a trusted center, so that the problem of key escrow is effectively avoided. Thus, even if the trusted center and the malicious mobile engineering server are colluded, the digital signature in the access control cannot be forged, and the malicious mobile engineering server cannot effectively access.
4) When the mobile engineering server communicates with the system platform, the mobile engineering server uses the anonymous identity, and only the trusted center can decrypt the anonymous identity by using the system master private key to recover the real identity, thereby realizing conditional access control on the malicious mobile engineering server.
Detailed Description
The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be within the scope of the present invention, based on the embodiments of the present invention.
The invention provides a technical scheme that:
the anonymous access control method based on the digital oil-gas field system platform comprises the following steps:
system initialization phase: the trusted center selects a main private key and stores the main private key in a secret way, and the trusted center sets public parameters, including setting an addition circulation group based on a nonsingular elliptic curve, a generating element, an anti-collision hash function and a main public key of the trusted center;
in this embodiment, the system initialization stage includes the following steps:
(1) Trusted center TA in finite field Z p A non-singular elliptic curve is selected and defined as y 2 =x 3 +ax+b (modp), where the coefficients a, b ε Z p Satisfy 4a 3 +27b 2 (modp) noteq0, the trusted center TA selects q-order addition cyclic group G on the nonsingular elliptic curve, and the generation element is P;
(2) Trusted center TA in finite field Z q Selecting a non-zero random number s as a main private key, and calculating a main public key P pub =s·P;
(3) The trusted center TA sets 5 hash functions for collision resistance: andHere l 1 Is a hash function H 2 Output length of l 2 Is a hash function H 4 Output length of>Is a q-1 factorial cyclic group;
(4) Trusted center TA publishes public parameters params= { G, q, P pub ,H 1 ,H 2 ,H 3 ,H 4 ,H 5 And holds the master private key s in secret.
Registration: the trusted center registers a mobile engineering service end, a data manager and a digital oil and gas field system platform in the digital oil and gas field system; specifically, the mobile engineering server sends the registration certificate of the mobile engineering server to a trusted center for registration, the trusted center generates a signature private key for the mobile engineering server after confirming the identity of the mobile engineering server, and the mobile engineering server takes the signature private key and a secret value generated by the mobile engineering server as a complete private key after receiving the signature private key; the data manager inputs the true identity, the login password and the biological characteristic information of the data manager to the digital oil-gas field system platform, the digital oil-gas field system platform calculates a pseudo password for the data manager, and the data manager sends registration request information to a trusted center through a secure channel; the trusted center issues public and private key pairs for the verified digital oil and gas field system platform, and based on the biological characteristic information of the data manager, the trusted center generates an authentication value by using a fuzzy extraction algorithm and a hash function and sends the authentication value to the digital oil and gas field system platform;
in this embodiment, the mobile engineering server sends the registration credential to the trusted center for registration, and after the trusted center verifies the identity of the mobile engineering server, a signature private key is generated for the mobile engineering server, and after the mobile engineering server receives the signature private key, the specific steps of using the signature private key and the secret value generated by the mobile engineering server as a complete private key are as follows:
(1) Mobile engineering service end E i In the finite field Z q In selecting secret parameter r i Simultaneously calculating registration credentials R i =r i P, sending registration request information { EIDi, ri } over a secure channel to a trusted center TA, wherein EID i Is a mobile engineering service end E i While moving the engineering server E i Secure preservation of secret parameter r i
(2) After receiving the registration request information, the trusted center TA first determines the mobile engineering server E i Whether the registration is successful or not, if so, rejecting the request; otherwise, the trusted center TA is in the finite field Z q In selecting a non-zero random number omega i Calculate the first group element W i =ω i P, calculating mobile engineering server E i Is a signature private key of (a)And to the mobile engineering service end E through the secure channel i Send->
(3) Mobile engineering service end E i After receiving, verify the equationWhether or not it is true, if so, receive the message +.>Mobile engineering service end E i To->As a complete private key, in { W ] i ,R i As a complete public key while preserving the access credential parameter epsilon i =H 1 (W i ||R i ||EID i )。
Wherein, verify the equationThe correctness of (2) is deduced as follows:
the complete private key of the mobile engineering server consists of two parts, wherein one part is a secret value generated by the mobile engineering server and the other part is a signature private key calculated by a trusted center, so that the problem of key escrow is effectively avoided. Thus, even if the trusted center and the malicious mobile engineering server are colluded, the digital signature in the access control cannot be forged, and the malicious mobile engineering server cannot effectively access.
In this embodiment, the data administrator inputs the true identity, the login password and the biological characteristic information of the data administrator to the digital oil and gas field system platform, and the digital oil and gas field system platform calculates a pseudo password for the data administrator and sends registration request information to the trusted center through a secure channel; the trusted center issues public and private key pairs for the verified digital oil and gas field system platform, and based on the biological characteristic information of the data manager, the trusted center generates an authentication value by using a fuzzy extraction algorithm and a hash function and sends the authentication value to the digital oil and gas field system platform, and the specific steps are as follows:
(1) The data manager inputs the real identity DM to the digital oil and gas field system platform j Password theta j Biometric information χ j The digital oil-gas field system platform calculates a first pseudo-password for a data managerAnd transmits the registration request information +/to the trusted center TA via the secure channel>Wherein CP j The true identity of the digital oil and gas field system platform;
(2) The trusted center TA receives the registration request informationFirstly judging whether the corresponding entity is successfully registered, and rejecting the request if the corresponding entity is registered; otherwise, the trusted center TA is the digital oil and gas field system platform CP j In the finite field Z q Is selected from non-zero random numbers +.>As the private key of the digital oil and gas field system platform, calculating the public key of the digital oil and gas field system platformThe trusted center TA generates a first secret value iota using a fuzzy extractor algorithm Gen based on the biometric information of the data administrator j And auxiliary parameter omicron j I.e. (iota) j ,ο j )=Gen(χ j ) Calculate the first authentication value +.>And transmitting four-tuple information to the digital oil and gas field system platform through the secure channel>
The data manager sends the pseudo password to the trusted center TA in the registration stage, and even if the privileged user of the trusted center obtains the pseudo password of the data manager, the true login password cannot be recovered, so that the internal attack of the privileges is prevented.
A login stage: the data manager inputs correct identity information to the digital oil-gas field system platform, and the login password and the current biological characteristic information are legally logged in; the digital oil-gas field system platform performs verification of login information by using a recovery algorithm based on a fuzzy extractor based on the current biological characteristic information; if the verification is correct, the login is successful, otherwise, the login is refused;
in this embodiment, the login stage includes the following steps:
(1) Data manager inputs true identity to digital oil and gas field system platformLogin password->And the current biometric information +.>Logging in;
(2) Calculating a second pseudo password by the digital oil-gas field system platformCalculating a second secret value using a fuzzy extractor based recovery algorithm Rep>And according to the true identity of the data manager +.>Calculate the second authentication value +.>Then the second authentication value +.>With first authentication information alpha pre-stored in a digital oil and gas field system platform j And comparing, if the two values are equal, the login is successful, otherwise, the login is refused.
Anonymous access information generation phase: the mobile engineering server generates a temporary accessed anonymous identity, generates a blinding value and a digital signature aiming at sensitive information, and sends verifiable anonymous access information to the digital oil-gas field system platform;
in this embodiment, the anonymous access information generation stage includes the following steps:
(1) Mobile engineering service end E i Selecting a current timestamp T 1 Calculating temporary anonymous identities
(2) For sensitive access information m to be transmitted i Mobile engineering service end E i In the finite field Z q In selecting a non-zero random number b i Calculate the second group element B i =b i P, compute sensitive access information m i Is a blinding value of (2)Generating a digital signature->Mobile engineering service end E i Sending verifiable anonymous access information A to digital oil-gas field system platform i ={PID iiii ,B i ,T 1 }。
When the mobile engineering server sends a request each time, a new time stamp and a new random number are generated, different temporary anonymous identities are generated, replay attack is effectively prevented, and unlinkability is realized. And the sensitive access information is subjected to blinding processing by using the newly generated time stamp and the random number, so that the privacy data is effectively protected. The mobile engineering server uses the private signature key and the secret parameter as the complete private key, and in the message transmission process, the adversary can forge the digital signature of the message only by knowing the corresponding private key, thereby effectively resisting man-in-the-middle attack.
Access control phase: after receiving the verifiable anonymous access information, the digital oil-gas field system platform firstly judges the validity of the current message by using a timestamp, then restores the original sensitive information to the blinded value in the effective time, and verifies the validity of the digital signature; if so, allowing the legal access of the mobile engineering server; if not, submitting the verifiable anonymous access information to a trusted center, recovering the true identity, and rejecting the mobile engineering server to access;
in this embodiment, the access control stage includes the following steps:
(1) The digital oil-gas field system platform receives verifiable anonymous access information A i ={PID iiii ,B i ,T 1 After } the current timestamp T is obtained 1 ' through |T 1 -T 1 ' delta T is smaller than delta T, wherein delta T is the upper limit of the minimum time difference, the validity of the current message is judged, if invalid, the message is discarded, if yes, the next step is carried out;
(2) Restoring original sensitive access information by digital oil-gas field system platformValidation equation sigma i ·P=(W i +P pub ε i +R i )H 5 (T 1 ||PID i ||m i )+B i Whether or not it is true, if so, receiving a message m i Digital oil and gas field system platform allows mobile engineering service end E i Legal data access is carried out; if not, the digital oil and gas field system platform accesses information A from verifiable anonymity i ={PID iiii ,B i ,T 1 Extracting anonymous identity PID from } i And submitted to a trusted center TA, which recovers the unauthorized access mobile engineering server E i Is true of the identity of (2)
Wherein, when receiving verifiable anonymous access information A sent by a mobile engineering server i ={PID iiii ,B i ,T 1 After } the digital oil and gas field system platform can realize the verification of the validity of the digital oil and gas field system platform, and the correctness of the verification equation is deduced as follows:
when the mobile engineering server communicates with the system platform, the mobile engineering server uses the anonymous identity, and only the trusted center can decrypt the anonymous identity by using the system master private key to recover the real identity, thereby realizing conditional access control on the malicious mobile engineering server.
Password updating stage: the data manager inputs correct identity information to the digital oil-gas field system platform, and the original login password and the current biological characteristic information are legally logged in; if the login is successful, the data manager can change the login password of the data manager, and the digital oil-gas field system platform recalculates the pseudo password and the new authentication value for the data manager and updates the related parameters.
In this embodiment, the password updating stage includes the following steps:
(1) If the data manager wants to change the password theta j The method comprises the steps that firstly, original information of the user is used for logging in a digital platform, and if the logging is successful, a digital oil-gas field system platform allows a data administrator to change a password;
(2) The data manager inputs the true identity and the biological characteristics { DM ] to the digital oil and gas field system platform jj -and new passwordDigital oil-gas field system platform for calculating pseudo password +.>Again according to the biological characteristic information χ j Calculating a first secret value iota by using a recovery algorithm Rep of the fuzzy extractor j I.e. iota j =Rep(χ j ,ο j ) After that, a third authentication value is calculated>And updates its own parameters.
According to the anonymous access control method based on the digital oil-gas field system platform, identity authentication among entities in the digital oil-gas field system platform is achieved through a safe and efficient authentication mechanism, safe access of the system platform is guaranteed, and authorized access of communication information is guaranteed.
The foregoing is merely a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein but is not to be construed as excluding other embodiments, but is capable of numerous other combinations, modifications and environments and is capable of modifications within the scope of the inventive concept, either as taught or as a matter of routine skill or knowledge in the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.

Claims (8)

1. The anonymous access control method based on the digital oil-gas field system platform is characterized by comprising the following steps of: comprising the following stages:
system initialization phase: the trusted center selects a main private key and stores the main private key in a secret way, and the trusted center sets public parameters, including setting an addition circulation group based on a nonsingular elliptic curve, a generating element, an anti-collision hash function and a main public key of the trusted center;
registration: the trusted center registers a mobile engineering service end, a data manager and a digital oil and gas field system platform in the digital oil and gas field system; specifically, the mobile engineering server sends the registration certificate of the mobile engineering server to a trusted center for registration, the trusted center generates a signature private key for the mobile engineering server after confirming the identity of the mobile engineering server, and the mobile engineering server takes the signature private key and a secret value generated by the mobile engineering server as a complete private key after receiving the signature private key; the data manager inputs the true identity, the login password and the biological characteristic information of the data manager to the digital oil-gas field system platform, the digital oil-gas field system platform calculates a pseudo password for the data manager, and the data manager sends registration request information to a trusted center through a secure channel; the trusted center issues public and private key pairs for the verified digital oil and gas field system platform, and based on the biological characteristic information of the data manager, the trusted center generates an authentication value by using a fuzzy extraction algorithm and a hash function and sends the authentication value to the digital oil and gas field system platform;
a login stage: the data manager inputs correct identity information to the digital oil-gas field system platform, and the login password and the current biological characteristic information are legally logged in; the digital oil-gas field system platform performs verification of login information by using a recovery algorithm based on a fuzzy extractor based on the current biological characteristic information; if the verification is correct, the login is successful, otherwise, the login is refused;
anonymous access information generation phase: the mobile engineering server generates a temporary accessed anonymous identity, generates a blinding value and a digital signature aiming at sensitive information, and sends verifiable anonymous access information to the digital oil-gas field system platform;
access control phase: after receiving the verifiable anonymous access information, the digital oil-gas field system platform firstly judges the validity of the current message by using a timestamp, then restores the original sensitive information to the blinded value in the effective time, and verifies the validity of the digital signature; if so, allowing the legal access of the mobile engineering server; if not, submitting the verifiable anonymous access information to a trusted center, recovering the true identity, and rejecting the mobile engineering server to access;
password updating stage: the data manager inputs correct identity information to the digital oil-gas field system platform, and the original login password and the current biological characteristic information are legally logged in; if the login is successful, the data manager can change the login password of the data manager, and the digital oil-gas field system platform recalculates the pseudo password and the new authentication value for the data manager and updates the related parameters.
2. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 1, wherein: the system initialization stage comprises the following steps:
(1) Trusted center TA in finite field Z p A non-singular elliptic curve is selected and defined as y 2 =x 3 +ax+b (mod p), where the coefficients a, b ε Z p Satisfy 4a 3 +27b 2 (mod P) noteq0, the trusted center TA selects a q-order addition cyclic group G on the nonsingular elliptic curve, and the generation element is P;
(2) Trusted center TA in finite field Z q Selecting a non-zero random number s as a main private key, and calculating a main public key P pub =s·P;
(3) The trusted center TA sets 5 hash functions for collision resistance: andHere l 1 Is a hash function H 2 Output length of l 2 Is a hash function H 4 Output length of>Is a q-1 factorial cyclic group;
(4) Trusted center TA publishes public parameters params= { G, q, P pub ,H 1 ,H 2 ,H 3 ,H 4 ,H 5 And secret to preserve the master privateAnd a key s.
3. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 2, wherein: the mobile engineering server sends the registration certificate to the trusted center for registration, the trusted center generates a signature private key for the mobile engineering server after confirming the identity of the mobile engineering server, and the mobile engineering server receives the signature private key and takes the signature private key and a secret value generated by the mobile engineering server as a complete private key, and the specific steps are as follows:
(1) Mobile engineering service end E i In the finite field Z q In selecting secret parameter r i Simultaneously calculating registration credentials R i =r i P sending registration request information { EID over secure channel to trusted center TA i ,R i }, wherein EID i Is a mobile engineering service end E i While moving the engineering server E i Secure preservation of secret parameter r i
(2) After receiving the registration request information, the trusted center TA first determines the mobile engineering server E i Whether the registration is successful or not, if so, rejecting the request; otherwise, the trusted center TA is in the finite field Z q In selecting a non-zero random number omega i Calculate the first group element W i =ω i P, calculating mobile engineering server E i Is a signature private key of (a)And to the mobile engineering service end E through the secure channel i Send->
(3) Mobile engineering service end E i After receiving, verify the equationWhether or not it is true, if so, receive the message +.>Mobile engineering service end E i To->As a complete private key, in { W ] i ,R i As a complete public key while preserving the access credential parameter epsilon i =H 1 (W i ||R i ||EID i )。
4. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 3, wherein: the data manager inputs the true identity, the login password and the biological characteristic information of the data manager to the digital oil-gas field system platform, the digital oil-gas field system platform calculates a pseudo password for the data manager, and the data manager sends registration request information to the trusted center through a secure channel; the trusted center issues public and private key pairs for the verified digital oil and gas field system platform, and based on the biological characteristic information of the data manager, the trusted center generates an authentication value by using a fuzzy extraction algorithm and a hash function and sends the authentication value to the digital oil and gas field system platform, and the specific steps are as follows:
(1) The data manager inputs the real identity DM to the digital oil and gas field system platform j Password theta j Biometric information χ j The digital oil-gas field system platform calculates a first pseudo-password for a data managerAnd transmits the registration request information +/to the trusted center TA via the secure channel>Wherein CP j The true identity of the digital oil and gas field system platform;
(2) The trusted center TA receives the registration request informationFirstly judging whether the corresponding entity is successfully registered, and rejecting the request if the corresponding entity is registered; otherwise, the trusted center TA is the digital oil and gas field system platform CP j In the finite field Z q Is selected from non-zero random numbers +.>As the private key of the digital oil and gas field system platform, calculating the public key of the digital oil and gas field system platformThe trusted center TA generates a first secret value iota using a fuzzy extractor algorithm Gen based on the biometric information of the data administrator j And auxiliary parameter omicron j I.e. (iota) j ,ο j )=Gen(χ j ) Calculate the first authentication value +.>And transmitting four-tuple information to the digital oil and gas field system platform through the secure channel>
5. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 4, wherein: the login stage comprises the following steps:
(1) Data manager inputs true identity to digital oil and gas field system platformLogin password->And the current biometric information +.>Logging in;
(2) Calculating a second pseudo password by the digital oil-gas field system platformCalculating a second secret value using a fuzzy extractor based recovery algorithm Rep>And according to the true identity of the data manager +.>Calculate the second authentication value +.>Then the second authentication value +.>With first authentication information alpha pre-stored in a digital oil and gas field system platform j And comparing, if the two values are equal, the login is successful, otherwise, the login is refused.
6. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 5, wherein: the anonymous access information generation stage comprises the following steps:
(1) Mobile engineering service end E i Selecting a current timestamp T 1 Calculating temporary anonymous identities
(2) For sensitive access information m to be transmitted i Mobile engineering service end E i In the finite field Z q In selecting a non-zero random number b i Calculate the second group element B i =b i P, compute sensitive access information m i Is a blinding value of (2)Generating a digital signature->Mobile engineering service end E i Sending verifiable anonymous access information A to digital oil-gas field system platform i ={PID iiii ,B i ,T 1 }。
7. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 6, wherein: the access control stage comprises the following steps:
(1) The digital oil-gas field system platform receives verifiable anonymous access information A i ={PID iiii ,B i ,T 1 After } the current timestamp T is obtained 1 ' through |T 1 -T 1 ' delta T is smaller than delta T, wherein delta T is the upper limit of the minimum time difference, the validity of the current message is judged, if invalid, the message is discarded, if yes, the next step is carried out;
(2) Restoring original sensitive access information by digital oil-gas field system platformValidation equation sigma i ·P=(W i +P pub ε i +R i )H 5 (T 1 ||PID i ||m i )+B i Whether or not it is true, if so, receiving a message m i Digital oil and gas field system platform allows mobile engineering service end E i Legal data access is carried out; if not, the digital oil and gas field system platform accesses information A from verifiable anonymity i ={PID iiii ,B i ,T 1 Extracting anonymous identity PID from } i And submitted to a trusted center TA, which recovers the unauthorized access mobile engineering server E i Is->
8. The anonymous access control method based on the digital oil and gas field system platform as set forth in claim 7, wherein: the password updating stage comprises the following steps:
(1) If the data manager wants to change the password theta j The method comprises the steps that firstly, original information of the user is used for logging in a digital platform, and if the logging is successful, a digital oil-gas field system platform allows a data administrator to change a password;
(2) The data manager inputs the true identity and the biological characteristics { DM ] to the digital oil and gas field system platform jj -and new passwordDigital oil-gas field system platform for calculating pseudo password +.>Again according to the biological characteristic information χ j Calculating a first secret value iota by using a recovery algorithm Rep of the fuzzy extractor j I.e. iota j =Rep(χ j ,ο j ) After that, a third authentication value is calculated>And updates its own parameters.
CN202311565640.2A 2023-11-22 2023-11-22 Anonymous access control method based on digital oil-gas field system platform Active CN117411718B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311565640.2A CN117411718B (en) 2023-11-22 2023-11-22 Anonymous access control method based on digital oil-gas field system platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311565640.2A CN117411718B (en) 2023-11-22 2023-11-22 Anonymous access control method based on digital oil-gas field system platform

Publications (2)

Publication Number Publication Date
CN117411718A true CN117411718A (en) 2024-01-16
CN117411718B CN117411718B (en) 2024-08-09

Family

ID=89490901

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311565640.2A Active CN117411718B (en) 2023-11-22 2023-11-22 Anonymous access control method based on digital oil-gas field system platform

Country Status (1)

Country Link
CN (1) CN117411718B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190289006A1 (en) * 2016-12-02 2019-09-19 Alibaba Group Holding Limited Recording and Verification Method and Apparatus of Internet of Things Device, and Identity Authentication Method and Apparatus
US20210367765A1 (en) * 2020-05-19 2021-11-25 SuperAwesome Trading Limited System and method for registering a user
CN114422106A (en) * 2022-03-28 2022-04-29 科大天工智能装备技术(天津)有限公司 Internet of things system security authentication method and system under multi-server environment
WO2023147785A1 (en) * 2022-02-07 2023-08-10 南京理工大学 Internet-of-vehicles communication security authentication method, system and device based on national cryptographic algorithm
CN116707791A (en) * 2023-06-21 2023-09-05 西南石油大学 Distributed authentication key negotiation method in intelligent vehicle-mounted networking system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190289006A1 (en) * 2016-12-02 2019-09-19 Alibaba Group Holding Limited Recording and Verification Method and Apparatus of Internet of Things Device, and Identity Authentication Method and Apparatus
US20210367765A1 (en) * 2020-05-19 2021-11-25 SuperAwesome Trading Limited System and method for registering a user
WO2023147785A1 (en) * 2022-02-07 2023-08-10 南京理工大学 Internet-of-vehicles communication security authentication method, system and device based on national cryptographic algorithm
CN114422106A (en) * 2022-03-28 2022-04-29 科大天工智能装备技术(天津)有限公司 Internet of things system security authentication method and system under multi-server environment
CN116707791A (en) * 2023-06-21 2023-09-05 西南石油大学 Distributed authentication key negotiation method in intelligent vehicle-mounted networking system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨梅;: "利用公钥改进的kerberos设计校园网认证机制", 技术与市场, no. 11, 15 November 2010 (2010-11-15) *

Also Published As

Publication number Publication date
CN117411718B (en) 2024-08-09

Similar Documents

Publication Publication Date Title
CN111294352B (en) Data security authentication method between cloud and edge node
US7992193B2 (en) Method and apparatus to secure AAA protocol messages
US7945779B2 (en) Securing a communications exchange between computers
EP1359491A1 (en) Methods for remotely changing a communications password
US20100217975A1 (en) Method and system for secure online transactions with message-level validation
CN108173827B (en) Block chain thinking-based distributed SDN control plane security authentication method
US20200127838A1 (en) Persistent authentication system incorporating one time pass codes
CN113395166B (en) Edge computing-based power terminal cloud edge terminal collaborative security access authentication method
CN108632251B (en) Credible authentication method based on cloud computing data service and encryption algorithm thereof
Badra et al. Phishing attacks and solutions
CN116707791A (en) Distributed authentication key negotiation method in intelligent vehicle-mounted networking system
Huang et al. A token-based user authentication mechanism for data exchange in RESTful API
CN113727296A (en) Anonymous privacy protection authentication protocol method based on wireless sensor system in intelligent medical treatment
CN114070559A (en) Industrial Internet of things session key negotiation method based on multiple factors
CN115834211A (en) CoAP network security access method based on software defined boundary
CN113518083A (en) Lightweight security authentication method and device based on device fingerprint and PUF
CN107979466B (en) iSCSI protocol security enhancement method based on Diffie-Hellman protocol
CN115955320B (en) Video conference identity authentication method
CN115865520B (en) Authentication and access control method with privacy protection in mobile cloud service environment
CN117411718B (en) Anonymous access control method based on digital oil-gas field system platform
CN115883105A (en) Authentication connection method, system, electronic device and computer storage medium
CN114598454B (en) Key generation and identity authentication method, device, equipment and computer storage medium
CN113347157B (en) Web application encryption system and method based on SM series encryption algorithm
CN112689283B (en) Key protection and negotiation method, system and storage medium
CN115499209A (en) Identity authentication method based on industrial control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant