TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]
Shang WL(尚文利); Zeng P(曾鹏); Yin L(尹隆); Chen CY(陈春雨); Zhao JM(赵剑明); Liu XD(刘贤达)
2020-05-07
著作权人SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES
国家世界专利组织
文献子类发明
产权排序1
英文摘要The present invention relates to a trusted authentication method employing two cryptographic values and chaotic encryption in a measurement and control network. The method specifically uses, on the basis of a trust chain constructed by means of trusted computing to realize a secure and trusted operation environment, two cryptographic values and chaotic public key cryptography to realize identity authentication and key agreement processes, and achieves the secure transmission and verification of a user identity certificate, thereby constructing a secure and trusted data transmission channel. The identity authentication method in the present invention comprises the steps such as securely generating a user identifier, reading a protective packaging, performing secure transmission, and performing key agreement, and each step employs a unique and secure cryptographic function to perform secure data generation, thereby ensuring security of authenticating device access in an industrial measurement and control network.
申请日期2019-02-21
语种英语
状态公开
内容类型专利
源URL[http://ir.sia.cn/handle/173321/27192]  
专题沈阳自动化研究所_工业控制网络与系统研究室
作者单位SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES
推荐引用方式
GB/T 7714
Shang WL,Zeng P,Yin L,et al. TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]. 2020-05-07.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace