TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]
文献类型:专利
| 作者 | Shang WL(尚文利) ; Zeng P(曾鹏) ; Yin L(尹隆); Chen CY(陈春雨) ; Zhao JM(赵剑明) ; Liu XD(刘贤达)
|
| 发表日期 | 2020-05-07 |
| 著作权人 | SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES |
| 国家 | 世界专利组织 |
| 文献子类 | 发明 |
| 产权排序 | 1 |
| 英文摘要 | The present invention relates to a trusted authentication method employing two cryptographic values and chaotic encryption in a measurement and control network. The method specifically uses, on the basis of a trust chain constructed by means of trusted computing to realize a secure and trusted operation environment, two cryptographic values and chaotic public key cryptography to realize identity authentication and key agreement processes, and achieves the secure transmission and verification of a user identity certificate, thereby constructing a secure and trusted data transmission channel. The identity authentication method in the present invention comprises the steps such as securely generating a user identifier, reading a protective packaging, performing secure transmission, and performing key agreement, and each step employs a unique and secure cryptographic function to perform secure data generation, thereby ensuring security of authenticating device access in an industrial measurement and control network. |
| 申请日期 | 2019-02-21 |
| 语种 | 英语 |
| 状态 | 公开 |
| 源URL | [http://ir.sia.cn/handle/173321/27192] ![]() |
| 专题 | 沈阳自动化研究所_工业控制网络与系统研究室 |
| 作者单位 | SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES |
| 推荐引用方式 GB/T 7714 | Shang WL,Zeng P,Yin L,et al. TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]. 2020-05-07. |
入库方式: OAI收割
来源:沈阳自动化研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。

