TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]
文献类型:专利
作者 | Shang WL(尚文利)![]() ![]() ![]() ![]() ![]() |
发表日期 | 2020-05-07 |
著作权人 | SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES |
国家 | 世界专利组织 |
文献子类 | 发明 |
产权排序 | 1 |
英文摘要 | The present invention relates to a trusted authentication method employing two cryptographic values and chaotic encryption in a measurement and control network. The method specifically uses, on the basis of a trust chain constructed by means of trusted computing to realize a secure and trusted operation environment, two cryptographic values and chaotic public key cryptography to realize identity authentication and key agreement processes, and achieves the secure transmission and verification of a user identity certificate, thereby constructing a secure and trusted data transmission channel. The identity authentication method in the present invention comprises the steps such as securely generating a user identifier, reading a protective packaging, performing secure transmission, and performing key agreement, and each step employs a unique and secure cryptographic function to perform secure data generation, thereby ensuring security of authenticating device access in an industrial measurement and control network. |
申请日期 | 2019-02-21 |
语种 | 英语 |
状态 | 公开 |
源URL | [http://ir.sia.cn/handle/173321/27192] ![]() |
专题 | 沈阳自动化研究所_工业控制网络与系统研究室 |
作者单位 | SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES |
推荐引用方式 GB/T 7714 | Shang WL,Zeng P,Yin L,et al. TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN]. 2020-05-07. |
入库方式: OAI收割
来源:沈阳自动化研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。