A two-way anonymous authentication system and method based on the principle of mimic defense

An anonymous authentication and anonymous authentication protocol technology, applied in the field of two-way anonymous authentication system, can solve the problems of DAA anonymous authentication unable to carry out active defense and poor network information security.

Active Publication Date: 2020-12-04
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Technical purpose: In view of the defects in the prior art that DAA anonymous authentication cannot be actively defended and the security of network information is poor, the present invention discloses a two-way anonymous authentication system and method based on the principle of mimic defense, using DAA two-way anonymous authentication technology, Adding a mimic module in the signature detection side, while realizing remote anonymous authentication of the underlying devices connected to the Internet of Things network, at the same time ensuring the access security of the Internet of Things devices at the technical architecture level, with "high reliability, high credibility, high "Available" trinity attribute to ensure the security of the IoT system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-way anonymous authentication system and method based on the principle of mimic defense
  • A two-way anonymous authentication system and method based on the principle of mimic defense
  • A two-way anonymous authentication system and method based on the principle of mimic defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The invention discloses a two-way anonymous authentication system and method based on the principle of mimicry defense. The scheme will be further described and explained below in conjunction with the accompanying drawings.

[0055] The symbols and their definitions used in this scheme are shown in Table 1;

[0056]

[0057] This solution includes the issuer of the certificate, the signer of the signer, and the verifier of the signature detector. The signer is also called the platform platform, and the platform platform can be divided into: the host host and the trusted computing platform module TPM.

[0058] The basic principles involved in this scheme are as follows:

[0059] 1), CL signature: CL signature is Camenisch-Lysyanskaya signature, which is used in the scenario of group signature or aggregate signature, which can improve the anonymity of signature and reduce the computational complexity of signature. CL signature is also a signature scheme suitable for z...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bidirectional anonymous authentication system and method based on a mimicry defense principle, and is applied to the technical field of information security. The method comprises the steps that a certificate issuer is initialized; a Join sub-protocol runs between a platform and the certificate publisher; the platform operates a Sign sub-protocol between the TPM and the Host; and a signature detection party operates the Verify sub-protocol through a heterogeneous executive body. According to the invention, a DAA bidirectional anonymous authentication technology is adopted; a mimicry module is added in the signature detection party; while remote anonymous authentication of the underlying equipment accessing the Internet of Things network is realized, the endogenoussecurity function of the mimicry module can effectively resist any security threat implemented by using a known and unknown software and hardware vulnerability back door in a target system, so that the access security of the Internet of Things equipment is ensured at the technical architecture level, the three-in-one attribute of high reliability, high credibility and high availability is achieved, and the security of the Internet of Things system is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a two-way anonymous authentication system and method based on the principle of mimic defense. Background technique [0002] At present, the Internet of Things is developing rapidly, and more and more Internet of Things devices are put into use. At the same time, considering the intelligent process of the Internet of Things, the computing power of terminal devices will also develop rapidly compared with the original RFID. With the improvement of computing power, the work undertaken by terminal devices is also developing in a more complex and sensitive direction. More and more sensitive data will be collected and analyzed by these devices to complete corresponding tasks. More criminals will focus on these sensitive data and try to collect them for ulterior purposes. Therefore, the security of the IoT system will also face increasingly severe tests. It will be a long-t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L9/3268H04L63/0421H04L63/0823H04L63/0869H04L63/1483
Inventor 郁晨赵海宁羊子煜王泽雨陈垚陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products