Identity-based authentication method for space-based network
An authentication method and network technology, applied in user identity/authority verification and key distribution, can solve the problems of high requirements for computing and storage capacity, limited storage capacity of ground terminals, and high overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0113] figure 1 It is an overall flowchart of the present invention; the present invention comprises the following steps:
[0114] The first step is to build an identity-based authentication system for space-based networks. like figure 2 As shown, the identity-based authentication system for space-based networks consists of three types of network entities: ground terminals (denoted as TE), key generation centers (denoted as KGC), and low-orbit satellites (denoted as LEO). The KGC is connected to multiple TEs and LEOs through wireless links.
[0115] Before mutual authentication between TE and LEO, KGC uses an identity-based signature scheme with message recovery proposed by Kyung-Ah Shim (see Shim K-A. Basis: A Practical Multi-User Broadcast Authentication Scheme for Wireless Sensor Networks[J] .IEEE Information Forensics and Security Transactions.2017,PP:1-1.The English literature index is Shim K-A.BASIS:APractical Multi-User Broadcast Authentication Scheme in Wireless Se...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com