Multivariate identity authentication method and system for power grid data outsourcing calculation

A technology of identity authentication and data outsourcing, which is applied in the field of multiple identity authentication methods and systems, can solve problems such as being vulnerable to viruses, Trojan horses, identity counterfeiting, client platform access to the network, user network threats, etc., to achieve true and effective identities, ease Network security pressure, the effect of ensuring security

Pending Publication Date: 2021-10-01
SHENZHEN POWER SUPPLY BUREAU
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The traditional identity authentication technology lacks the identity authentication of the client during the hardware start-up stage of the user client platform, and there is a phenomenon of unauthorized client platform accessing the network, which brings potential threats to the user network
[0006] (2) The traditional identity authentication technology relies on the operating system, and the software authentication method using digital certificates is vulnerable to malicious attacks such as viruses, Trojan horses, and identity counterfeiting, and there is a risk of being bypassed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multivariate identity authentication method and system for power grid data outsourcing calculation
  • Multivariate identity authentication method and system for power grid data outsourcing calculation
  • Multivariate identity authentication method and system for power grid data outsourcing calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following descriptions of various embodiments refer to the accompanying drawings to illustrate specific embodiments in which the present invention can be implemented.

[0055] Please also refer to figure 1 and figure 2 As shown, Embodiment 1 of the present invention provides a multi-identity authentication method for power grid data outsourcing calculation, including:

[0056] Step S1, simultaneously collect multiple biometric information of the user through the biometric information collection device and send them to the identity authentication server, and the identity authentication server will verify the biometric information; Verification, if the verification is successful, an application token for the user to access the privacy computing server is generated to complete the identity authentication of the user;

[0057] Step S2, the power grid data computing entrusting party and the computing party generate a session key by continuously exchanging intermediate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multivariate identity authentication method and system for power grid data outsourcing calculation, and the method comprises the steps: collecting various biological information of a user at the same time through a biological information collection device, transmitting the biological information to an identity authentication server, and carrying out the identity authentication of the user through the identity authentication server; enabling a calculation entrusting party and a calculation party of the power grid data to generate a session key in a mode of continuously exchanging intermediate values through a PAKE protocol, and encrypting and decrypting transmission data by using the session key to complete identity authentication between the calculation entrusting party and the calculation party; performing authentication verification on the power grid data needing to be subjected to outsourcing calculation, and performing authentication verification on a calculation result by a calculation entrusting party when a calculation party returns the calculation result; and enabling the encryption machine to write the IP address of the privacy computing server into the IP white list, and completing authentication of the privacy computing server. The method is compatible with various authentication requirements of personnel, equipment, systems, data and the like, and ensures the safety of power consumption data outsourcing calculation.

Description

technical field [0001] The invention relates to the technical field of grid data security, in particular to a multi-identity authentication method and system for outsourcing calculation of grid data. Background technique [0002] Cloud computing has attracted more and more attention in academia and industry, and outsourced computing is one of the most important applications in cloud computing. A customer with limited computing power outsources the task to one or more servers in the cloud, which is outsourced computing, and can also outsource the task to a supercomputing center with sufficient computing power. Outsourced computing has high security requirements. It is necessary to ensure that the customer's information will not be leaked, and the correct calculation can be realized, and the customer needs to be able to verify the calculation results. In the overall process of outsourcing computing, the identity authentication of users, equipment, systems and data is also a k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06F21/32G06F21/33G06F21/44H04L29/06
CPCG06F21/6245G06F21/604G06F21/602G06F21/32G06F21/33G06F21/44H04L63/0807H04L63/083H04L63/0861H04L63/101Y04S40/20
Inventor 谢宏宁柏锋麦竣朗
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products