Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed identity-card signature method

A certificate issuance and distributed technology, applied in the field of distributed identity certificate issuance, can solve the problems of reducing the use efficiency of identity certificates, leaking confidential information of certificates, and invalidation.

Active Publication Date: 2007-01-17
HUAWEI TECH CO LTD +1
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, during identity authentication, once the certificate is presented, the confidential information of the certificate will be leaked and become invalid, reducing the use efficiency of the identity certificate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed identity-card signature method
  • Distributed identity-card signature method
  • Distributed identity-card signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The process of the method proposed by the present invention is as follows: firstly, the network completes the network initialization in an offline state, determines the authorized node, and issues an identity certificate for the authorized node, and generates and distributes an identity certificate for issuing a new node and completes the identity authentication process at the same time The required parameters; after the initialization is completed, the new node initiates the identity certificate issuance process to the trust group, and the new node selects any t authorized nodes that agree to participate in the identity certificate issuance to form the identity certificate issuance group, and the authorization in the identity certificate issuance group Nodes generate group signatures in a hop-by-hop manner; finally, new nodes generate identity certificates based on the group signatures of the identity certificate issuing group, and then nodes in the network that have iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: new node initiates an identification letter issuing request to all authorization node; after receiving the responses for agreeing to participate in issuing identification letter from at least t authorization nodes, the new node selects t authorization nodes from them; the selected authorization nodes use a hop-by-hop signature approach to incorporate with the new node to generate the group signature and to generate identification letter.

Description

technical field [0001] The invention relates to network security technology, in particular to a distributed identity certificate issuing method. Background technique [0002] Mobile ad hoc network (Mobile Ad hoc Network, MANET) is a special mobile network without the support of wired infrastructure. It is composed of a group of mobile terminals with wireless transceivers. autonomous network. Therefore, it has characteristics that general communication networks do not have, such as self-organization of the network, dynamic network topology, limited wireless transmission bandwidth, limitations of mobile terminals, multi-hop routing, and vulnerability to attacks, etc. [0003] The identity authentication of mobile nodes in mobile ad hoc networks is an important part of ensuring the normal operation of the network, and identity authentication can effectively prevent counterfeiting attacks. Traditional networks usually require a trusted authentication center to provide identity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
Inventor 姚军曾贵华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products