Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Broadcast authentication" patented technology

EFFICIENT TECHNIQUE TO ACHIEVE NON-REPUDIATION AND RESILIENCE TO DoS ATTACKS IN WIRELESS NETWORKS

A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature.
Owner:GM GLOBAL TECH OPERATIONS LLC

Efficient message authentication method for vehicular ad hoc network based on edge computing

The invention discloses an efficient message authentication method for a vehicular ad hoc network based on edge computing, which comprises the steps of system initialization of participating entitiesof the Internet of vehicles, wherein the step comprises two processes such as parameter generation and vehicle pseudonym and signature generation; and (2) message authentication of an RSU (Roadside Unit) and a vehicle, wherein the step comprises four processes such that the RSU elects an edge computing vehicle (ECV), the ECV executes a task, the RSU checks an authentication result of the ECV and vehicle message authentication is performed. The signing portion of the invention adopts an elliptic curve cryptography based operation, thereby enabling the computation and transmission overhead to below; further the ECV is elected according to a fuzzy logic control theory to achieve local optimal election; the ECV is set to help the RSU to achieve quick and accurate message signature authentication; and the RSU reduces the redundant authentication of the whole system to the maximum extent through broadcasting the authentication result, and the operating efficiency of the whole vehicular ad hoc network is improved.
Owner:ANHUI UNIVERSITY

RTMP protocol-based streaming media service user authentication method

The invention discloses an RTMP protocol-based streaming media service user authentication method. Before a video server provides video service, legitimacy of a user identity is verified via an authentication server firstly; the access authority of the user is then verified, the video service is only provided for the user with enough access authority, and an illegal user request or a user request with not enough authority is denied; and finally, encrypted transmission is carried out on the video streaming data, and the user can be prevented from acquiring and spreading the video content in a downloading mode. Through the above means, streaming media resources can be ensured to be used by legal user groups only, an illegal video request is denied, the video resources can be ensured to be reasonably used, and the processing pressure of the video server is reduced at the same time. Reliability and confidentiality of streaming media video on demand and live broadcast authentication can be realized, safety of the network streaming media management can be improved significantly, and an extremely important practical significance is provided for development of the network streaming media safety technology.
Owner:HANGZHOU SHISHUO EDUCATION TECH CO LTD

Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks

A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature.
Owner:GM GLOBAL TECH OPERATIONS LLC

Method for broadcast authentication of wireless sensor network based on automaton and game of life

The invention discloses a method for the broadcast authentication of a wireless sensor network based on an automaton and a game of life, which aims at the problems of limitations to coverage and special network traffic distribution of a base station in the authentication of the wireless sensor network which has relatively more hidden dangers due to own characteristics. By the method, the coverageof the base station can be expanded to realize the broadcast of nodes of the whole network, and the distributional pattern of the network traffic of the wireless sensor network (WSN) is simulated. The broadcast authentication of the wireless sensor network is realized mainly by combining a plurality of ways such as an improved deterministic finite automaton, a clustering algorithm, a game of lifealgorithm and the like. A specific technical scheme and specific steps and flows are designed. The method is remarkably distinguished from the conventional broadcast authentication method used for the WSN, and is advanced in the aspects of communication ranges of nodes of the base station, the rational allocation of node energy in the network, the simulation of a network traffic pattern, and the like.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method for automatically establishing connection of mobile network and terminal

Disclosed are a method for a mobile network to automatically establish a connection, and a terminal, which can solve the problems of a complex operation and a low efficiency due to the fact that, in the process of network connection between an access point terminal and other terminals, a user is required to manually set a lot of information and operations to complete this network connection process. In the technical solution of the present invention, an access point terminal can broadcast authentication information which is needed for accessing other terminals to the network connection. After receiving the broadcast, other terminals can acquire the authentication information from the broadcasted information and then establish a network connection with the terminal which sends the broadcast, according to the acquired authentication information. The present invention is mainly applied to the process of establishing a network connection between terminal devices.
Owner:HUAWEI TECH CO LTD

AP failure processing method, AP device and AC device

The invention provides an AP failure processing method, an AP device and an AC device. The method includes the first step of sending a wireless radio authentication message in case of failure of obtaining an IP address, the second step of sending an association request message to an AC through an neighboring AP when an authentication response message sent by the AC and transferred by the neighboring AP through the wireless network is received, wherein the authentication response message is sent aiming at a broadcasting authentication message, the third step of receiving an association response message sent by the AC and transferred by the neighboring AP through the wireless network, wherein the association response message contains an IP address distributed by the AC, and the fourth step of using the IP address to send a fault information message to the AC through the neighboring AP. According to the technical scheme, a fault AP can be quickly found and located.
Owner:NEW H3C TECH CO LTD

Method for realizing voice broadcast authentication and cloud authentication server

InactiveCN105323251APrevent snooping and stealingEnsure safetyUser identity/authority verificationUser inputPassword
The invention discloses a method for realizing voice broadcast authentication and a cloud authentication server thereof, and belongs to the field of information security. The method comprises the following steps: when receiving a broadcast request, the cloud authentication server obtains a corresponding seed key and a user terminal identification code according to user information in the broadcast request, calculates the seed key to generate a first dynamic password and sends the first dynamic password to a voice broadcast platform according to the user terminal identification code to be broadcasted; and when receiving an authentication request, the cloud authentication server obtains a corresponding seed key according to user information in the authentication request, and calculates the seed key to generate a second dynamic password, and when the first dynamic password input by a user is matched with the second dynamic password in the authentication request, the authentication is successful. By adopting the method in the technical scheme of the invention, the generated dynamic password can be broadcasted to the user by the voice broadcast platform, and the dynamic password is prevented from being spied and stolen after being generated, so that the authentication security is guaranteed.
Owner:FEITIAN TECHNOLOGIES

Broadcast authentication method for wireless network with limited node resource

ActiveCN101877690AReduce broadcast authentication overheadImprove undo efficiencySpecial service provision for substationUser identity/authority verificationParameter distributionBroadcasting
The invention provides a broadcast authentication method for a wireless network with a limited node resource. The method comprises the following steps that: 1), a protocol is initialized; 2), a broadcast node (BNode) requests a mu TESLA parameter chain to a back server (BServer); 3), a receiving node (RNode) authenticates the broadcast node (BNode); 4), the broadcast node (BNode) distributes mu TESLA parameters; and 5), the receiving node (RNode) authenticates the broadcast information of the broadcast node (BNode). On the basis of a one-way chain and a Merkle tree mechanism, and by constructing the mu TESLA parameter chain mu TPC and mu TPC tree mu TPCT, the broadcast authentication method realizes safe and highly efficient mu TESLA parameter distribution, improves the tree-based mu TESLA method, is more suitable for the broadcast authentication for the wireless network of which the node resource is limited, can resist DoS attacks in the mu TESLA parameter distribution process, has low calculation, communication and storage costs, can immediately eliminate authentication capacity of a captured node, and is applied to the large-scale wireless network with a plurality of broadcast nodes.
Owner:CHINA IWNCOMM

Information processing system, information processing apparatus, information processing method, and recording medium

ActiveUS20170318002A1Highly secure broadcast authenticationReduce delaysUser identity/authority verificationInformation processingOne-way function
An information processing system performing highly secure broadcast authentication while reducing a delay until authentication, a communication amount, and a computation amount is provided. A server (100) generates authentication information for transmission data by combining a tag relating to the transmission data and a chain value associated in a chain with transmission order of the transmission data. The tag relating to the transmission data is generated by using a common key. The chain is generated by using a one-way function. A node (200) verifies whether a chain value associated with transmission order of data received in the past is generated or not by applying the one-way function to a chain value extracted by using a tag relating to the received data and authentication information for the received data. The tag relating to the received data is generated by using the common key.
Owner:NEC CORP

Cross-domain broadcast authentication method in space information network

The invention discloses a cross-domain broadcast authentication method in a space information network. The method mainly solves the problems in the prior art that the authentication efficiency is low, the extensibility is low and the concurrence of multiple security domains in the space information network is not taken consideration when cross-domain broadcast authentication is carried out. The realization scheme of the method comprises that in a system deployment stage, the terminal and agent of each security domain finish calculating signing work with relatively high costs; in a broadcast information transmission stage, corresponding signatures only need to be taken out from a pre-calculated signature set; moreover, cross-domain transmission of the broadcast information is finished through the agent of each security domain, wherein re-signing needs to be carried out each time when one stage of agent is passed; and finally, a broadcast receiver finishes information authentication through the previous signatures. According to the method, through adoption of a pre-calculation mode, the efficiencies of signing and authenticating the broadcast authentication are greatly improved; moreover, through arrangement of the security domain agents, under a condition of not relating to the security systems of different security domains, the security transmission and cross-domain authentication of the broadcast information are ensured.
Owner:XIDIAN UNIV

Group broadcast authentication method based on block chain and PUFs

The invention discloses a group broadcast authentication method based on a block chain and PUFs (Physical Unclonable Frameworks). The method comprises a registration stage, an authentication stage and an updating stage, the registration stage comprises registration of a block chain node, registration of a device end and registration of a group; in the authentication stage, key negotiation and bidirectional authentication between a device end and a block chain node are completed; the authentication of the block chain node to the equipment end comprises two steps of authentication including initial authentication and secondary authentication, and the authentication of the equipment end to the block chain node is one-time authentication; in the updating stage, updating of authentication parameters of the equipment end and updating of registration parameters of the equipment end on the block chain are completed by the block chain node; according to the method, the PUFs and the block chain technology are combined, the single-point failure problem existing in the PUFs and the traceability of broadcast messages are solved, meanwhile, the physical aggression resistance of the equipment end is guaranteed, anonymity is achieved through the anonymous ID, and expansibility management and lightweight authentication of group members are achieved.
Owner:东南大学深圳研究院

IPv6 industrial wireless network data security transmission method based on broadcast signcryption

ActiveCN109451501ATroubleshoot broadcast authentication issuesAchieve immediate authenticationUser identity/authority verificationSecurity arrangementBroadcast packetConfidentiality
The invention relates to an IPv6 industrial wireless network data security transmission method based on broadcast signcryption, and belongs to the field of communication. According to the method, based on a user broadcast communication mode of an IPv6 industrial wireless network, a data security transmission method based on ECC signcryption is provided, and comprises an improved ECDLP digital signature scheme and an IPv6 industrial wireless network broadcast authentication scheme; and therefore, the end-to-end data transmission security is guaranteed. The method has the advantages that the IPv6 industrial wireless network broadcast authentication scheme is provided, so that high security and efficiency are achieved; dynamic addition and removal of a user can be supported, so that the robustness and flexibility of the network can be ensured; user anonymity can be realized, so that user privacy is protected; the improved ECDLP digital signature scheme is adopted for solving the problemsof source authentication and message integrity authentication of a user broadcast data packet in the IPv6 industrial wireless network, so that the confidentiality and authentication of data are guaranteed.
Owner:KYLAND TECH CO LTD

Message Authentication Method for Internet of Vehicles Based on Edge Computing

The invention discloses an efficient message authentication method for a vehicular ad hoc network based on edge computing, which comprises the steps of system initialization of participating entitiesof the Internet of vehicles, wherein the step comprises two processes such as parameter generation and vehicle pseudonym and signature generation; and (2) message authentication of an RSU (Roadside Unit) and a vehicle, wherein the step comprises four processes such that the RSU elects an edge computing vehicle (ECV), the ECV executes a task, the RSU checks an authentication result of the ECV and vehicle message authentication is performed. The signing portion of the invention adopts an elliptic curve cryptography based operation, thereby enabling the computation and transmission overhead to below; further the ECV is elected according to a fuzzy logic control theory to achieve local optimal election; the ECV is set to help the RSU to achieve quick and accurate message signature authentication; and the RSU reduces the redundant authentication of the whole system to the maximum extent through broadcasting the authentication result, and the operating efficiency of the whole vehicular ad hoc network is improved.
Owner:ANHUI UNIVERSITY

Method suitable for broadcast authentication of wireless sensor network

ActiveCN102917313BTroubleshoot broadcast authentication issuesAchieve immediate authenticationSpecial service provision for substationUser identity/authority verificationBroadcast packetHash-based message authentication code
The invention provides a wireless sensor network broadcast authentication method based on a Chinese remainder theorem, and aims to solve the problems of origin authentication and message integrity of a broadcast data package in a wireless sensor network. The wireless sensor network broadcast authentication method comprises the following steps that: a base station takes a unique solution of a congruence equation set of the Chinese remainder theorem as a 'signature' of a message to construct the broadcast data package and sends the broadcast data package; and a receiving party recovers a message authentication code (MAC) according to the 'signature' of in the broadcast data package, generates the message authentication code through the message and pair secret keys in the broadcast data package, and finishes the authentication operation on the broadcast data package by comparing whether the MACs are equal. According to the method suitable for the broadcast authentication of the wireless sensor network, a complex secret key management mechanism is unnecessary in the whole wireless sensor network, the instant authentication, the tolerance package losing and the like on an optional broadcast message can be realized, and according to the method, the capabilities of replay attack resistance, DOC (Disk Operating System) attack resistance, and node trapping resistance also can be realized.
Owner:CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products