Movatterモバイル変換


[0]ホーム

URL:


CN113591103A - Identity authentication method and system between intelligent terminals of power internet of things - Google Patents

Identity authentication method and system between intelligent terminals of power internet of things
Download PDF

Info

Publication number
CN113591103A
CN113591103ACN202110729057.5ACN202110729057ACN113591103ACN 113591103 ACN113591103 ACN 113591103ACN 202110729057 ACN202110729057 ACN 202110729057ACN 113591103 ACN113591103 ACN 113591103A
Authority
CN
China
Prior art keywords
node
intelligent terminal
public key
platform
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110729057.5A
Other languages
Chinese (zh)
Other versions
CN113591103B (en
Inventor
刘宣
唐悦
任毅
李然
张海龙
郑国权
苏涛
林航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Power Research Institute Co Ltd CEPRI
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Original Assignee
China Electric Power Research Institute Co Ltd CEPRI
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Power Research Institute Co Ltd CEPRI, Information and Telecommunication Branch of State Grid Anhui Electric Power Co LtdfiledCriticalChina Electric Power Research Institute Co Ltd CEPRI
Priority to CN202110729057.5ApriorityCriticalpatent/CN113591103B/en
Publication of CN113591103ApublicationCriticalpatent/CN113591103A/en
Application grantedgrantedCritical
Publication of CN113591103BpublicationCriticalpatent/CN113591103B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明提供一种电力物联网智能终端间的身份认证方法和系统,所述方法和系统在电力物联网搭建了安全主平台,安全分平台和智能终端节点的三层认证结构,为每个接入网络的节点配置芯片I D号,根据I D号配置I D公私钥对,基于I D公私钥对完成信息的分发与传递,智能终端节点在分平台进行注册成为注册节点,然后基于节点标识,采用映射算法,从安全主平台的公钥因子矩阵和私钥因子矩阵中提取节点私钥和节点公钥,最后,注册节点之间基于节点私钥与节点公钥完成身份认证。所述方法和系统基于组合公钥体制设计的认证机制能很好地克服现有技术中PKI方案的缺点,解决了PKI的CA权威性与效率降低的问题,具有很强的工程实用性。

Figure 202110729057

The invention provides an identity authentication method and system between intelligent terminals of the power Internet of things. The method and system build a three-layer authentication structure of a security main platform, a security sub-platform and an intelligent terminal node in the power Internet of things, and provide each connection with a three-layer authentication structure. The node entering the network is configured with the chip ID number, and the ID public and private key pair is configured according to the ID number. Based on the ID public and private key pair, the distribution and transmission of information is completed. The intelligent terminal node is registered on the sub-platform as a registered node, and then based on the node identification, the mapping algorithm is adopted. , extract the node private key and the node public key from the public key factor matrix and the private key factor matrix of the security main platform, and finally complete the identity authentication between the registered nodes based on the node private key and the node public key. The authentication mechanism based on the combined public key system design of the method and system can well overcome the shortcomings of the PKI scheme in the prior art, solve the problems of reduced CA authority and efficiency of PKI, and has strong engineering practicability.

Figure 202110729057

Description

Identity authentication method and system between intelligent terminals of power internet of things
Technical Field
The invention relates to the field of power internet of things, in particular to an identity authentication method and system between intelligent terminals of the power internet of things.
Background
The intelligent terminal of the power internet of things is an important infrastructure in an intelligent power grid and is widely applied to the fields of power grid infrastructure monitoring, power production, power grid operation and maintenance, power business data acquisition, intelligent business application and the like. Because the power system has higher requirements on reliability, real-time performance and safety, the power internet of things has higher requirements on safety protection compared with the conventional internet of things system.
Identity authentication is a method and mechanism for confirming, in an information system, whether an entity has access rights to a certain resource or service through cryptographic means. With the progress of science and technology, the number of intelligent terminal nodes in the power internet of things is more and more, and the requirement for identity authentication is more and more urgent.
Since the first proposal in the last 70 th century, public key cryptography has developed rapidly, and various authentication schemes and protocols based on the development are endless. In the field of power internet of things, a PKI public key system is a mainstream public key password solution at present, but the problems of unreliable trust relationship, susceptibility to third party attack and low information transmission efficiency caused by multi-layer transmission of messages still exist.
Disclosure of Invention
In order to solve the technical problems that in the prior art, when public key cryptography is adopted between intelligent terminals of an electric power internet of things for identity obtaining, the trust relationship is unreliable due to multi-layer transmission of messages, the intelligent terminals are easily attacked by a third party, and the information transmission efficiency is low, the invention provides an identity authentication method between the intelligent terminals of the electric power internet of things, which comprises the following steps:
registration node A uses node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending the information to a registration node B, wherein the registration node A and the registration node B are intelligent terminal nodes which are successfully registered in the electric power Internet of things safety sub-platform to which the registration node A and the registration node B belong, and acquiring a node private key, a node identification and a public key factor matrix sent by the safety sub-platform, wherein the public key factor matrix is generated by an electric power Internet of things safety main platform;
node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B;
the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating;
the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBFor registering node ANode public key K for registering node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Further, the node private key K is used at the registration node APRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Before sending to the registered node B, the method further comprises:
the electric power internet of things safety sub-platform to which the intelligent terminal node A and the intelligent terminal node B belong receives a signature S sent by the intelligent terminal node A when the intelligent terminal node A is firstly accessed into the electric power internet of thingsA1And node information MAUsing node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node A from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBA(ii) a Receiving a signature S sent by an intelligent terminal node B when the intelligent terminal node B is firstly accessed into the power internet of thingsB1And node information MBUsing node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NBAccording to node identity NBCalculating a node private key K of the intelligent terminal node B from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBB(ii) a Wherein the signature SA1The intelligent terminal node A uses the ID private key K thereofIDPRIAFor node information MASignature performed, signature SB1Is that the intelligent terminal node B uses its ID private key KIDPRIBFor node information MBSigning the progress;
intelligent terminal node A and intelligent terminal node B belong to electric powerElectric power internet of things safety main platform ID public key K for internet of things safety sub-platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAfter second encryption information is generated, the second encryption information is sent to the electric power internet of things security main platform, so that the electric power internet of things security main platform uses the ID private key KIDPRI2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
node ID public key K for electric power internet of things safety sub-platform to which intelligent terminal node A and intelligent terminal node B belongIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAGenerating third encryption information, sending the third encryption information to the intelligent terminal node A, enabling the intelligent terminal node A applying for registration to become a registration node A, and utilizing a node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA(ii) a Using node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter the third encryption information is generated, the third encryption information is sent to the intelligent terminal node B applying for registration, so that the intelligent terminal node B applying for registration becomes a registration node B, and the node ID private key K is utilizedIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB
Further, when the intelligent terminal node A is accessed into the power internet of things for the first time, the intelligent terminal node A uses a node ID private key KIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs; intelligent terminal node B uses its node ID private key K when first accessing the power internet of thingsIDPRIBFor node information MBSigning and signing SB1And node information MBThe method further comprises the following steps before sending the power internet of things safety sub-platform to which the node belongs:
configuring chip ID numbers for an intelligent terminal node A and an intelligent terminal node B which are accessed to the power Internet of things, and configuring a node ID private key K according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong;
sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1Recording the sub-platform ID public and private key pair on the electric power Internet of things security main platform;
configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2And recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform.
Further, the electric power internet of things comprises a safe main platform and at least two safe sub-platforms belonging to the safe main platform.
Furthermore, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform.
According to another aspect of the present invention, the present invention provides an identity authentication system between intelligent terminals of an internet of things for electric power, the system comprising:
the safety main platform is used for generating a public key factor matrix and sending the public key factor matrix to the safety sub-platform for storage;
the safety sub-platform is used for receiving signatures and node information sent by an intelligent terminal node A and an intelligent terminal node B which belong to the safety sub-platform, registering the intelligent terminal node A and the intelligent terminal node B according to the signatures and the node information, and sending node private keys, node identifications and public key factor matrixes of the registered node A and the registered node B to the intelligent terminal node after the intelligent terminal node A and the intelligent terminal node B are successfully registered to become the registered node A and the registered node B, wherein the signatures are signatures of the node information by the node ID private keys of the intelligent terminal node A and the intelligent terminal node B when the intelligent terminal node A and the intelligent terminal node B are firstly accessed into the power Internet of things;
the intelligent terminal node A and the intelligent terminal node B are used for registering the electric power Internet of things security sub-platform to which the node belongs when the electric power Internet of things is accessed for the first time, becoming a registered node A and a registered node B when the registration is successful, receiving a node private key, a node identifier and a public key factor matrix sent by the electric power Internet of things security sub-platform to which the node belongs, and completing identity authentication according to the node private key, the node identifier and the public key factor matrix, wherein the registered node A uses a node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B; node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B; the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating; the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Further, the electric powerThe Internet of things security master platform is also used for generating a private key factor matrix PRIB and using a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; using its ID private key KIDPRIB2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
the electric power Internet of things security sub-platform is also used for using the ID private key K of the electric power Internet of things security sub-platformIDPRI1Decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI; receiving signature S of intelligent terminal node AA1And node information MAAnd signature S with intelligent terminal node BB1And node information MB(ii) a Using node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBCalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBGenerating second encrypted informationThen, the second encrypted information is sent to a power Internet of things security main platform; using node ID public key KIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter generating the third encryption information, sending the third encryption information to the intelligent terminal node A applying for registration, and using the node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
the intelligent terminal node A is also used for using a node ID private key K when the intelligent terminal node A is accessed into the power Internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs to register; when the intelligent terminal node A is successfully registered to become a registered node A, the intelligent terminal node A is also used for utilizing the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA
The intelligent terminal node B is also used for using a node ID private key K of the intelligent terminal when the intelligent terminal node B is accessed into the power internet of things for the first timeIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs; when the intelligent terminal node B successfully becomes the registered node B, the node B is also used for utilizing the node ID private key KIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB
Further, the system also comprises a configuration unit which is used for configuring chip ID numbers for the intelligent terminal node A and the intelligent terminal node B which are accessed to the power Internet of things and configuring a node ID private key K according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBAnd recording the node ID public and private key pair of the intelligent terminal node A and the intelligent terminal node B in the key pairAnd the electric power Internet of things safety sub-platform to which the intelligent terminal node belongs.
Further, the system comprises a safety main platform and at least two safety sub-platforms belonging to the safety main platform.
Furthermore, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform.
According to the identity authentication method and system between the intelligent terminals of the power internet of things, a safety main platform, a safety sub platform and a three-layer authentication structure of intelligent terminal nodes are established in the power internet of things, a chip ID number is configured for each node accessed to a network, an ID public and private key pair is configured according to the ID number, distribution and transmission of information are completed based on the ID public and private key pair, the intelligent terminal nodes are registered on the sub platform to form registered nodes, then a private key and a node public key are extracted from a public key factor matrix and a private key factor matrix of the safety main platform by adopting a mapping algorithm based on node identification, and finally identity authentication is completed between the registered nodes based on the node private key and the node public key. The method and the system can well overcome the defects of a PKI scheme in the prior art by an authentication mechanism designed based on a combined public key system (CPK), aim at the problem of third-party attack of the PKI, the structure of the CPK system can be understood to be a single-layer CA mode, identity authentication is completed immediately after a secret key pair is generated, a process that information is transmitted layer by layer through a multi-level trust chain is avoided, and the problem that the authority and the efficiency of the CA of the PKI are reduced is solved. The CPK generates a large number of keys by means of a small amount of resources, is very suitable for identity authentication scenes of massive power grid terminal equipment, is easy to adapt to a complex intelligent power Internet of things terminal due to the characteristic of light weight, and has strong engineering practicability.
Drawings
A more complete understanding of exemplary embodiments of the present invention may be had by reference to the following drawings in which:
fig. 1 is a flowchart of an identity authentication method between intelligent terminals of an internet of things of electric power according to a preferred embodiment of the present invention;
fig. 2 is a schematic structural diagram of an identity authentication system between intelligent terminals of an internet of things for power according to a preferred embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 is a flowchart of an identity authentication method between intelligent terminals of an internet of things for electric power according to a preferred embodiment of the present invention. As shown in fig. 1, in the preferred embodiment, a new energy vehicle a and an intelligent charging pile B are taken as examples, and an identity authentication method between intelligent terminals of an electric power internet of things is specifically described. The identity authentication method 100 between the intelligent terminals of the power internet of things starts fromstep 101.
Instep 101, chip ID numbers are configured for an intelligent terminal node A and an intelligent terminal node B which are accessed to the power Internet of things, and a node ID private key K is configured according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong; sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1To do so byRecording the sub-platform ID public and private key pair on the electric power Internet of things security main platform; configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2Recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform; the security main platform of the power internet of things generates a public key factor matrix PUB and a private key factor matrix PRI and uses a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; security sub-platform uses its ID private key KIDPRI1And decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI.
Instep 102, the intelligent terminal node A uses a node ID private key K when accessing the power internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs; intelligent terminal node B uses its node ID private key K when first accessing the power internet of thingsIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs;
instep 103, the node ID public key K for the electric power Internet of things safety sub-platform to which the node belongsIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node A from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBFrom electric power thing networkingCalculating a node private key K of the intelligent terminal node B in a public key factor matrix PUB and a private key factor matrix PRI generated by a network security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAnd after second encryption information is generated, the second encryption information is sent to the electric power Internet of things safety main platform.
In the preferred embodiment, the node identifier is a variable, and the public key and the private key of the node can be extracted from the public key factor matrix and the private key factor matrix by inputting the node identifier value into a preset mapping algorithm.
Instep 104, the main security platform of the power internet of things uses its ID private key KIDPRI2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBAnd then storing.
Instep 105, the node ID public key K for the electric power Internet of things safety sub-platform to which the intelligent terminal node A belongsIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter third encryption information is generated, the third encryption information is sent to an intelligent terminal node A applying for registration, and a node ID public key K for a power internet of things safety sub-platform to which the intelligent terminal node B belongsIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
instep 106, the intelligent terminal node A applying for registration becomes a registration node A, and utilizes the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA(ii) a The intelligent terminal node B applying for registration becomes a registration nodePoint B and using the private key K of the node IDIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB
Atstep 107, the registration node A uses the node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B;
instep 108, node identification N based on registered node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B;
instep 109, the registered node A receives the node identifier N sent by the registered node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating;
instep 110, the registering node A receives the node identification N of the registering node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Preferably, the electric power internet of things comprises a safety main platform and at least two safety sub-platforms belonging to the safety main platform.
Furthermore, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform. In this embodiment, the intelligent charging pile is immovable, so that the intelligent charging pile always belongs to one safety sub-platform before being dismantled and removed, and the new energy automobile is movable, so that the intelligent charging pile may belong to different safety sub-platforms when located at different positions in different time periods.
Fig. 2 is a schematic structural diagram of an identity authentication system between intelligent terminals of an internet of things for power according to a preferred embodiment of the present invention. As shown in fig. 2, anidentity authentication system 200 between intelligent terminals of the internet of things in the preferred embodiment includes:
aconfiguration unit 201, configured with chip ID numbers for the intelligent terminal node a and the intelligent terminal node B accessing the power internet of things, and configured with a node ID private key K according to the chip ID number of the intelligent terminal node aIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong;
sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1Recording the sub-platform ID public and private key pair on the electric power Internet of things security main platform; configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2Recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform; the security main platform of the power internet of things generates a public key factor matrix PUB and a private key factor matrix PRI and uses a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; security sub-platform uses its ID private key KIDPRI1And decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI.
The safetymain platform 202 is used for generating a public key factor matrix and sending the public key factor matrix to the safety sub-platform for storage;
thesafety sub-platform 203 is used for receiving the signature and the node information sent by the subordinate intelligent terminal node A and the subordinate intelligent terminal node B, and registers the intelligent terminal node A and the intelligent terminal node B according to the signature and the node information, after the intelligent terminal node A and the intelligent terminal node B are successfully registered to become a registered node A and a registered node B, the node private keys, the node identifications and the public key factor matrixes of the registered node A and the registered node B are sent to the intelligent terminal nodes, wherein the signature is the signature of the node information by using the node ID private key of the intelligent terminal node A and the intelligent terminal node B when the intelligent terminal node A and the intelligent terminal node B access the power Internet of things for the first time, the signature is the signature of the node information by using a node ID private key when the intelligent terminal node A and the intelligent terminal node B access the power Internet of things for the first time.
The intelligent terminal node A and the intelligent terminal node B are used for registering the electric power Internet of things security sub-platform to which the node belongs when the electric power Internet of things is accessed for the first time, becoming a registered node A and a registered node B when the registration is successful, receiving a node private key, a node identifier and a public key factor matrix sent by the electric power Internet of things security sub-platform to which the node belongs, and completing identity authentication according to the node private key, the node identifier and the public key factor matrix, wherein the registered node A uses a node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B; node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B; the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating; the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Preferably, the power internet of thingssecurity master platform 202 is further configured to generate a private key factor matrix PRIB and use a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRIB are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; using its ID private key KIDPRIB2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
the electric power internet of things sub-platform 203 is also used for using the ID private key K thereofIDPRI1Decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI; receiving signature S of intelligent terminal node AA1And node information MAAnd signature S with intelligent terminal node BB1And node information MB(ii) a Using node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBCalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAfter second encryption information is generated, the second encryption information is sent to a power internet of things security main platform; using node ID public key KIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter generating the third encryption information, sending the third encryption information to the intelligent terminal node A applying for registration, and using the node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
the intelligent terminal node A is also used for using a node ID private key K when the intelligent terminal node A is accessed into the power Internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs to register; when the intelligent terminal node A is successfully registered to become a registered node A, the intelligent terminal node A is also used for utilizing the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA
The intelligent terminal node B is also used for using a node ID private key K of the intelligent terminal when the intelligent terminal node B is accessed into the power internet of things for the first timeIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs; when the intelligent terminal node B successfully becomes the registered node B, the node B is also used for utilizing the node ID private key KIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB
Preferably, the system comprises a safety main platform and not less than two safety sub-platforms belonging to the safety main platform.
Preferably, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform.
The steps of the identity authentication between the registered intelligent terminal nodes of the identity authentication system between the intelligent terminals of the power internet of things are the same as the steps adopted by the method for the identity authentication between the intelligent terminals of the power internet of things, the technical effects are the same, and the description is omitted.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [ device, component, etc ]" are to be interpreted openly as referring to at least one instance of said device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (10)

1. An identity authentication method between intelligent terminals of an electric power Internet of things is characterized by comprising the following steps:
registration node A uses node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending the data to a registered node B, wherein the registered node A and the registered node B are power Internet of things safety sub-platforms to which the registered node A and the registered node B belongThe registration is successful, and an intelligent terminal node of a node private key, a node identification and a public key factor matrix sent by the security sub-platform is obtained, wherein the public key factor matrix is generated by the power internet of things security main platform;
node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B;
the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating;
the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBUsing the node public key K of the registered node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
2. Method according to claim 1, characterized in that the node private key K is used at the registration node aPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Before sending to the registered node B, the method further comprises:
the electric power internet of things safety sub-platform to which the intelligent terminal node A and the intelligent terminal node B belong receives a signature S sent by the intelligent terminal node A when the intelligent terminal node A is firstly accessed into the electric power internet of thingsA1And node information MAUsing node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a According to node identification NAFrom electric power thing networkingCalculating a node private key K of the intelligent terminal node A in a public key factor matrix PUB and a private key factor matrix PRI generated by a security main platformPRIAAnd node public key KPUBA(ii) a Receiving a signature S sent by an intelligent terminal node B when the intelligent terminal node B is firstly accessed into the power internet of thingsB1And node information MBUsing node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NBAccording to node identity NBCalculating a node private key K of the intelligent terminal node B from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBB(ii) a Wherein the signature SA1The intelligent terminal node A uses the ID private key K thereofIDPRIAFor node information MASignature performed, signature SB1Is that the intelligent terminal node B uses its ID private key KIDPRIBFor node information MBSigning the progress;
power internet of things safety main platform ID public key K for power internet of things safety sub-platform to which intelligent terminal node A and intelligent terminal node B belongIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAfter second encryption information is generated, the second encryption information is sent to the electric power internet of things security main platform, so that the electric power internet of things security main platform uses the ID private key KIDPRI2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
node ID public key K for electric power internet of things safety sub-platform to which intelligent terminal node A and intelligent terminal node B belongIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAGenerating third encrypted information and sending the third encrypted information to the intelligenceThe terminal node A makes the intelligent terminal node A applying for registration become a registration node A and utilizes the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA(ii) a Using node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter the third encryption information is generated, the third encryption information is sent to the intelligent terminal node B applying for registration, so that the intelligent terminal node B applying for registration becomes a registration node B, and the node ID private key K is utilizedIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB
3. The method according to claim 2, wherein the intelligent terminal node A uses its node ID private key K when accessing the power Internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs; intelligent terminal node B uses its node ID private key K when first accessing the power internet of thingsIDPRIBFor node information MBSigning and signing SB1And node information MBThe method further comprises the following steps before sending the power internet of things safety sub-platform to which the node belongs:
configuring chip ID numbers for an intelligent terminal node A and an intelligent terminal node B which are accessed to the power Internet of things, and configuring a node ID private key K according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong;
sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1And the sub-platform ID is publicThe private key pair is recorded in the electric power Internet of things security main platform;
configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2Recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform;
the security main platform of the power internet of things generates a public key factor matrix PUB and a private key factor matrix PRI and uses a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform;
security sub-platform uses its ID private key KIDPRI1And decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI.
4. The method according to claim 1, wherein the power internet of things comprises one safety main platform and not less than two safety sub-platforms belonging to the safety main platform.
5. The method according to claim 4, wherein one intelligent terminal node can belong to a plurality of security sub-platforms, and one time period can only belong to one security sub-platform.
6. The utility model provides an identity authentication system between electric power thing networking intelligent terminal which characterized in that, the system includes:
the safety main platform is used for generating a public key factor matrix and sending the public key factor matrix to the safety sub-platform for storage;
the safety sub-platform is used for receiving signatures and node information sent by an intelligent terminal node A and an intelligent terminal node B which belong to the safety sub-platform, registering the intelligent terminal node A and the intelligent terminal node B according to the signatures and the node information, and sending node private keys, node identifications and public key factor matrixes of the registered node A and the registered node B to the intelligent terminal node after the intelligent terminal node A and the intelligent terminal node B are successfully registered to become the registered node A and the registered node B, wherein the signatures are signatures of the node information by the node ID private keys of the intelligent terminal node A and the intelligent terminal node B when the intelligent terminal node A and the intelligent terminal node B are firstly accessed into the power Internet of things;
the intelligent terminal node A and the intelligent terminal node B are used for registering the electric power Internet of things security sub-platform to which the node belongs when the electric power Internet of things is accessed for the first time, becoming a registered node A and a registered node B when the registration is successful, receiving a node private key, a node identifier and a public key factor matrix sent by the electric power Internet of things security sub-platform to which the node belongs, and completing identity authentication according to the node private key, the node identifier and the public key factor matrix, wherein the registered node A uses a node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B; node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B; the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating; the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
7. The system of claim 6, wherein the security master platform of the power internet of things is further configured to generate a private key factor matrix PRIB and use a sub-platform ID public key KIDPUB1Encrypting the public key factor momentsAfter the PUB and the PRI generate first encryption information, the first encryption information is distributed to a security sub-platform; and with its ID private key KIDPRI2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
the electric power Internet of things safety sub-platform is also used for receiving a signature S of an intelligent terminal node AA1And node information MAAnd signature S with intelligent terminal node BB1And node information MB(ii) a Using node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBCalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAfter second encryption information is generated, the second encryption information is sent to a power internet of things security main platform; using node ID public key KIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter generating third encryption information, encrypting the third encryption informationThe information is sent to an intelligent terminal node A applying for registration, and a node ID public key K is usedIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
the intelligent terminal node A is also used for using a node ID private key K when the intelligent terminal node A is accessed into the power Internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs to register; when the intelligent terminal node A is successfully registered to become a registered node A, the intelligent terminal node A is also used for utilizing the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA
The intelligent terminal node B is also used for using a node ID private key K of the intelligent terminal when the intelligent terminal node B is accessed into the power internet of things for the first timeIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs; when the intelligent terminal node B successfully becomes the registered node B, the node B is also used for utilizing the node ID private key KIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB
8. The system according to claim 7, further comprising a configuration unit configured to configure chip ID numbers for the intelligent terminal node a and the intelligent terminal node B accessing the power internet of things, and configure a node ID private key K according to the chip ID number of the intelligent terminal node aIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong;
sub-platform ID number is configured for safe sub-platform of power internet of things and is used as rootConfiguring private key K of sub-platform ID according to sub-platform ID numberIDPRI1And a sub-platform ID public key KIDPUB1Recording the sub-platform ID public and private key pair on the electric power Internet of things security main platform;
configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2Recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform;
the security main platform of the power internet of things generates a public key factor matrix PUB and a private key factor matrix PRI and uses a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; security sub-platform uses its ID private key KIDPRI1And decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI.
9. The system of claim 6, wherein the system comprises one security master platform and not less than two security sub-platforms belonging to the security master platform.
10. The system according to claim 9, wherein one intelligent terminal node can belong to a plurality of security sub-platforms, and one time slot can belong to only one security sub-platform.
CN202110729057.5A2021-06-292021-06-29Identity authentication method and system between intelligent terminals of electric power Internet of thingsActiveCN113591103B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110729057.5ACN113591103B (en)2021-06-292021-06-29Identity authentication method and system between intelligent terminals of electric power Internet of things

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110729057.5ACN113591103B (en)2021-06-292021-06-29Identity authentication method and system between intelligent terminals of electric power Internet of things

Publications (2)

Publication NumberPublication Date
CN113591103Atrue CN113591103A (en)2021-11-02
CN113591103B CN113591103B (en)2024-02-23

Family

ID=78245122

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110729057.5AActiveCN113591103B (en)2021-06-292021-06-29Identity authentication method and system between intelligent terminals of electric power Internet of things

Country Status (1)

CountryLink
CN (1)CN113591103B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114172742A (en)*2021-12-232022-03-11国网浙江省电力有限公司信息通信分公司 Hierarchical authentication method of power Internet of things terminal equipment based on node map and edge authentication
CN115549961A (en)*2022-08-192022-12-30海南视联通信技术有限公司Terminal authentication method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2019137030A1 (en)*2018-01-112019-07-18华为技术有限公司Safety certification method, related device and system
WO2020133655A1 (en)*2018-12-262020-07-02中国科学院沈阳自动化研究所Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scenario
CN111835752A (en)*2020-07-092020-10-27国网山西省电力公司信息通信分公司 Lightweight authentication method and gateway based on device identity
CN112887338A (en)*2021-03-182021-06-01南瑞集团有限公司Identity authentication method and system based on IBC identification password
CN112948784A (en)*2021-03-232021-06-11中国信息通信研究院Internet of things terminal identity authentication method, computer storage medium and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2019137030A1 (en)*2018-01-112019-07-18华为技术有限公司Safety certification method, related device and system
WO2020133655A1 (en)*2018-12-262020-07-02中国科学院沈阳自动化研究所Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scenario
CN111835752A (en)*2020-07-092020-10-27国网山西省电力公司信息通信分公司 Lightweight authentication method and gateway based on device identity
CN112887338A (en)*2021-03-182021-06-01南瑞集团有限公司Identity authentication method and system based on IBC identification password
CN112948784A (en)*2021-03-232021-06-11中国信息通信研究院Internet of things terminal identity authentication method, computer storage medium and electronic equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
康剑萍;何曙;王沈敏;: "PKI技术在质检机构客户身份认证系统中的应用", 质量与认证, no. 02, 10 February 2020 (2020-02-10)*
张志;崔国华;: "移动IPv6网络安全接入认证方案", 计算机科学, no. 12, 15 December 2009 (2009-12-15)*
张昊迪;刘国荣;汪来富;王帅;: "基于区块链技术的跨域身份认证机制研究", 广东通信技术, no. 07, 15 July 2018 (2018-07-15)*

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114172742A (en)*2021-12-232022-03-11国网浙江省电力有限公司信息通信分公司 Hierarchical authentication method of power Internet of things terminal equipment based on node map and edge authentication
CN114172742B (en)*2021-12-232024-02-20国网浙江省电力有限公司信息通信分公司 Hierarchical authentication method for power Internet of Things terminal equipment based on node map and edge authentication
CN115549961A (en)*2022-08-192022-12-30海南视联通信技术有限公司Terminal authentication method and device, electronic equipment and storage medium
CN115549961B (en)*2022-08-192024-09-17海南视联通信技术有限公司Terminal authentication method and device, electronic equipment and storage medium

Also Published As

Publication numberPublication date
CN113591103B (en)2024-02-23

Similar Documents

PublicationPublication DateTitle
Zhang et al.Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
CN113708935B (en)Internet of things equipment unified authentication method and system based on block chain and PUF
CN112953727A (en)Internet of things-oriented equipment anonymous identity authentication method and system
CN107948143A (en)Identity-based privacy protection integrity detection method and system in cloud storage
CN109889497A (en) A Trustless Data Integrity Verification Method
CN113301022A (en)Internet of things equipment identity security authentication method based on block chain and fog calculation
Liu et al.MBPA: A medibchain-based privacy-preserving mutual authentication in TMIS for mobile medical cloud architecture
WO2024027070A1 (en)Terminal device authentication method and system based on identification public key, and computer-readable storage medium
CN115442112B (en) PUF-based authentication and key negotiation method and device
CN114036539A (en) Blockchain-based secure and auditable IoT data sharing system and method
CN106487786B (en)Cloud data integrity verification method and system based on biological characteristics
Abdelfatah et al.Secure VANET authentication protocol (SVAP) using Chebyshev chaotic maps for emergency conditions
CN109861956B (en)Data verification system, method, device and equipment based on state channel
CN107493165A (en)A kind of car networking certification and cryptographic key negotiation method with strong anonymity
CN113378189A (en)Authentication and verification method and system for load identification module
CN113630255B (en) Lightweight two-way authentication method and system based on SRAM PUF
CN113591103A (en)Identity authentication method and system between intelligent terminals of power internet of things
Zhang et al.Anonymous authentication and information sharing scheme based on blockchain and zero knowledge proof for vanets
Sun et al.ECQV-GDH-based group key exchange protocol for CAN bus
CN110661816B (en) A blockchain-based cross-domain authentication method and electronic device
CN119995935A (en) A privacy-enhanced access control method for industrial Internet of Things
CN118138229B (en)Data acquisition and analysis method and system based on fusion base station
Basic et al.Trust your BMS: designing a lightweight authentication architecture for industrial networks
CN118013559A (en) Seal data encryption security system based on blockchain data user role model
CN113312640B (en) A Multi-Party Consensus Method for Software Data Integrity Based on Trusted Computing

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp