Disclosure of Invention
In order to solve the technical problems that in the prior art, when public key cryptography is adopted between intelligent terminals of an electric power internet of things for identity obtaining, the trust relationship is unreliable due to multi-layer transmission of messages, the intelligent terminals are easily attacked by a third party, and the information transmission efficiency is low, the invention provides an identity authentication method between the intelligent terminals of the electric power internet of things, which comprises the following steps:
registration node A uses node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending the information to a registration node B, wherein the registration node A and the registration node B are intelligent terminal nodes which are successfully registered in the electric power Internet of things safety sub-platform to which the registration node A and the registration node B belong, and acquiring a node private key, a node identification and a public key factor matrix sent by the safety sub-platform, wherein the public key factor matrix is generated by an electric power Internet of things safety main platform;
node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B;
the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating;
the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBFor registering node ANode public key K for registering node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Further, the node private key K is used at the registration node APRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Before sending to the registered node B, the method further comprises:
the electric power internet of things safety sub-platform to which the intelligent terminal node A and the intelligent terminal node B belong receives a signature S sent by the intelligent terminal node A when the intelligent terminal node A is firstly accessed into the electric power internet of thingsA1And node information MAUsing node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node A from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBA(ii) a Receiving a signature S sent by an intelligent terminal node B when the intelligent terminal node B is firstly accessed into the power internet of thingsB1And node information MBUsing node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NBAccording to node identity NBCalculating a node private key K of the intelligent terminal node B from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBB(ii) a Wherein the signature SA1The intelligent terminal node A uses the ID private key K thereofIDPRIAFor node information MASignature performed, signature SB1Is that the intelligent terminal node B uses its ID private key KIDPRIBFor node information MBSigning the progress;
intelligent terminal node A and intelligent terminal node B belong to electric powerElectric power internet of things safety main platform ID public key K for internet of things safety sub-platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAfter second encryption information is generated, the second encryption information is sent to the electric power internet of things security main platform, so that the electric power internet of things security main platform uses the ID private key KIDPRI2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
node ID public key K for electric power internet of things safety sub-platform to which intelligent terminal node A and intelligent terminal node B belongIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAGenerating third encryption information, sending the third encryption information to the intelligent terminal node A, enabling the intelligent terminal node A applying for registration to become a registration node A, and utilizing a node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA(ii) a Using node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter the third encryption information is generated, the third encryption information is sent to the intelligent terminal node B applying for registration, so that the intelligent terminal node B applying for registration becomes a registration node B, and the node ID private key K is utilizedIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB。
Further, when the intelligent terminal node A is accessed into the power internet of things for the first time, the intelligent terminal node A uses a node ID private key KIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs; intelligent terminal node B uses its node ID private key K when first accessing the power internet of thingsIDPRIBFor node information MBSigning and signing SB1And node information MBThe method further comprises the following steps before sending the power internet of things safety sub-platform to which the node belongs:
configuring chip ID numbers for an intelligent terminal node A and an intelligent terminal node B which are accessed to the power Internet of things, and configuring a node ID private key K according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong;
sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1Recording the sub-platform ID public and private key pair on the electric power Internet of things security main platform;
configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2And recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform.
Further, the electric power internet of things comprises a safe main platform and at least two safe sub-platforms belonging to the safe main platform.
Furthermore, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform.
According to another aspect of the present invention, the present invention provides an identity authentication system between intelligent terminals of an internet of things for electric power, the system comprising:
the safety main platform is used for generating a public key factor matrix and sending the public key factor matrix to the safety sub-platform for storage;
the safety sub-platform is used for receiving signatures and node information sent by an intelligent terminal node A and an intelligent terminal node B which belong to the safety sub-platform, registering the intelligent terminal node A and the intelligent terminal node B according to the signatures and the node information, and sending node private keys, node identifications and public key factor matrixes of the registered node A and the registered node B to the intelligent terminal node after the intelligent terminal node A and the intelligent terminal node B are successfully registered to become the registered node A and the registered node B, wherein the signatures are signatures of the node information by the node ID private keys of the intelligent terminal node A and the intelligent terminal node B when the intelligent terminal node A and the intelligent terminal node B are firstly accessed into the power Internet of things;
the intelligent terminal node A and the intelligent terminal node B are used for registering the electric power Internet of things security sub-platform to which the node belongs when the electric power Internet of things is accessed for the first time, becoming a registered node A and a registered node B when the registration is successful, receiving a node private key, a node identifier and a public key factor matrix sent by the electric power Internet of things security sub-platform to which the node belongs, and completing identity authentication according to the node private key, the node identifier and the public key factor matrix, wherein the registered node A uses a node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B; node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B; the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating; the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Further, the electric powerThe Internet of things security master platform is also used for generating a private key factor matrix PRIB and using a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; using its ID private key KIDPRIB2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
the electric power Internet of things security sub-platform is also used for using the ID private key K of the electric power Internet of things security sub-platformIDPRI1Decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI; receiving signature S of intelligent terminal node AA1And node information MAAnd signature S with intelligent terminal node BB1And node information MB(ii) a Using node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBCalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBGenerating second encrypted informationThen, the second encrypted information is sent to a power Internet of things security main platform; using node ID public key KIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter generating the third encryption information, sending the third encryption information to the intelligent terminal node A applying for registration, and using the node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
the intelligent terminal node A is also used for using a node ID private key K when the intelligent terminal node A is accessed into the power Internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs to register; when the intelligent terminal node A is successfully registered to become a registered node A, the intelligent terminal node A is also used for utilizing the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA;
The intelligent terminal node B is also used for using a node ID private key K of the intelligent terminal when the intelligent terminal node B is accessed into the power internet of things for the first timeIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs; when the intelligent terminal node B successfully becomes the registered node B, the node B is also used for utilizing the node ID private key KIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB。
Further, the system also comprises a configuration unit which is used for configuring chip ID numbers for the intelligent terminal node A and the intelligent terminal node B which are accessed to the power Internet of things and configuring a node ID private key K according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBAnd recording the node ID public and private key pair of the intelligent terminal node A and the intelligent terminal node B in the key pairAnd the electric power Internet of things safety sub-platform to which the intelligent terminal node belongs.
Further, the system comprises a safety main platform and at least two safety sub-platforms belonging to the safety main platform.
Furthermore, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform.
According to the identity authentication method and system between the intelligent terminals of the power internet of things, a safety main platform, a safety sub platform and a three-layer authentication structure of intelligent terminal nodes are established in the power internet of things, a chip ID number is configured for each node accessed to a network, an ID public and private key pair is configured according to the ID number, distribution and transmission of information are completed based on the ID public and private key pair, the intelligent terminal nodes are registered on the sub platform to form registered nodes, then a private key and a node public key are extracted from a public key factor matrix and a private key factor matrix of the safety main platform by adopting a mapping algorithm based on node identification, and finally identity authentication is completed between the registered nodes based on the node private key and the node public key. The method and the system can well overcome the defects of a PKI scheme in the prior art by an authentication mechanism designed based on a combined public key system (CPK), aim at the problem of third-party attack of the PKI, the structure of the CPK system can be understood to be a single-layer CA mode, identity authentication is completed immediately after a secret key pair is generated, a process that information is transmitted layer by layer through a multi-level trust chain is avoided, and the problem that the authority and the efficiency of the CA of the PKI are reduced is solved. The CPK generates a large number of keys by means of a small amount of resources, is very suitable for identity authentication scenes of massive power grid terminal equipment, is easy to adapt to a complex intelligent power Internet of things terminal due to the characteristic of light weight, and has strong engineering practicability.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 is a flowchart of an identity authentication method between intelligent terminals of an internet of things for electric power according to a preferred embodiment of the present invention. As shown in fig. 1, in the preferred embodiment, a new energy vehicle a and an intelligent charging pile B are taken as examples, and an identity authentication method between intelligent terminals of an electric power internet of things is specifically described. The identity authentication method 100 between the intelligent terminals of the power internet of things starts fromstep 101.
Instep 101, chip ID numbers are configured for an intelligent terminal node A and an intelligent terminal node B which are accessed to the power Internet of things, and a node ID private key K is configured according to the chip ID number of the intelligent terminal node AIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong; sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1To do so byRecording the sub-platform ID public and private key pair on the electric power Internet of things security main platform; configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2Recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform; the security main platform of the power internet of things generates a public key factor matrix PUB and a private key factor matrix PRI and uses a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; security sub-platform uses its ID private key KIDPRI1And decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI.
Instep 102, the intelligent terminal node A uses a node ID private key K when accessing the power internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs; intelligent terminal node B uses its node ID private key K when first accessing the power internet of thingsIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs;
instep 103, the node ID public key K for the electric power Internet of things safety sub-platform to which the node belongsIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node A from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBFrom electric power thing networkingCalculating a node private key K of the intelligent terminal node B in a public key factor matrix PUB and a private key factor matrix PRI generated by a network security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAnd after second encryption information is generated, the second encryption information is sent to the electric power Internet of things safety main platform.
In the preferred embodiment, the node identifier is a variable, and the public key and the private key of the node can be extracted from the public key factor matrix and the private key factor matrix by inputting the node identifier value into a preset mapping algorithm.
Instep 104, the main security platform of the power internet of things uses its ID private key KIDPRI2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBAnd then storing.
Instep 105, the node ID public key K for the electric power Internet of things safety sub-platform to which the intelligent terminal node A belongsIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter third encryption information is generated, the third encryption information is sent to an intelligent terminal node A applying for registration, and a node ID public key K for a power internet of things safety sub-platform to which the intelligent terminal node B belongsIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
instep 106, the intelligent terminal node A applying for registration becomes a registration node A, and utilizes the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA(ii) a The intelligent terminal node B applying for registration becomes a registration nodePoint B and using the private key K of the node IDIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB。
Atstep 107, the registration node A uses the node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B;
instep 108, node identification N based on registered node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B;
instep 109, the registered node A receives the node identifier N sent by the registered node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating;
instep 110, the registering node A receives the node identification N of the registering node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Preferably, the electric power internet of things comprises a safety main platform and at least two safety sub-platforms belonging to the safety main platform.
Furthermore, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform. In this embodiment, the intelligent charging pile is immovable, so that the intelligent charging pile always belongs to one safety sub-platform before being dismantled and removed, and the new energy automobile is movable, so that the intelligent charging pile may belong to different safety sub-platforms when located at different positions in different time periods.
Fig. 2 is a schematic structural diagram of an identity authentication system between intelligent terminals of an internet of things for power according to a preferred embodiment of the present invention. As shown in fig. 2, anidentity authentication system 200 between intelligent terminals of the internet of things in the preferred embodiment includes:
aconfiguration unit 201, configured with chip ID numbers for the intelligent terminal node a and the intelligent terminal node B accessing the power internet of things, and configured with a node ID private key K according to the chip ID number of the intelligent terminal node aIDPRIAAnd node ID public key KIDPUBAConfiguring a node ID private key K according to the chip ID number of the intelligent terminal node BIDPRIBAnd node ID public key KIDPUBBRecording node ID public and private key pairs of an intelligent terminal node A and an intelligent terminal node B on a power Internet of things security sub-platform to which the intelligent terminal nodes belong;
sub-platform ID numbers are configured for the safe sub-platforms of the power internet of things, and sub-platform ID private keys K are configured according to the sub-platform ID numbersIDPRI1And a sub-platform ID public key KIDPUB1Recording the sub-platform ID public and private key pair on the electric power Internet of things security main platform; configuring a main platform ID number for a power internet of things security main platform, and configuring a main platform ID private key K according to the main platform ID numberIDPRI2And a host platform ID public key KIDPUB2Recording the ID public and private key pair of the main platform on the electric power Internet of things security sub-platform; the security main platform of the power internet of things generates a public key factor matrix PUB and a private key factor matrix PRI and uses a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRI are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; security sub-platform uses its ID private key KIDPRI1And decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI.
The safetymain platform 202 is used for generating a public key factor matrix and sending the public key factor matrix to the safety sub-platform for storage;
thesafety sub-platform 203 is used for receiving the signature and the node information sent by the subordinate intelligent terminal node A and the subordinate intelligent terminal node B, and registers the intelligent terminal node A and the intelligent terminal node B according to the signature and the node information, after the intelligent terminal node A and the intelligent terminal node B are successfully registered to become a registered node A and a registered node B, the node private keys, the node identifications and the public key factor matrixes of the registered node A and the registered node B are sent to the intelligent terminal nodes, wherein the signature is the signature of the node information by using the node ID private key of the intelligent terminal node A and the intelligent terminal node B when the intelligent terminal node A and the intelligent terminal node B access the power Internet of things for the first time, the signature is the signature of the node information by using a node ID private key when the intelligent terminal node A and the intelligent terminal node B access the power Internet of things for the first time.
The intelligent terminal node A and the intelligent terminal node B are used for registering the electric power Internet of things security sub-platform to which the node belongs when the electric power Internet of things is accessed for the first time, becoming a registered node A and a registered node B when the registration is successful, receiving a node private key, a node identifier and a public key factor matrix sent by the electric power Internet of things security sub-platform to which the node belongs, and completing identity authentication according to the node private key, the node identifier and the public key factor matrix, wherein the registered node A uses a node private key KPRIASignature node identification NAGenerating a signature SA2Then, the node is marked with NAAnd signature SA2Sending to a registered node B; node identification N based on registration node AARegistering node A's node public key KPUBAThe registered node B is extracted from the public key factor matrix and according to the node public key K of the registered node APUBAVerifying signature SA2When verifying the signature SA2When the authentication is successful, the registration node A is authenticated by the registration node B; the registration node A receives the node identification N sent by the registration node BBAnd signature SB2Wherein the signature SB2Use of the node private key K by the registering node BPRIBSignature node identification NBGenerating; the registration node A receives the node identification N of the registration node BBExtracting node public key K of registered node B from public key factor matrixPUBBThe registration node A uses the node public key K of the registration node BPUBBVerifying signature SB2When verifying the signature SB2And when the authentication is successful, the registration node A passes the authentication of the registration node B, and the mutual authentication of the registration node A and the registration node B is completed.
Preferably, the power internet of thingssecurity master platform 202 is further configured to generate a private key factor matrix PRIB and use a sub-platform ID public key KIDPUB1After the public key factor matrix PUB and the private key factor matrix PRIB are encrypted to generate first encryption information, the first encryption information is distributed to a security sub-platform; using its ID private key KIDPRIB2Decrypting the second encrypted information to obtain the node identifier N of the intelligent terminal node AANode public key KPUBAWith the node private key KPRIAAnd node identification N of node B of intelligent terminalBNode public key KPUBBWith the node private key KPRIBThen storing;
the electric power internet of things sub-platform 203 is also used for using the ID private key K thereofIDPRI1Decrypting the first encrypted information to obtain a public key factor matrix PUB and a private key factor matrix PRI; receiving signature S of intelligent terminal node AA1And node information MAAnd signature S with intelligent terminal node BB1And node information MB(ii) a Using node ID public key KIDPUBAVerifying signature SA1And checking the node information MAWhen signing SA1Verification passed and node information MAWhen the audit is passed, generating a node identifier NA(ii) a Using node ID public key KIDPUBBVerifying signature SB1And checking the node information MBWhen signing SB1Verification passed and node information MBWhen the audit is passed, generating a node identifier NB(ii) a According to node identification NACalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIAAnd node public key KPUBAAccording to node identity NBCalculating a node private key K of the intelligent terminal node from a public key factor matrix PUB and a private key factor matrix PRI generated by the electric power Internet of things security main platformPRIBAnd node public key KPUBBAnd using ID public key K of power Internet of things security main platformIDPUB2Encrypting the node identification NA、NBNode public key KPUBA、KPUBBWith the node private key KPRIA、KPRIBAfter second encryption information is generated, the second encryption information is sent to a power internet of things security main platform; using node ID public key KIDPUBAEncrypted node private key KPRIAPublic key factor matrix PUB, node identification NAAfter generating the third encryption information, sending the third encryption information to the intelligent terminal node A applying for registration, and using the node ID public key KIDPUBBEncrypted node private key KPRIBPublic key factor matrix PUB, node identification NBAfter generating third encryption information, sending the third encryption information to an intelligent terminal node B applying for registration;
the intelligent terminal node A is also used for using a node ID private key K when the intelligent terminal node A is accessed into the power Internet of things for the first timeIDPRIAFor node information MASigning and signing SA1And node information MASending the information to the power Internet of things safety sub-platform to which the node belongs to register; when the intelligent terminal node A is successfully registered to become a registered node A, the intelligent terminal node A is also used for utilizing the node ID private key KIDPRIADecrypting the third encrypted information to obtain a node private key KPRIAPublic key factor matrix PUB, node identification NA;
The intelligent terminal node B is also used for using a node ID private key K of the intelligent terminal when the intelligent terminal node B is accessed into the power internet of things for the first timeIDPRIBFor node information MBSigning and signing SB1And node information MBSending the information to the power Internet of things safety sub-platform to which the node belongs; when the intelligent terminal node B successfully becomes the registered node B, the node B is also used for utilizing the node ID private key KIDPRIBDecrypting the third encrypted information to obtain a node private key KPRIBPublic key factor matrix PUB, node identification NB。
Preferably, the system comprises a safety main platform and not less than two safety sub-platforms belonging to the safety main platform.
Preferably, one intelligent terminal node can belong to a plurality of safety sub-platforms, and one time period can only belong to one safety sub-platform.
The steps of the identity authentication between the registered intelligent terminal nodes of the identity authentication system between the intelligent terminals of the power internet of things are the same as the steps adopted by the method for the identity authentication between the intelligent terminals of the power internet of things, the technical effects are the same, and the description is omitted.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [ device, component, etc ]" are to be interpreted openly as referring to at least one instance of said device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.